Netlog
I. Introduction of netlog
-
Netlog´Â TCP¿Í UDPÀÇ Æ®·¡ÇÈÀ» ¸ð´ÏÅ͸µÇÒ ¼ö ÀÖ´Â ÇÁ·Î±×·¥ÀÌ´Ù. ÀÌ ÇÁ·Î±×·¥Àº
Texas A&M University ¿¡¼ °³¹ßÇÑ ³×Æ®¿÷ º¸¿Ï°ü·Ã Åø·Î¼ ¾Æ·¡¿Í °°Àº 4°¡Áö·Î
±¸¼ºµÇ¾î ÀÖ´Ù. netlog ÆÐŰÁö´Â SunOS 4.x¿Í SunOS 5.x(Solaris x)¿¡¼¸¸
½ÇÇàµÈ´Ù.
- netwatch
: ½Ç½Ã°£ ³×Æ®¿÷ ¸ð´ÏÅ͸µÀ» ÇÏ´Â Åø
- tcplogger
: ¼ºê³ÝÀÇ ¸ðµç TCP connectionsÀ» ·Î±×ÆÄÀÏ·Î ³²±â´Â Åø
- udplogger
: ¼ºê³ÝÀÇ ¸ðµç UDP sessionsÀ» ·Î±×ÆÄÀÏ·Î ³²±â´Â Åø
- extract
: tcplogger¿Í udplogger·Î ¸¸µç ·Î±×ÆÄÀÏÀ» º¼¼öÀÖ°Ô ÇØÁÖ´Â Åø
I-I.Netlog¿¡ »ç¿ëµÈ Ư¡
¸»±×´ë·Î netlog ÆÐŰÁö´Â TCP/IP Ä¿³Ø¼ÇÀÌ ÀϾ´Â »óȲÀÇ µ¥ÀÌÅͱ׷¥ Áß¿¡
ÀÎÁõµÇÁö ¾ÊÀº »ç¿ëÀÚ³ª È£½ºÆ®·ÎºÎÅÍÀÇ Á¢¼ÓÀÌ ÀϾ°Å³ª, ƯÁ¤ ¸í·É°ú °ü°è µÈ
Á¢¼ÓÀÌ ÀϾ °æ¿ì ±× µ¥ÀÌÅͱ׷¥À» ºÐ¼®ÇÏ¿© ¿øÇÏ´Â Á¤º¸¸¦ »©¾î³»°Ô µÈ´Ù. Áï,
¼Ò½º IP¾îµå·¹½º¿Í ÇØ´ç ¼ºñ½º¸éµéÀ» ¸ð´ÏÅÍÇÏ°Ô µÇ´Â °ÍÀÌ´Ù. Áï, netwatchÀ̵ç,
tcploggerÀ̵ç, udploggerÀÌµç ¸ðµÎ µ¥ÀÌÅͱ׷¥À¸·ÎºÎÅÍ ¿øÇÏ´Â Á¤º¸¸¦ »©¾î³¾ ¼ö
ÀÖ°Ô²ûÇÏ´Â ·çƾÀÌ ¸ðµÎ ÇÊ¿äÇÏ°Ô µÈ´Ù. ÀÌ ¿ªÇÒÀ» ÇÏ´Â ·çƾÀÌ ¹Ù·Î pktfilt.c ¿¡¼ ¸Ã°Ô µÈ´Ù. Áï, ¸ðµç ÇÁ·Î±×·¥ÀÌ À§ÀÇ
¼Ò½º¸¦ ¸µÅ©ÇÏ¿© ÀûÀýÇÑ ½ºÆ®·°Ãĸ¦ ºÐ¼®ÇÏ°Ô µÈ´Ù. ¼Ò½º·¹º§¿¡¼ ±Ã±ÝÇÑ Á¡ÀÌ ÀÖ´Â
½Ã½ºÅÒ °ü¸®ÀÚµéÀº ¾Æ·¡ÀÇ ÆÄÀϵéÀ» ºÐ¼®Çغ¸±â ¹Ù¶õ´Ù.
$NETLOG_DIR/netwatch/pktfilt.c
$NETLOG_DIR/tcplogger/pktfilt.c
$NETLOG_DIR/udplogger/pktfilt.c
Netlog µµ±¸ÀÇ pktfilt.c Àº telnetÀ̳ª ftpµîÀÇ TCP ÆÐŶ¿¡¼ userID¿Í passwd
ºÎºÐ¿¡ ÇØ´çÇÏ´Â µ¥ÀÌÅÍ´Â ÇÊÅ͸µÇÏÁö ¸øÇÑ´Ù. À̸¦ º¸°ÇѰÍÀÌ sunsnifferµîÀÌ´Ù.
