, relay=local, delay=0, status=sent ("|/usr/bin/procmail")
epylog/ChangeLog 0000644 0001750 0001750 00000005735 12527655413 013143 0 ustar tiago tiago Epylog-1.0.7
* Re-apply a fix to not return an error with a 0-length log file.
* Remove unmaintained spec file.
Epylog-1.0.6
* Back out the unfinished work to support timestamped rotation
(will be implemented fully in 1.1). Fixes the cron-run problem
in 1.0.5.
Epylog-1.0.5
* Add systemd-logind support
* Add support for GPG encrypting and signing email reports.
Epylog-1.0.4
* Be more lenient about syslog format (FC7 changes) (ticket #4)
* Add a "save_rawlogs" option to file publisher, and don't save them
by default, since that's a tad too paranoid (via Seth Vidal) (ticket #2)
Epylog-1.0.3
* Preparing for the submission to Fedora Extras
* Ignore "su" performed by crond to cut down on noise
* Add a few extra ignore rules for newer OSes
* Require python-abi instead of python. NOTE: This will not
work on systems with python-2.2 (el3), so change the specfile
to Require /usr/bin/python%(%{__python} -c....) or just use my
packages.
Epylog-1.0.2
* Small modification to collapse login reports
* Fix monthmap on python-2.4
Epylog-1.0.1
* Tiny fixes with Cyrus handling routines in logins, which made them
not work.
* Automatically detect python version during .spec building.
* Cleaned up trojans.list so it's less ugly
Epylog-1.0
* Out with 1.0 already!
* Handle ::ffff: fake ipv6 addresses for hostname resolution
* Do not depend on elinks in RPM.
* Default setting is to send html-only (so we don't depend on lynx)
* Packets module can now sort by port, system, and source.
Epylog-0.9.7
* Accepted Makefile patches from Will Newton
* Accepted patches for missing logs from Will Newton (#135)
* Fixes for bugs/RFEs: #136, #146, #148, #210, and others.
* Riabitsev->Ryabitsev. Sigh.
Epylog-0.9.6
* Small bugfix in repeated line lookup routines
* Switched xml handling code from pyxml to libxml2
* Added pam_krb5 handling for logins module
* Added dovecot imap handling
* Added courier imap handling
* Only load our mytempfile if mkdtemp not available (python < 2.3)
Epylog-0.9.5
* Fix for quasi-bug #6 (docstrings added)
* Fix for bug #57
* Fix for bug #53
* Cron mode of operation added -- checks for a lockfile (bug #79)
Epylog-0.9.4
* Fix for bug #38 (incorrect offsets were causing backtrace)
* Normalized logger calls (bug #9)
* Enhancements to mail and packets modules
Epylog-0.9.3
* Autoconf now used to configure and build epylog.
* Mail module now supports qmail.
* Additions to weed_dist rules
* Perl module removed into a separate RPM package.
Epylog-0.9.2
* Notices module reworked to support custom notifications.
* Weeder module now supports 'ALL' for enable
* Some changes to epylog core to return matched regex as part of
linemap.
Epylog-0.9.1
* Bugfixes for errors/warnings found by pychecker.
* Added doc/INSTALL for those installing not from RPM.
Epylog-0.9.0
* Killing old DULog-related changelog settings
* Support for internal modules
* Threading support
* Rewrite of all modules in python
* File Publisher support
epylog/etc/ 0000755 0001750 0001750 00000000000 12527655413 012132 5 ustar tiago tiago epylog/etc/report_template.html 0000644 0001750 0001750 00000001131 12527655413 016222 0 ustar tiago tiago
@@TITLE@@
@@HOSTNAME@@
First event: @@STARTTIME@@
Last event: @@ENDTIME@@
@@MODULE_REPORTS@@
Unparsed Strings:
@@UNPARSED_STRINGS@@
Brought to you by
@@VERSION@@
epylog/etc/modules.d/ 0000755 0001750 0001750 00000000000 12527655413 014024 5 ustar tiago tiago epylog/etc/modules.d/logins.conf.in 0000644 0001750 0001750 00000002327 12527655413 016577 0 ustar tiago tiago [module]
desc = Logins
exec = %%MODULES_DIR%%/logins_mod.py
files = /var/log/messages[.#], /var/log/secure[.#]
enabled = yes
internal = yes
outhtml = yes
priority = 0
[conf]
