Why do you say its netspy ? Is it just because that is listed as the most likely trojan on port 1024 or is there some 'evidence' on the box ? Actually, all of the stuff that uses 1024 by default seems to be windows based. However, lots of trojans can be configured to run on any port you like so its not that easy to know what it is just from the port.
Have you tried logging - you just add an identical rule before the 'drop' rule with target '-j LOG' .
The other thing to do is (as root) :
/usr/sbin/lsof -i TCP:1024
To see whats listening on that port ...
I have seen it said that KDM (KDE display manager) uses port 1024 so it might even be as innocent as that .
the one odd thing on my system was the permissions for some basics commands like "ls" and "netstat" got changed so users could not run them. That was puzzleing to me. Thats why i was thinking something was up
[root@Bravo sbin]# lsof -i TCP:1024
COMMAND PID USER FD TYPE DEVICE SIZE NODE NAME
rpc.statd 749 root 6u IPv4 942 TCP *:1024 (LISTEN)
[root@Bravo sbin]#
I would advise that you compare all the executables against the originals you used to install from the distro CD... I am always VERY suspicious when I turn up at a machine and it has binaries (especially binaries like ls, etc...)
I have discovered compromised machines more often than not in these situations... never hurts to double-check and make sure.
From the lsof output it looks like nfslock is using port 1024. If you do :
# /etc/rc.d/init.d/nfslock stop
then
# /usr/sbin/lsof -i TCP:1024
You'll probably see it stop. I agree 100% with TheRat though - its common practice to substitute doctored versions of common binaries so maybe you should do a 'rpm -Va' (verify all rpms - takes forever so maybe redirect it to a file) . If in doubt reinstall rpms with the --replacepkgs option. Also maybe use tripwire which takes checksums to detect meddling with files.
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.