I-II.NetlogÀÇ ´É·Â
NetlogÆÐŰÁö´Â ¸» ±×´ë·Î ³×Æ®¿÷ »ó¿¡¼ÀÇ ÆÐŰÁöÀÇ Àü¼ÛÀ» ¸ð´ÏÅ͸µÇÏ´Â ±â´ÉÀ»
Á¦°øÇØ ÁØ´Ù. ÇÏÁö¸¸, ¸·¿¬È÷ µ¥ÀÌÅÍ ÆÐŶÀÌ À̸®Àú¸® ¿Å°Ü´Ù´Ï´Â Çö»ó¸¸ ÀÖ´Ù¸é
±×°ÍÀº ½Ã½ºÅÛ °ü¸®ÀÚ¿¡°Ô ¾Æ¹«·± µµ¿òÀ» ÁÖÁö ¸øÇϸç, ¾öû³ ÀÚ¿øÀ» ³¶ºñÇÏ´Â
°á°ú¸¦ ÃÊ·¡ÇÑ´Ù. ½ÇÁ¦·Î tcploggerÇÁ·Î±×·¥À» ¾à 10Ãʰ£ µ¹·ÈÀ»¶§ ÆÐŶÀ»
¸ð´ÏÅ͸µÇÑ ÆÄÀÏÀº ¾à 5~10ų·Î¹ÙÀÌÆ®¿¡ ´ÞÇÑ´Ù. netlog°¡ ²À ÇÊ¿äÇÏ°Ô ¾²ÀÌ´Â
ÀÌÀ¯¿Í netlogµµ±¸°¡ µîÀåÇÏ°Ô µÈ °¡Àå Å« ¿øÀÎÀº ¹Ù·Î 'IP spoofing attack'
¶§¹®ÀÌ´Ù.Áï, netlogÆÐŰÁö¸¦ ÀÌ¿ëÇÏ¿© 'IP spoofing attack'°ú 'Hijacking
tool'ÀÌ ÀÌ¿ëµÇ°í ÀÖ´ÂÁö üũÇϱâ À§ÇÑ ¸ñÀûÀ¸·Î °³¹ß µÇ¾ú´Ù.
IP spoofingÀ̶õ ±âÁ¸ÀÇ TCP/IP ÇÁ·ÎÅäÄÝÀÇ µðÀÚÀÎ »óÀÇ ¹®Á¦Á¡À» ÀÌ¿ëÇÏ¿© Ÿ°Ù
È£½ºÆ®ÀÇ trustedÈ£½ºÆ®ÀΠô °¡ÀåÇÏ¿© Ÿ°Ù È£½ºÆ®·ÎÀÇ Ä§ÀÔÀ» ¼º°ø½ÃŰ´Â
ħÀÔ¹æ¹ý ÁßÀÇ ÇϳªÀÌ´Ù.
I-III.NetlogÀÇ ¾ç¸é¼º
NetlogÆÐŰÁö´Â ´Ü¼øÇÑ ¸ð´ÏÅ͸µ¸¸ Á¦°øÇØ ÁÙ »Ó, ¾î¶² exploitÇѸ¸ÇÑ ´ë»óÀÌ µÇÁö
¸øÇÑ´Ù. Áï 'ps -aux | grep netwatch'¿Í °°Àº ¼öÀÛ¾÷À» ÅëÇÏ¿© ÀÚ½ÅÀÌ ¸ð´ÏÅ͵ǰí
ÀÖ´ÂÁö ¾Æ´ÑÁö¿¡ °üÇÑ Á¤º¸¸¸ intruder¿¡°Ô Á¦°øÇØ ÁÙ »ÓÀÌ´Ù. ¿¹¸¦ µé¾î,
intruder°¡ kus.kaist.ac.kr¿¡ °èÁ¤À» °®°í ÀÖÁö¸¸, IP spoofingÀ» ÅëÇÏ¿©
attackÀ» ½ÃµµÇϰíÀÚ ÇÒ °æ¿ì, 'ps -aux | grep netwatch'µîÀ» ÅëÇÏ¿©
netwatchÆÐŰÁö°¡ µ¿ÀÛÁßÀÎÁö¸¦ ¿ì¼± ¾Ë¾Æº» ´ÙÀ½ °ø°ÝÇÒ ¼ö ¹Û¿¡ ¾ø´Â
°ÍÀÌ´Ù.
ºñ·Ï netlogÆÐŰÁö¸¦ ÀÌ¿ëÇÏ¿© ÀÚ½ÅÀÌ °ø°Ý´çÇÒ ¿ì·Á´Â ¾øÁö¸¸, netlogÆÐŰÁöÀÇ
½Å·ÚµµµîÀ» ÀÚ¼¼È÷ »ìÆìº¸°í ½ÅÁßÇÑ ºÐ¼®ÀÌ ÇÊ¿äÇÏ´Ù°í ÆÇ´ÜµÈ´Ù. ¿Ö³ÄÇϸé,
netlogÆÐŰÁö´Â ¸» ±×´ë·Î Network log¸¦ ¸ð´ÏÅÍÇÒ»ÓÀ̹ǷÎ, °ø°ÝÀÇ ¼ö´ÜÀº µÉ ¼ö
¾øÁö¸¸, ±²ÀåÈ÷ ¸¹Àº ·Î±×ÆÄÀÏÀ» ³²±â¹Ç·Î ¼¼¹ÐÈ÷ ºÐ¼®ÇØ º¸Áö ¾Ê´ÂÇÑ È¿°úÀûÀ¸·Î
½Ã½ºÅÛÀ» ¹æ¾îÇÒ ¼ö ¾ø´Ù. ¿¹¸¦ µé¾î, netwatch¸¦ ÀÌ¿ëÇÏ¿© ¸ð´ÏÅÍÇϰíÀÖ´õ¶óµµ,
smtpÆ÷Æ®¿¡ debug¸í·ÉÀ» ÇÕ¹ýÀûÀÎ »ç¿ëÀÚ°¡ Çʿ信 ÀÇÇÏ¿© À̸¦ »ç¿ëÇϰí ÀÖÀ»
¼öµµ ÀÖÁö¸¸, netwatch ÇÁ·Î±×·¥ÀÌ À̸¦ ÆÇº°ÇÒ ¼ö´Â ¾ø±â ¶§¹®ÀÌ´Ù. netwatchÀÇ
°á°ú¸¦ ÅëÇØ ³¸¼± °÷¿¡¼ÀÇ debug ¸í·É µîÀÌ ³ªÅ¸³´Ù¸é ÀÌ´Â ÀǽÉÇØ º¼ ¼ö ÀÖÀ»
°ÍÀÌ´Ù.
