Reviewing Log Files
You should also peruse your log files when you are looking for signs of trouble. The Windows log files can be found under Event Viewer in Administrative Tools. Under Linux and BSD-variant UNIX, log files are found in the /var/log/ directory. Other UNIX variants may have these files also though their location may be different. Table 11.2 lists the major Unix log files and their functions.
Table 11.2. UNIX Log FilesLog Files | Descriptions |
---|
/var/log/messages | Stores general system messages. | /var/log/secure | Stores authentication and security messages. | /var/log/wtmp | Stores a history of past logins and logouts. | /var/run/utmp | Stores a dynamic list of who is currently logged in. | /var/log/btmp | For Linux only. Stores any failed or bad logins. |
These files may be located in a slightly different location or may not exist on other versions of UNIX. Also, programs often create their own log files, which may be kept in the /var directory. You can use a text editor to view these files and search for certain text strings or number (such as IP addresses and user names).
Table 11.3 lists several operating system-level commands you can use on Linux and UNIX systems to scan these files quickly.
Table 11.3. Linux and UNIX Scanning CommandsCommands | Descriptions |
---|
users | Shows the users currently on the system from the utmp file. | w | Shows users on the system with details such as where they logged in from (local or remote), IP address if they logged in remotely, and what commands they are executing. This command is highly useful for catching intruders in the act. | last | Shows the most recent contents of the wtmp file. This can also be quite useful in seeing who is logging onto your system, at what hours, and for how long. Listing 11.4 shows an example of this output. | lastb | For Linux only. This does the same thing as last but for btmp, the bad login log file. This can be the first place an intruder shows up with multiple failed login attempts. |
Listing 11.4. Output from the last command
tony pts/0 10.1.1.1 Sun Sep 5 23:06 still logged in
tony pts/0 10.1.1.1 Sun Sep 5 22:44 - 23:04 (00:20)
tony pts/0 10.1.1.1 Sun Sep 5 21:08 - 21:16 (00:07)
tony pts/0 10.1.1.1 Sun Sep 5 20:20 - 20:36 (00:16)
reboot system boot 2.4.18-14 Sun Sep 5 17:32 (05:34)
tony tty1 Sun Sep 5 17:29 - down(00:01)
tony pts/2 10.1.1.1 Sat Sep 4 23:02 - 23:34 (00:32)
tony pts/2 10.1.1.1 Sat Sep 4 22:36 - 22:36 (00:00)
hank pts/0 10.1.1.200 Sat Sep 4 12:13 - 12:22 (00:08)
hank pts/0 adsl-66-141-23-1 Fri Sep 3 23:53 - 23:53(00:00)
hank pts/0 192.168.1.100 Fri Sep 3 14:47 - 14:47(00:00)
tony pts/3 192.168.1.139 Fri Sep 3 09:59 - down (00:01)
larry pts/3 adsl-65-67-132-2 Thu Sep 2 22:59 - 23:11(00:12)
tony pts/3 10.1.1.1 Thu Sep 2 21:33 - 21:49 (00:16)
brian pts/3 adsl-65-68-90-12 Thu Sep 2 18:23 - 18:31(00:07)
hank pts/5 192.168.1.139 Thu Sep 2 14:29 - 15:35 (01:06)
sam pts/ dialup-207-218-2 Wed Sep 1 22:24 - 00:40(02:16)
Keep in mind that if your system has been compromised, these programs may have been replaced with trojanized copies. A program like Tripwire (see Chapter 7) can help you determine if your system binaries have been tampered with. You should make known good copies of these binary files so you can execute from secure boot media instead of using the ones on the system. Also, remember that attackers will often selectively edit your log files to remove any trace of their actions. However, if they simply delete the log file, you may be able to recover it. You should also check all the log files as some neophytes only delete some of them.
|