Quantcast
Channel: linuxadmin: Expanding Linux SysAdmin knowledge
Viewing all articles
Browse latest Browse all 17904

Is there a script out there for tracing a hacked file back to the original vulnerable code based on access logs?

$
0
0

I fumbled around with that title for a while -- I'm sure it's bad. Let me explain. Say you discover (however you do) a new malicious file on a webserver, or an existing file that has been modified (with some cute obfuscated code).

For these hacks, we all know how to use stat and check the mtime and ctime (when mtime is spoofed) to gather info and use all of our favorite GNU utilities to trace it back through the logs to find the actual vulnerability (hopefully). It feels like a sixth-sense at some point, but it's a waste of time and I think it can be automated.

So I was trying to automate this (with some terrible python code so far) and I thought I'd ask before I spend too much time writing code. Is there something out there that can take a given "hacked" file, and trace it back to the original vulnerability using the access logs (NCSA formatted logs)? I'm just wondering if I'm wasting time re-inventing the wheel if someone smarter than me has already greased the wheels on this?

submitted by kim_jong_com
[link][4 comments]

Viewing all articles
Browse latest Browse all 17904

Trending Articles