ÇÏÁö¸¸, network firewallÀÇ ½Å·Úµµ°¡ ³ô¾ÆÁö°í, °ü¸®ÀÚµéÀÇ Áö½ÄÀÌ ´Ã¼ö·Ï IP
spoofing °ú °°Àº ħÀÔÀº ÁÙ¾îµé°ÍÀ¸·Î ¿¹»óµÈ´Ù. ¿Ö³ÄÇϸé, IP spoofingÀÇ
¿øÃµÀûÀÎ ºÀ¼â ¹æ¹ýÀÌ ¹Ù·Î filtering routerÀÇ ¼³Ä¡¸¦ ÀÌ¿ëÇÑ firewallÀÇ
setupÀ̱⠶§¹®ÀÌ´Ù. ±×·¯³ª, TCP/IP ÇÁ·ÎÅäÄÝ µðÀÚÀÎÀÌ º¯ÇÏÁö ¾Ê´Â ÀÌ»ó IP
spoofingÀº ¾ðÁ¦µçÁö ÀϾ ¼ö ÀÖ´Â ÀÏÀ̹ǷÎ, ¶ó¿ìÅÍ ¼Â¾÷(filtering
router)µîÀÇ °úÁ¤À» °ÅÃÄ Ã¶ÀúÇÑ trusted ȯ°æÀ» ±¸ÃàÇØ¾ß ÇÒ °ÍÀÌ´Ù.
¸ÕÀú IP spoofing¿¡ ´ëÇÑ Áö½ÄÀÌ ÀÖ¾î¾ß netlogÆÐŰÁöÀÇ Á߿伺À» ½Ç°¨ÇÒ ¼ö ÀÖÀ»
°ÍÀÌ´Ù.
I-IV. NetlogÀÇ °á·Ð
Netlog ÆÐŰÁö´Â intruder·Î ºÎÅÍ exploitµÉ ¸¸ÇÑ ¿ì·ÁÀÇ ¼ÒÁö´Â ÀüÇô¾ø´Ù.
ÇÏÁö¸¸,À¢¸¸ÇÑ Áö½ÄÀÌ ¾ø´Â ½Ã½ºÅÛ °ü¸®ÀÚ¿¡°Ô´Â ¹«¿ëÁö¹°À̳ª ´Ù¸§ÀÌ ¾ø´Ù. IP
spoofingµîÀÇ »çÀü Áö½ÄÀ» ÇÊ¿ä·Î ÇÏ¸ç ¼ºê³ÝÀÇ ¸ðµç Ä¿³Ø¼ÇÀ» ·Î±×ÆÄÀÏ¿¡ ³²±æ
°æ¿ì ÀÚ¿øÀÇ ³¶ºñ°¡ ½ÉÇÒ ¼ö ÀÖ´Ù.
Netlog ÆÐŰÁöÀÇ ¹æ¾î¿ë ¼ÒÇÁÆ®¿þ¾î·ÎÀÇ °¡Àå ÃÖ¼±ÀÇ Àü·«Àº ¹«¾ùÀϱî?
Netlog ÆÐŰÁö´Â ±âº»ÀûÀ¸·Î IP spoofingÀ» ÆÄ¾ÇÇÒ ¼ö ÀÖ´Ù. ÇÏÁö¸¸, ¾Õ¼µµ
¸»ÇßµíÀÌ IP spoofingÀ» ¿øÃµÀûÀ¸·Î ºÀ¼âÇÒ ¼ö´Â ¾ø´Ù. IP spoofing attackÀÌ
½ÃµµµÇ°í ÀÖ´Ù¸é, Áï½Ã ½Ã½ºÅÛÀ» ÁߴܽÃŰ´øÁö, ¾Æ´Ï¸é IP spoofing attack¿¡
»ç¿ëµÇ´Â TCP¼ºñ½º¸¦ ã¾Æ¼ deamonÀ» Á×ÀÌ´Â ¹æ¹ýÀ» ÃëÇØ¾ß ÇÑ´Ù. Netlog´Â ¶ÇÇÑ
ÄÄÆÄÀÏ ½Ã¿¡ '$NETLOG_DIR/netwatch/monitors/lognames.h' ÆÄÀÏ¿¡ ÀûÀýÇÑ »ç¿ëÀÚ
ID¸¦ Ãß°¡ÇÏ¿©, ÀǽÉÀÌ µÇ´Â »ç¿ëÀÚ¸¦ ÁýÁßÀûÀ¸·Î ¸ð´ÏÅÍÇÒ ¼ö ÀÖ´Ù. ±âº»ÀûÀ¸·Î
lognames.h¿¡ Æ÷ÇԵǾî ÀÖ´Â »ç¿ëÀÚµé·Î´Â 'sybase, oracle, irc, bbs, anonymous,
info, ftp, guest, gopher'µîÀÌ ÀÖ´Ù.
ÀÌ·¯ÇÑ lognames.hÆÄÀÏ¿¡ Çʿ信 µû¶ó »ç¿ëÀÚµéÀ» Ãß°¡ÇÏ¿© ¸ð´ÏÅÍÇÏ¸é ±²ÀåÈ÷
À¯¿ëÇÑ ±â´ÉÀ» ¹ßÈÖÇÒ ¼ö ÀÖ´Ù. ¶ÇÇÑ, '½Ã°£, °ø°Ý ¼ºñ½º¸í, °ø°Ý½Ãµµ È£½ºÆ®,
Ÿ°Ù È£½ºÆ®, ¸í·É' µîÀ¸·Î ÀÌ·ç¾îÁø Ãâ·Â¹°À» ÀÌ¿ëÇÏ¿© ºÐ¼®·Â°ú ½Ã½ºÅÛ °ü¸®ÀÚÀÇ
ÀÚÁúÀ» ±â¸¦ ¼ö ÀÖ´Ù.