##
# Only enable things useful for your configuration to speed things
# up. The more stuff you enable, the slower matching will be.
#
enable_pam = 1
enable_xinetd = 1
enable_sshd = 1
enable_uw_imap = 0
enable_dovecot = 0
enable_courier = 0
enable_imp = 0
enable_proftpd = 0
##
# This is a fun setting. You can list domains that are "safe" here.
# E.g. if your org's domain is example.com and you generally don't
# expect logins from hosts in example.com domain to be suspicious, you
# can add "example.com$" as a safe domain. This way anyone logging in from
# a remote host not matching *.example.com will be flagged in red and the
# full hostname of the connecting machine will be printed in the report.
# List multiple values separated by comma.
# E.g.: safe_domains = example.com$, foo.edu$
# The default is .*, meaning all domains are considered safe. To turn
# this off specify something like:
# safe_domains = !.*
safe_domains = .*
##
# If you have too many systems, wide-scale probing may turn ugly. This
# will collapse the reports.
systems_collapse = 10
epylog/etc/modules.d/spamd.conf.in 0000644 0001750 0001750 00000001377 12527655413 016414 0 ustar tiago tiago [module]
desc = Spamassassin
exec = %%MODULES_DIR%%/spamd_mod.py
files = /var/log/maillog[.#]
enabled = no
internal = yes
outhtml = yes
priority = 7
[conf]
##
# Report this many "top ranking users"
#
report_top = 10
##
# Consider this the spam threshold when reporting the scores.
# Anything above this will be flagged as spam. The last column shows
# the score and then non-spam/spam in the parenthesis. E.g.:
# -1.3 (10/3) -- the mean score is -1.3, 10 messages under spam_threshold,
# and 3 messages over it.
#
spam_threshold = 5
##
# Rank the top users according to this parameter. Valid entries are:
# "most spammed" -- sorts by users with the topmost score
# "most messages" -- sorts by users who received most messages
#
sort_by = most spammed
epylog/etc/modules.d/Makefile.in 0000644 0001750 0001750 00000003002 12527655413 016064 0 ustar tiago tiago top_srcdir = @top_srcdir@
srcdir = @top_srcdir@
prefix = @prefix@
exec_prefix = @exec_prefix@
sbindir = @sbindir@
datadir = @datadir@
sysconfdir = @sysconfdir@
localstatedir = @localstatedir@
libdir = @libdir@
mandir = @mandir@
pkgdocdir = $(datadir)/doc/@PACKAGE@-@VERSION@
pkgdatadir = $(datadir)/@PACKAGE@
pkgvardir = $(localstatedir)/lib/@PACKAGE@
pkgconfdir = $(sysconfdir)/@PACKAGE@
PACKAGE = @PACKAGE@
VERSION = @VERSION@
INSTALL = @INSTALL@
INSTALL_PROGRAM = @INSTALL_PROGRAM@
INSTALL_DATA = @INSTALL_DATA@
INSTALL_SCRIPT = @INSTALL_SCRIPT@
COMPILEDIR_SCRIPT = $(top_srcdir)/compiledir
CRON_DIR = @CRON_DIR@
TEMP_DIR = @TEMP_DIR@
PY_MODULE_DIR = @PY_MODULE_DIR@
PERL_MODULE_DIR = @PERL_MODULE_DIR@
MODULES_DIR = $(pkgdatadir)/modules
LYNX_BIN = @LYNX_BIN@
