Linux incident response quickly

Asphyxia

Owner
Administrator
Apr 25, 2015
1,845
2
2,199
327
Firstly, what commands were run?
Code:
mkdir /evidence; cd /evidence
mkdir bash_history
find / -name .bash_history | xargs grep "" > bash_history/log.txt
mkdir ip_logs
utmpdump /var/log/wtmp > ip_logs/wtmp.txt
utmpdump /var/log/btmp > ip_logs/btmp.txt
utmpdump /var/run/utmp > ip_logs/utmp.txt
grep "su\|wget\|\.com\|\.ru\|\.de\|\.country\|\.stream\|\.download\|\.xin\|\.gdn\|\.racing\|\.jetzt\|\.win" bash_history/log.txt
#You can change what to grep for, maybe unzip, gcc, .py, python, php, etc
#Anything from scp (moving files to another server), to wget (downloading files) could be worth looking at
#An attacker may also use nc - this project is not to do everything for you, just to get the logs you need quick and simple on Linux
mkdir misc; cd misc
cat /var/log/secure* /var/log/auth.log* 2>/dev/null | grep "root" > all_root
cat /var/log/secure* /var/log/auth.log* 2>/dev/null | grep "change" > changes #Shoutout to xxxtentacion RIP sir, your music is awesome; fly high
cat /var/log/secure* /var/log/auth.log* 2>/dev/null | grep "delete\|remove" > deleted
cat /var/log/secure* /var/log/auth.log* 2>/dev/null | grep "listen" > listen #maybe they changed SSHD port or something dumb
cat /var/log/secure* /var/log/auth.log* 2>/dev/null | grep "add\[\| added \| new \|New" > added
cat /var/log/secure* /var/log/auth.log* 2>/dev/null | grep "for user root" > for_user_root
cat /var/log/secure* /var/log/auth.log* 2>/dev/null | grep "for root" > for_root
cat /var/log/secure* /var/log/auth.log* 2>/dev/null | grep "password changed" > password_changed
cat /var/log/secure* /var/log/auth.log* 2>/dev/null | grep "Invalid user\|invalid user" > invalid_user
cat /var/log/secure* /var/log/auth.log* 2>/dev/null | grep "Accepted password" > accepted_password
systemctl | grep "server\|Server" > servers #Once you find running servers btw, go check your /var/log against those !!!PROTIP!!! example httpd.service, go /var/log/httpd/ and then cat * | grep "virus.exe" lol

#Maybe a hacker decides to dump your database and accidentally leaves the file there, go find that
find / -type f -size +10M 2>/dev/null > large_files

#Maybe the hacker ran "touch lol" and forgot to clear that file out of your /var/www/html?
find / -type f -size -1c 2>/dev/null | grep -v "usr/\|sys/\|proc/\|run/\|spool/\|ossec/\|lib/" > small_files
#cat small_files | grep "/var/www/"

2206

Curious, what all do you do if you get hacked?!

I know there are more logs to grab, want to know what you think is important? We can jointly come up with somewhat of a Linux INCIDENT RESPONSE log grabber how-to or whatever?! :)
 

Asphyxia

Owner
Administrator
Apr 25, 2015
1,845
2
2,199
327
In this second posting, we are going to take a further dive into application logs/auditing.

Building atop the other script:
Code:
mkdir /evidence; cd /evidence
mkdir apps; cd apps
ps -aux | grep -v "root " > non_root
ps -aux | grep "root " > root

#You may want to crawl through server logs available, to check for IP addresses/counts.
systemctl | grep "server\|Server" | cut -d. -f1 > servers_installed

find /etc/apache2/ -name "*.conf" 2>/dev/null | xargs grep "Log" > web_apache_log_info
find /etc/httpd/ -name "*.conf" 2>/dev/null | xargs grep "Log" > web_httpd_log_info
#Want to speed up log checking? cat web* | grep "\"\|CustomLog\|\.log\|TransferLog"

Here is an example of what we want to see in the web server configuration:
Code:
/etc/httpd/conf/httpd.conf:    CustomLog "logs/access_log" combined
/etc/httpd/conf.d/ssl.conf:TransferLog logs/ssl_access_log
/etc/httpd/conf.d/ssl.conf:CustomLog logs/ssl_request_log \

if

grep -E -o "([0-9]{1,3}[\.]){3}[0-9]{1,3}" /var/log/httpd/*ccess_log > httpd_ips
sort httpd_ips | uniq -cd | sort -nr
...................

Now we know to check /var/log/httpd/ssl_access_log for httpd, while elsewhere we may be looking for access.log, for example.

I am working further on this, but for now I have a way to check whether httpd/apache. I also plan on detecting NGINX, perhaps automation of log aggregation to make incident response more automated.

Code:
systemctl | grep "server\|Server" | cut -d. -f1 > servers_installed

if [ `grep httpd servers_installed` == 'httpd' ]
then
echo "You are running httpd"

elif [ `grep apache servers_installed` == 'apache2' ]
then
echo "You are running apache"

fi

Attackers have very specific behavior, finding ways to counteract and gather intelligence (counter-intelligence) is quite exciting.
 
Top