»ç¿ëÀÚ ÀÎÅÍÆäÀ̽ºÀÇ °³¼±°ú help ±â´ÉÀÇ Ãß°¡¸¦ ÅëÇÑ °³·®ÀÌ °¡´ÉÇÒ °ÍÀ¸·Î
º¸ÀδÙ. ¶ÇÇÑ netlogÆÐŰÁö¿Í ¿©·¯ °ü¸® µµ±¸¸¦ º´ÇÕÇÏ¿© ½Ã½ºÅÛ ÆÄ±«¿¡ ´ëÇÑ
Áõ°Å¸¦ Àâ¾Æ³»´Â À¯Æ¿¸®Æ¼µéÀ» ¸¸µé ¼ö ÀÖÀ» °Í °°´Ù.
II. Install netlog
-
netlog°¡ Àִ°÷
ftp://net.tamu.edu/pub/security/TAMU/netlog-1.2.tar.gz
tcplogger¿Í udplogger´Â SunOS 4.x Network Interface Tap (nit)¸¦ »ç¿ëÇϰí,
¶Ç´Â SunOS 5.x Data Link Provider Interface (DLPI)¸¦ »ç¿ëÇÑ´Ù.
compileÇϱâ(README Àо¼¼¿ä )
1) Makefile¿¡¼ SunOS 4.x ÀÎÁö SunOS 5.x (Solaris)ÀÎÁö ¼±ÅÃÇÑ´Ù.
FLAGS=-DSUNOS4 (4.x)
FLAGS=-DSOLARIS (5.x)
RANLIB=ranlib (4.x)
RANLIB=echo (5.x)
LIBS=-lsocket -lnsl (5.x)
2) make¶ó°í Ä¡¸é µÈ´Ù.
3) ÄÄÆÄÀÏÀÌ Á¦´ë·Î µÇ¾úÀ¸¸é $NETLOG_DIR/bin¿¡ tcplogger, udplogger,
netwatch, extractÀÌ ÀÖ´Ù.
4) $NETLOG_DIR/docÀÇ ¸Þ´º¾ó ÆäÀÌÁöµéÀ» /usr/man/man8 µð·ºÅ丮·Î
º¹»çÇÑ´Ù.
III. use netlog tools
netlogÆÐŰÁöÀÇ ¸ðµç ÅøµéÀº root¸¸ÀÌ »ç¿ëÇÒ ¼ö ÀÖ´Ù´Â Á¡À» ¸í½ÉÇϱâ
¹Ù¶õ´Ù.
- Netlog ÆÐŰÁö¸¦ »ç¿ëÇÏ¿© ¿ÜºÎ·ÎºÎÅÍ ÀÚ½ÅÀÇ µµ¸ÞÀÎÀ¸·ÎÀÇ Á¢¼ÓÀÌ ÀϾ
°æ¿ì 'source IP'¿Í 'destination IP'°¡ ÀÚ½ÅÀÇ µµ¸ÞÀο¡ ÇØ´çÇÏ´Â IP¸¦ °®°í
ÀÖ´Ù¸é IP spoofing attackÀ» ½Ãµµ Çϰí ÀÖ´Â °æ¿ìÀÌ´Ù. Áï, local domainÀÌ ¾Æ´Ñ
¿ÜºÎ¿¡¼ Á¢¼ÓÀ» ½ÃµµÇÒ °æ¿ì Àû¾îµµ µ¥ÀÌÅ͸¦ º¸³»´Â 'source IP'´Â °°Àº µµ¸ÞÀÎÀÌ
¾Æ´Ñ ¿ÜºÎÀÇ µµ¸ÞÀÎÀÌ µÇ¾î¾ß ÇÔ¿¡µµ ºÒ±¸Çϰí ÀÚ½ÅÀÌ ¼ÓÇÑ µµ¸ÞÀÎ IP¸¦ °®°í
ÀÖ´Ù´Â ¸»Àº ¿©Áö¾øÀÌ IP spoofing attackÀ» ½ÃµµÇϰí ÀÖ´Ù°í ¹Û¿¡ º¼ ¼ö ¾ø´Ù.
- ÀÓÀÇÀÇ µÎ È£½ºÆ®ÀÇ ·Î±×ÆÄÀÏÀ» Á¶»çÇÏ¿© ¸ÅÄ¡µÇÁö ¾Ê´Â Ä¿³Ø¼ÇÀÌ Á¸ÀçÇÑ´Ù¸é,
IP spoofingÀÇ °¡´É¼ºÀÌ »ó´çÈ÷ ¸¹´Ù´Â Áõ°ÅÀÌ´Ù. Áï, µÎ È£½ºÆ®°£ÀÇ Åë½ÅÀÌ
µÎÀýµÇ¾úÀ½À» ¶æÇÑ´Ù. IP spoofingÀ» À§ÇÏ¿© °ú´ÙÇÑ ÆÐŶÀ» º¸³»¾î µÎ È£½ºÆ®°£ÀÇ
ÀÎÁõÀÛ¾÷ÀÌ ¼Ò½ÇµÇ¾úÀ½À» ¶æÇϱ⠶§¹®¿¡ ÀǽÉÀÇ ¿©Áö°¡ ÀÖ´Ù´Â ¸»ÀÌ µÈ´Ù. (ÀÌ °æ¿ì
¹®Á¦µÉ ¼ö ÀÖ´Â ÀÌÀ¯´Â ½Ã½ºÅÛÀÇ ºÎÇϰ¡ ½ÉÇÒ °æ¿ì¿¡ ·Î±×ÆÄÀÏÀÌ ³²Áö ¤·³º°Å³ª
ÆÐŶÀ» ¹«½ÃÇÏ´Â °æ¿ì°¡ »ý±æ ¼ö Àֱ⠶§¹®¿¡ IP spoofingÀ» ´Ü¾ðÇÒ ¼ö ¾ø´Â
°ÍÀÌ´Ù.)