INSTALLDIRS = $(pkgconfdir)/modules.d
MCONFS = mail packets weeder logins notices spamd
all: all-stamp
all-stamp:
for MCONF in $(MCONFS); do \
sed -e 's|%%pkgconfdir%%|$(pkgconfdir)|g; s|%%MODULES_DIR%%|$(MODULES_DIR)|g' $$MCONF.conf.in > $$MCONF.conf; \
done
touch all-stamp
install: all installdirs
for MCONF in $(MCONFS); do \
$(INSTALL_DATA) $$MCONF.conf $(DESTDIR)$(pkgconfdir)/modules.d/; \
done
uninstall:
for MCONF in $(MCONFS); do \
$(RM) $(pkgconfdir)/modules.d/$$MCONF.conf; \
done
rmdir $(pkgconfdir)/modules.d
clean:
for MCONF in $(MCONFS); do \
$(RM) $$MCONF.conf; \
done
$(RM) all-stamp
distclean: clean
$(RM) Makefile
installdirs:
for dir in $(INSTALLDIRS); do \
$(top_srcdir)/mkinstalldirs $(DESTDIR)/$$dir ; \
done
epylog/etc/modules.d/weeder.conf.in 0000644 0001750 0001750 00000001542 12527655413 016555 0 ustar tiago tiago [module]
desc = Weedeater
exec = %%MODULES_DIR%%/weeder_mod.py
files = /var/log/messages[.#], /var/log/secure[.#], /var/log/maillog[.#]
enabled = yes
internal = yes
outhtml = yes
priority = 10
[conf]
##
# Where to look for a weed_dist.cf file.
#
weed_dist = %%pkgconfdir%%/weed_dist.cf
##
# Where to look for a weed_local.cf file
#
weed_local = %%pkgconfdir%%/weed_local.cf
##
# This is where it gets interesting.
# If you look into weed_dist.cf, you will notice that the entries
# are listed by section titles. List here only the sections that are
# relevant to your setup to speed things up. The more sections you
# enable, the slower matching will go, as it has to try more
# regexes. Note that [ADD] and [REMOVE] sections in weed_local are
# special, any other sections in that file will be ignored.
#
# You can use 'ALL' to enable all sections.
#
enable = ALL
epylog/etc/modules.d/notices.conf.in 0000644 0001750 0001750 00000001323 12527655413 016743 0 ustar tiago tiago [module]
desc = Notices
exec = %%MODULES_DIR%%/notices_mod.py
files = /var/log/messages[.#], /var/log/secure[.#], /var/log/maillog[.#]
enabled = yes
internal = yes
outhtml = yes
priority = 7
[conf]
##
# Where is your notice_dist.xml file?
#
notice_dist = %%pkgconfdir%%/notice_dist.xml
##
# Add your own notices into notice_local.xml, not into notice_dist.xml!
# This way you don't risk missing future revisions to notice_dist.xml
#
notice_local = %%pkgconfdir%%/notice_local.xml
##
# You can list the ids of members from notice_dist.xml here
# namely, or you can use ALL to enable all of them. There is no need
# to add members from notice_local.xml here -- they will be enabled
# automatically.
#
enable = ALL
epylog/etc/modules.d/packets.conf.in 0000644 0001750 0001750 00000001347 12527655413 016737 0 ustar tiago tiago [module]
desc = Packet Filter
exec = %%MODULES_DIR%%/packets_mod.py
files = /var/log/messages[.#]
enabled = yes
internal = yes
outhtml = yes
priority = 1
[conf]
