[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[no subject]
- <!--x-content-type: text/plain -->
- <!--x-date: Tue Apr 20 07:52:15 2004 -->
- <!--x-from-r13: qpbeova ng znpughegyr.pbz (Rnivq Qbeova) -->
- <!--x-message-id: [email protected] -->
- <!--x-reference: [email protected] -->
- <!--x-reference: [email protected] -->
- <!--x-reference: [email protected] --> "http://www.w3.org/TR/html4/loose.dtd">
- <!--x-subject: [ale] diagnosis -->
- <li><em>date</em>: Tue Apr 20 07:52:15 2004</li>
- <li><em>from</em>: dcorbin at machturtle.com (David Corbin)</li>
- <li><em>in-reply-to</em>: <<a href="msg00784.html">[email protected]</a>></li>
- <li><em>references</em>: <<a href="msg00645.html">[email protected]</a>> <<a href="msg00782.html">[email protected]</a>> <<a href="msg00784.html">[email protected]</a>></li>
- <li><em>subject</em>: [ale] diagnosis</li>
On Monday 19 April 2004 20:35, James P. Kinney III wrote:
> I put up a page with the binaries and source on it :
>
> <a rel="nofollow" href="http://www.localnetsolutions.com/tools/">http://www.localnetsolutions.com/tools/</a>
>
> Note: the procps page on sourceforge did not have an md5 checksum.
>
> On Mon, 2004-04-19 at 20:02, David Corbin wrote:
> > On Monday 19 April 2004 15:01, James P. Kinney III wrote:
> > > If it is a cracked machine, running a statically linked top from a CD
> > > will gain access to the real top data. Top is a common binary to fiddle
> > > with with a root kit.
> >
> > Sounds reasonable. Can you point me at such, or if not that, anybody got
> > any idea where the source to top is and I'll build my own.
> >
> > > It is certainly possible to _add_ a module or _remove_ a module, but
> > > change out the kernel with out a reboot (unless 2-kernel-monte is
> > > available, I have not been able to find this :( ). So the actual data
> > > stream for top is not tamper-able easily. Thus a known good
> > > statically-linked top would give access to the running system and show
> > > the _real_ processes that are running.
> > >
> > > If top shows no malicious files, it's time to take some snapshots over
> > > time to plot which app is failing.
> > >
> > > #!/bin/sh
> > > echo date >> /tmp/top.txt
> > > top -b -n 1 -c >> /tmp/top.txt
> > > echo "###############" >>/tmp/top.txt
> > > echo >>/tmp/top.txt
> > > echo >>/tmp/top.txt
> > >
> > > Run as a cron every minute for an hour.
> > >
> > > If you want, you can now mash/mangle the data into a nice plot using
> > > some perl and gnplot (or a spreadsheet).
> > >
> > > On Mon, 2004-04-19 at 11:56, Geoffrey wrote:
> > > > Dow Hurst wrote:
> > > > > How can we find the process that is soaking the memory? How do you
> > > > > manipulate /proc to find out the originating process that owns the
> > > > > memory being used? I know IRIX had tools to look at memory and see
> > > > > which processes owned what part of memory. Does Linux?
> > > > >
> > > > > Seems if you knew what was leaking you would have a major part of
> > > > > the battle won.
> > > >
> > > > I believe we mentioned top, but he noted that doesn't give him
> > > > anything. That's what concerns me. If it doesn't show, is it being
> > > > hidden for a reason???
</pre>
<!--X-Body-of-Message-End-->
<!--X-MsgBody-End-->
<!--X-Follow-Ups-->
<hr>
<!--X-Follow-Ups-End-->
<!--X-References-->
<ul><li><strong>References</strong>:
<ul>
<li><strong><a name="00645" href="msg00645.html">[ale] diagnosis</a></strong>
<ul><li><em>From:</em> dcorbin at machturtle.com (David Corbin)</li></ul></li>
<li><strong><a name="00782" href="msg00782.html">[ale] diagnosis</a></strong>
<ul><li><em>From:</em> dcorbin at machturtle.com (David Corbin)</li></ul></li>
<li><strong><a name="00784" href="msg00784.html">[ale] diagnosis</a></strong>
<ul><li><em>From:</em> jkinney at localnetsolutions.com (James P. Kinney III)</li></ul></li>
</ul></li></ul>
<!--X-References-End-->
<!--X-BotPNI-->
<ul>
<li>Prev by Date:
<strong><a href="msg00810.html">[ale] ipv6 dns requests???</a></strong>
</li>
<li>Next by Date:
<strong><a href="msg00812.html">[ale] Linux Cluster Server Room</a></strong>
</li>
<li>Previous by thread:
<strong><a href="msg00784.html">[ale] diagnosis</a></strong>
</li>
<li>Next by thread:
<strong><a href="msg01037.html">[ale] diagnosis</a></strong>
</li>
<li>Index(es):
<ul>
<li><a href="maillist.html#00811"><strong>Date</strong></a></li>
<li><a href="threads.html#00811"><strong>Thread</strong></a></li>
</ul>
</li>
</ul>
<!--X-BotPNI-End-->
<!--X-User-Footer-->
<!--X-User-Footer-End-->
</body>
</html>