III-I. use netwatch
-
SYNONPSIS
netwatch [-u] [-i interface] [-f file] [-p] tcp_port_list
-
DESCRIPTION
netwatch´Â ethernet networkÀ» ½Ç½Ã°£ ¸ð´ÏÅ͸µÇÒ ¼ö ÀÖ°Ô ÇÑ´Ù.
-
OPTION
-i
TCP connectionÀÇ interface¸¦ ¼±ÅÃÇÑ´Ù. µðÆúÆ®´Â le0ÀÌ´Ù.
-f
Ãâ·ÂÇÒ ÈÀÏ À̸§À» ¼³Á¤ÇÑ´Ù. µðÆúÆ®´Â stdoutÀÌ´Ù.
-u
UDPÆÐŶÀ» üũÇÑ´Ù. À̰ÍÀº tftp, traffic, SunRPC traffic, FSP seversÀÇ
Á¢¼ÓµîÀ» üũÇÑ´Ù. ¸¸ÀÏ RPC trafficÀÌ ¸¹À»°æ¿ì¿¡´Â »ç¿ëÇÏÁö
¾Ê´Â°ÍÀÌÁÁ´Ù.
-p
non-promiscuous¸ðµå·Î ½ÇÇàÇÑ´Ù.Áï ¼ºê³ÝÀÇ ¸ðµç ÆÐŶÀ» °Ë»çÇÏÁö ¾Ê°í
ÀÚ±â È£½ºÆ®·ÎÀÇ Á¢¼Ó¸¸À» ¸ð´ÏÅ͸µÇÑ´Ù.
- Å©°Ô ¸ð´ÏÅÍÇÒ ¼ö ÀÖ´Â °ÍµéÀº ´ÙÀ½°ú °°´Ù.
¾î¶² ƯÁ¤ °èÁ¤ÀÇ login½Ãµµ¸¦ Ã¼Å©ÇØÁØ´Ù.
rsh¸í·ÉÀ» ÀÌ¿ëÇÏ¿© Ÿ°Ù È£½ºÆ®ÀÇ ¸í·ÉÀ» ¼öÇàÇÏ´Â °úÁ¤À» üũÇÑ´Ù.
smtpµå¶óÀ̹ö¸¦ ÀÌ¿ëÇÏ¿© Ÿ°Ù È£½ºÆ®ÀÇ smtpÆ÷Æ®·ÎÀÇ Á¢¼ÓÀ» üũÇÑ´Ù.
À̿ܿ¡ ¾Ë ¼ö ¾ø´Â ÇÁ·ÎÅäÄÝÀ» ÀÌ¿ëÇÑ Á¢¼ÓµéÀ» üũÇÑ´Ù.
- ¿©±â¼ 'tcp_port_list'Àμö´Â netwatchÇÁ·Î±×·¥ÀÌ Ã¼Å©ÇÒ TCP¼ºñ½ºµéÀ» ¼³Á¤ÇØ
µÎ¾î¾ßÇÑ´Ù. telnet, ftp, rlogin, rsh, smtpµîÀÇ ¼ºñ½ºµéÀ» üũÇϸç, telnet°ú
ftpÀÇ °æ¿ì Á¢¼Ó½Ãµµ È£½ºÆ®¿Í ¸ñÀû È£½ºÆ® ¸ðµÎ¿¡ °üÇÑ Á¤º¸¸¦ Á¦°øÇØ ÁØ´Ù.
(À̶§, °¢°¢ÀÇ TCP¼ºñ½ºµéÀº ÇØ´ç Æ÷Æ®¿¡ Ç×»ó ¶° ÀÖÀ¸¹Ç·Î, netwatch´Â °¢°¢ÀÇ
¼ºñ½ºµé¿¡ ÇØ´çÇÏ´Â Æ÷Æ®¸¸ ½ºÄµÇÏ°Ô µÈ´Ù. ¸ðµç Æ÷Æ®¹øÈ£¸¦ ÀÏÀÏÀÌ ¾Ë ÇÊ¿ä´Â
¾øÀ¸³ª, ÇØ´çÇÏ´Â Æ÷Æ®¸¦ Àû¾îº¸¸é ´ÙÀ½°ú °°´Ù.)
- TCP ¼ºñ½º »ç¿ëÇÏ´Â Æ÷Æ®¹øÈ£
telnet 23
smtp 25
rlogin 513
rsh 514
ftp 21
uucp 540
- rlogin
$NETLOG_DIR/netwatch/monitors/lognames.hÆÄÀÏ¿¡ ¼³Á¤µÈ »ç¿ëÀڵ鿡´ëÇÑ
rloginÁ¢¼Ó¿¡ °ü°èµÈ ÀÚ·áµéÀ» ¸ð´ÏÅÍÇÑ´Ù. °£´ÜÇÑ lognames.hÀÇ ¿¹¸¦ µé¾î º¸±â·Î
ÇÏÀÚ.
static char *names[] = {
"me", "lp", "bin", "daemon", "guest",
"demo", "sync", "uucp", "sys", "ftp",
"nobody", "news", "demos", "tutor",
"anonymous", "gopher", "netfind",
"info", "system", "user", "userp", "field",
"operator", "sybase", "oracle", "irc", "bbs",
"limx", "new", "chat", "super",
(char *)0
};
À̰÷¿¡ ÇØ´çÇÏ´Â À¯Àú¾ÆÀ̵𸦠¼³Á¤ÇÏ¸é µÈ´Ù.
- rsh ¸¶Âù°¡Áö·Î lognames.hÆÄÀÏ¿¡ ¼³Á¤µÈ »ç¿ëÀÚµéÀÇ
shellÀ» ¸®¸ðÆ®¿¡¼ »ç¿ëÇÏ·ÁÇÒ ¶§ ¸ð´ÏÅÍÇØ ÁØ´Ù. ¶ÇÇÑ 'csh -bif'¿Í °°Àº Á¢¼Óµµ
¸ð´ÏÅÍ ÇÑ´Ù.
Âü°í: rsh hostname -l userID csh -bif¸¦ ÀÌ¿ëÇÏ¿© 'tty'¸¦ »ç¿ëÇÏÁö ¾Ê°í
½Ã½ºÅÛÀ» ÀÌ¿ëÇÒ ¼ö ÀÖ°Ô µÇ¹Ç·Î, ÀÚ½ÅÀ» °¨Ãß·Á´Â Àǵµ°¡ £´Ù. ¶§¹®¿¡ ÀÌ·¯ÇÑ
»ç¿ëÀÚµéÀ» ÅëÇÏ¿© ½Ã½ºÅÛÀÌ ÆÄ±«´çÇÒ ¿ì·Á°¡ ÀÖÀ¸¹Ç·Î netlog´Â 'csh -bif'¿Í °°Àº
Æ®¿÷ Á¢¼Óµµ ¸ð´ÏÅÍ ÇØÁØ´Ù.
- ftp FTP¿¡ °ü·ÃµÈ ³×Æ®¿÷ Æ®·¡ÇÈÀ» üũÇÑ´Ù. Áï,
anonymous FTP¸¦ ÀÌ¿ëÇÑ passwdÆÄÀÏÀ̳ª .rhostsÆÄÀÏ ±×¸®°í .forwardÆÄÀÏÀÇ
Àü¼ÛµîÀ» üũÇÒ ¼ö ÀÖ´Ù.
Âü°í: ftp ¼ºñ½º¸¦ ÅëÇÏ¿© .rhosts ³ª .forward ÆÄÀÏÀ» µ¤¾î¾²°Å³ª ÇÏ´Â
µîÀÇ ÀÛ¾÷À» ÅëÇÏ¿© ½Ã½ºÅÛÀÌ ÇÇÇØ¸¦ ÀÔÀ» ¼ö ÀÖ´Ù. ¶§¹®¿¡ netlog´Â ÀÌ·¯ÇÑ ½Ãµµ¸¦
¸ð´ÏÅÍ ÇÑ´Ù. ¿¹¸¦ µé¾î, ¿ì¿¬Âú°Ô 'ftp>'ÇÁ·ÒÇÁÆ® »óÅ·Π¿¬°áµÈ Å͹̳ÎÀ»
¹ß°ßÇÏ¿´À» °æ¿ì .rhosts ÆÄÀÏÀÇ ³»¿ëÀ» '+ +'·Î µ¤¾î¾´ ÈÄ, ´ÙÀ½¿¡ ±× »ç¿ëÀÚ·Î
rlogin µîÀÇ Á¢¼ÓÀ» ÇÒ ¼ö ÀÖÀ¸¹Ç·Î ±²ÀåÈ÷ ÁÖÀÇÇØ¾ß ÇÑ´Ù. ¶ÇÇÑ, anonymous ftp
¼Â¾÷ »óÀÇ ¹®Á¦Á¡ÀÇ °æ¿ìµµ ±²ÀåÈ÷ À§ÇèÇÏ´Ù. 'anonymous ftp attack'¿¡ °üÇØ¼´Â
CERT advisoryÁß 'CA93:10. anonymous FTP activity'¸¦ ÂüÁ¶Çϱ⠹ٶõ´Ù.
- telnet ƯÁ¤ »ç¿ëÀÚ·ÎÀÇ telnetÁ¢¼ÓÀ»
¸ð´ÏÅÍÇÑ´Ù.
- smtp 'smtp'µå¶óÀ̹ö¸¦ ÀÌ¿ëÇÏ¿© wiz, kill, debug
¸í·É¿¡ °ü°èµÈ smtpÁ¢¼ÓÀ» ¸ð´ÏÅÍ ÇÑ´Ù.
Âü°í: °¡Àå vulnarableÇÑ sendmail¹ö±×¸¦ ÀÌ¿ëÇÑ Ä§ÀÔ¿¡ ¾²ÀÌ´Â ¸í·É¾îµéÀÌ
¹Ù·Î À§ÀÇ wiz, kill, debug ¸í·ÉµéÀÌ´Ù. ¶§¹®¿¡ netlog´Â ÀÌ·¯ÇÑ ½Ãµµ¸¦ ¸ð´ÏÅÍ
ÇØÁØ´Ù. sendmail¿¡ °üÇÑ µµÅ¥¸ÕÆ®¸¦ ÂüÁ¶Çϱ⠹ٶõ´Ù.
- EXAMPLE
¾Æ·¡´Â sparcs.kaist.ac.kr¿¡¼ ara.kaist.ac.kr·Î smtpÁ¢¼ÓÀ» ÇàÇÏ¿© debug¸í·ÉÀ»
¼öÇàÇÏ¿´À» °æ¿ì¸¦ º¸¿©ÁØ´Ù.
¾Æ·¡´Â sparcs¿¡¼ ½ÇÇàÇѰÍÀ» º¸¿©ÁØ´Ù.
sparcs: ~ ]$ telnet ara smtp
Trying 143.248.8.5...
Connected to ara.kaist.ac.kr.
Escape character is '^]'.
220 ara.kaist.ac.kr ESMTP Sendmail 8.9.1a/8.9.1; Sun, 31 Jan 1999 00:03:06
+0900 (KST)
debug
500 Command unrecognized: "debug" sendmail bug°¡ ÆÐÄ¡µÇ¾úÀ½À»
ÀǹÌ
quit
221 ara.kaist.ac.kr closing connection
Connection closed by foreign host.
sparcs: ~ ]$
¾Æ·¡´Â ara¿¡¼ netwatch¸¦ ÀÌ¿ëÇÏ¿© ½Ç½Ã°£ ¸ð´ÏÅ͸µÇÑ °á°ú¸¦ º¸¿¬µÐ´Ù.
# ./netwatch telnet smtp telnet, smtp¿¡ °üÇÑ ¸ð´ÏÅ͸¦ ½ÃÀÛÇÑ´Ù
Using interface le0
Added telnet
Added smtp
01/31/99 00:03:07 [smtp] sparcs.16914 ara cmd debug
¸ð´ÏÅ͸µÀÇ °á°ú´Â (¸ð´ÏÅÍµÈ ³¯Â¥,½Ã°£, Á¢¼Ó¼ºñ½º, Á¢¼ÓÀ» ½ÃµµÇÑ IP, Target
Host, »ç¿ëÇÑ ¸í·É)À¸·Î ÀÌ·ç¾î Áø´Ù.
III-II. use tcplogger
- SYNONPSIS
tcplogger [-i if] [-a|-b] [-f file]
- DESCRIPTION
tcplogger´Â ³×Æ®¿÷ÀÇ TCP connection request¸¦ log³²±â´Â
ÇÁ·Î±×·¥ÀÌ´Ù.tcplogger´Â ÇöÁ¦ SunOS 4.x/5.x ¿¡¼¸¸ ½ÇÇàµÈ´Ù.
-
OPTIONS
-i
TCP connectionÀ» ¹Þ¾ÆµéÀÌ´Â ÀÎÅÍÆäÀ̽º¸¦ ¼±ÅÃÇÒ ¼ö ÀÖ´Ù. À̰ÍÀº
±âº»ÀûÀ¸·Î ù¹øÂ°( le0 )¸¦ »ç¿ëÇÑ´Ù.
-a
ASCII·Î ·Î±×ÇÑ °á°ú¸¦ ³²±ä´Ù.
-b
extract¸¦ »ç¿ëÇÏ¿© º¼¼ö ÀÖµµ·Ï binary·Î ·Î±×¸¦ ³²±ä´Ù.
formatÇü½ÄÀº ´ÙÀ½°ú °°´Ù.
struct timeval tm; /* Time of request */
u_long ipsrcaddr; /* IP source address */
u_long ipdstaddr; /* IP destination address */
u_long tcpseqno; /* TCP sequence number */
u_short tcpsrcport;/* TCP source port */
u_short tcpdstport;/* TCP destination port */
-f
½ÇÇàÇÑ °á°ú¸¦ Ãâ·ÂÇÒ ÆÄÀÏÀ» ÁöÁ¤ÇÑ´Ù. ÆÄÀÏÀº appendingµÈ´Ù. ¸¸ÀÏ
ÁöÁ¤ÇÏÁö ¾ÊÀ¸¸é ±âº»ÀûÀ¸·Î stdoutÀ¸·Î ÁöÁ¤µÈ´Ù.
-n
hostnameÀ̳ª port nameÀ¸·Î Ãâ·ÂÇÏÁö ¾Ê°í, decimal À̳ª dotted decimal
Æ÷¸ËÀ¸·Î Ãâ·ÂÇÑ´Ù.
-p
non-promiscuous ¸ðµå·Î ½ÇÇàÇÑ´Ù. À̰ÍÀº subnetÀÇ ¸ðµç ÅÂŶÀ» ·Î±×·Î
³²±âÁö ¾Ê°í ÀÚ½ÅÀÇ È£½ºÆ®¿¡ °üÇÑ °Í¸¸ ·Î±×³²±ä´Ù.
-
BUGS
³»Æ®¿÷ÀÌ ¹Ù»Ú°Å³ª, ±â°è°¡ ´À¸®°Å³ª ÇÏ¸é ÆÐŶÀÌ µå·ÓµÉ¼öµµ ÀÖ´Ù.
-
EXAMPLE
# tcplogger -a
12/20/98 00:33:09 890F9A beast.kaist.ac.kr 1208 -> alpha.kaist.ac.kr
nntp
12/20/98 00:33:15 969E9D3 143.248.8.66 2201 -> noah.kaist.ac.kr
telnet
12/20/98 00:33:17 11C636 143.248.184.144 1083 -> ara
telnet
12/20/98 00:33:21 B29B0A2 143.248.8.67 2571 -> 203.234.207.3
80
12/20/98 00:33:26 B29C34B 143.248.8.67 2572 -> 203.234.207.3
80
12/20/98 00:33:26 B29C353 143.248.8.67 2573 -> 203.234.207.3
80
12/20/98 00:33:26 B29C436 143.248.8.67 2574 -> 203.234.207.3
80
12/20/98 00:33:28 C5C45B6A 203.116.61.132 38270 -> sparcs
80
# tcplogger -b -f tcp.log
# extract -d tcp.log
12/20/98 00:34:32 999658DC smslab.kaist.ac.kr 1022 -> ara
login
III-III. use udplogger
-
SYNONPSIS
udplogger [-i if] [-a|-b] [-f file] [-n] [-t ###] [-p]
-
DESCRIPTION
udplogger°¡ÇÏ´Â ÀÏÀº tpclogger°¡ ÇÏ´ÂÀϰú °ÅÀÇ ºñ½ÁÇÏ´Ù.
-
OPTIONS
-t udp sessionÀÌ ÀÌ·ç¾î ÁøÈÄ ¾ó¸¶°£ ¾Æ¹«·± ÆÐŶÀÌ Àü¼ÛµÇÁö ¾ÊÀ» °æ¿ì
Á¤Áö½ÃŰ´Â ÀÏÀ» ÇÑ´Ù. ±âº»ÀûÀ¸·Î 300ÃÊ·Î ¼¼ÆÃµÇ¾î ÀÖ´Ù.
³ª¸ÓÁö optionÀº tcp¿Í °ÅÀÇ µ¿ÀÏÇÏ´Ù.
-
EXAMPLE
# udplogger -a
12/20/98 00:35:32 0 ohjaeho.kaist.ac.kr 138 -> 143.248.8.255
138
12/20/98 00:35:32 0 sparcs 1031 -> cosmos.kaist.ac.kr
domain
12/20/98 00:35:32 0 sparcs domain -> ara
3210
12/20/98 00:35:32 0 sparcs 1031 -> ns
domain
12/20/98 00:35:32 0 worak.kaist.ac.kr domain -> ara
3210
12/20/98 00:35:32 0 sparcs domain -> ara
3211
12/20/98 00:35:32 0 sparcs domain -> ara
3212
12/20/98 00:35:32 0 worak.kaist.ac.kr domain -> ara
3206
12/20/98 00:35:33 0 sparcs domain -> ara
3213
12/20/98 00:35:33 0 sparcs domain -> ara
3214
12/20/98 00:35:33 0 sparcs domain -> ara
3215
12/20/98 00:35:33 0 sparcs domain -> ara
3216
12/20/98 00:35:36 0 sparcs-gw.kaist.ac.kr route -> 143.248.8.255
route
III-IV. use extract
-
SYNOPSIS
extract [ -e program ] [ -E program ] [ -f program file ] [ -F program
file ] [ -d log file ] [ -o output file ] [ -a ] [ -b ] [ -n ] [-u ]
[ -t ] [ -h]
-
DESCRIPTION
extract´Â tcplogger³ª udplogger·Î ¸¸µç binary·Î±× ÆÄÀÏÀ» Ç®¾îÁÖ´Â
ÇÁ·Î±×·¥ÀÌ´Ù.
-
OPTIONS
-e program
-E program
-f program file
-F program file
-e, -f, -E, -F¿É¼ÇÀº ¸ðµÎ´Ù ÆÄÀÏÀ» ¼±ÅÃÇÏ´Â °ÍÀÌ´Ù. -e, -f ´Â
appendedÇϰí, -E, -F´Â prependedÇÑ´Ù.
-d log file
tcplogger, udploggerÀÇ binary·Î±× ÆÄÀÏÀ» ¼±ÅÃÇÑ´Ù. ±âº»ÀûÀ¸·Î
stdinÀ¸·Î ¼¼ÆÃµÇ¾î ÀÖ´Ù.
-o output file
¾î¶»°Ô Ãâ·ÂÇÒÁö ¼±ÅÃÇÑ´Ù. stdoutÀ¸·Î ¼¼ÆÃµÇ¾î ÀÖ´Ù.
-a
¼±ÅÃµÈ ·¹Äڵ带 ASCII·Î ¾´´Ù. À̰ÍÀº µðÆúÆ®ÀÌ´Ù.
-b
¼±ÅÃµÈ ·¹Äڵ带 binary·Î ¾´´Ù. subsequent¸¦ extract·Î reprocessingÇϱâ
À§Çؼ »ç¿ëµÈ´Ù.
·¹ÄÚµåÀÇ Æ÷¸ËÇü½ÄÀº ´ÙÀ½°ú °°´Ù.
struct timeval tm; /* Time of request */
u_long ipsrcaddr; /* IP source address */
u_long ipdstaddr; /* IP destination address */
u_long tcpseqno; /* TCP sequence number */
u_short tcpsrcport;/* TCP source port */
u_short tcpdstport;/* TCP destination port */
-n
ASCII·Î Ãâ·ÂÇÒ¶§ IP address ³ª Æ÷Æ®³Ñ¹öµîÀ» ãÁö ¾Ê´Â´Ù.À̰ÍÀº ²Ï
ºü¸£´Ù.
-t
TCP ¸ðµå¿¡¼ extract°¡ ÀÛµ¿Çϵµ·Ï ÇÑ´Ù. TCP mode°¡ µðÆúÆ®ÀÌ´Ù.
-u
UDP ¸ðµå¿¡¼ extract°¡ ÀÛµ¿Çϵµ·Ï ÇÑ´Ù.
-U
input bufferingÀ» ÇÏÁö ¾Ê´Â´Ù. À̰ÍÀº tcplogger, udplogger µîÀ»
pipe¸¦ ÀÌ¿ëÇØ¼ ÀÐÀ»¼ö ÀÖ´Ù.
-h
help message¸¦ Ãâ·ÂÇÑ´Ù.
IV. link about netlog
V. Referance
- README
- netlog man page
- KUS Security Bulletin - How to Netlog, ¹Úâ¹Î
Copyright
1998 anticj SPARCS all right reserved
LastUpDated at 1999.01.31