##
# Where to look for the trojans list.
#
trojan_list = %%pkgconfdir%%/trojans.list
##
# If a remote host hits this many systems, then don't list them namely,
# but collapse them into a nice report, e.g.: [50 hosts]
#
systems_collapse = 5
##
# Useful for massive portscans. Don't list all the ports namely, but
# present them in a collapsed view. E.g.: [50 ports]
ports_collapse = 5
##
# Enable iptables, ipchains, ipfilter, or all three.
#
enable_iptables = 1
enable_ipchains = 1
enable_ipfilter = 0
##
# Sort by any of the following: packets, source, system, port
#
sortby=port
epylog/etc/modules.d/mail.conf.in 0000644 0001750 0001750 00000000477 12527655413 016232 0 ustar tiago tiago [module]
desc = Mail Report
exec = %%MODULES_DIR%%/mail_mod.py
files = /var/log/maillog[.#]
enabled = yes
internal = yes
outhtml = yes
priority = 5
[conf]
##
# Enable sendmail, postfix, or both
#
enable_sendmail = 1
enable_postfix = 1
enable_qmail = 0
##
# Report at most this many "top things"
#
top_report_limit = 5
epylog/etc/weed_local.cf 0000644 0001750 0001750 00000000211 12527655413 014534 0 ustar tiago tiago [ADD]
##
# Here is where you add your own rules
#
[REMOVE]
##
# Here is where you put the rules (VERBATIM) from the weed_dist.cf file
#
epylog/etc/epylog.conf.in 0000644 0001750 0001750 00000002255 12527655413 014711 0 ustar tiago tiago ##
# Main Epylog configuration file. See epylog.conf(5) for more info.
#
[main]
cfgdir = %%pkgconfdir%%
tmpdir = %%TEMP_DIR%%
vardir = %%pkgvardir%%
[report]
title = @@HOSTNAME@@ system events: @@LOCALTIME@@
template = %%pkgconfdir%%/report_template.html
include_unparsed = yes
publishers = mail
[mail]
method = mail
smtpserv = /usr/sbin/sendmail -t
mailto = root
format = html
lynx = %%LYNX_BIN%%
include_rawlogs = no
rawlogs_limit = 200
##
# GPG encryption requires pygpgme installed
#
gpg_encrypt = no
# If gpg_keyringdir is omitted, we'll use the default ~/.gnupg for the
# user running epylog (/root/.gnupg, usually).
#gpg_keyringdir = %%pkgconfdir%%/gpg/
# List key ids, can be emails or fingerprints. If omitted, we'll
# encrypt to all keys found in the pubring.
#gpg_recipients = admin1@example.com, admin2@example.com
# List key ids that we should use to sign the report.
# If omitted, the report will not be signed, only encrypted.
#gpg_signers = epylog@logserv.example.com
[file]
method = file
path = /var/www/html/epylog
dirmask = %Y-%b-%d_%a
filemask = %H%M
save_rawlogs = no
expire_in = 7
notify = root@localhost
smtpserv = /usr/sbin/sendmail -t
pubroot = http://localhost/epylog
epylog/etc/Makefile.in 0000644 0001750 0001750 00000003626 12527655413 014206 0 ustar tiago tiago top_srcdir = @top_srcdir@
srcdir = @top_srcdir@
prefix = @prefix@
exec_prefix = @exec_prefix@
sbindir = @sbindir@
datadir = @datadir@
sysconfdir = @sysconfdir@
localstatedir = @localstatedir@
libdir = @libdir@
mandir = @mandir@
pkgdocdir = $(datadir)/doc/@PACKAGE@-@VERSION@
pkgdatadir = $(datadir)/@PACKAGE@
pkgvardir = $(localstatedir)/lib/@PACKAGE@
pkgconfdir = $(sysconfdir)/@PACKAGE@
PACKAGE = @PACKAGE@
VERSION = @VERSION@
INSTALL = @INSTALL@
INSTALL_PROGRAM = @INSTALL_PROGRAM@
INSTALL_DATA = @INSTALL_DATA@
INSTALL_SCRIPT = @INSTALL_SCRIPT@
COMPILEDIR_SCRIPT = $(top_srcdir)/compiledir
CRON_DIR = @CRON_DIR@
TEMP_DIR = @TEMP_DIR@
PY_MODULE_DIR = @PY_MODULE_DIR@
PERL_MODULE_DIR = @PERL_MODULE_DIR@
MODULES_DIR = $(pkgdatadir)/modules
LYNX_BIN = @LYNX_BIN@
SUBDIRS = modules.d
INSTALLDIRS = $(pkgconfdir)
CFGFILES = epylog.conf notice_dist.xml notice_local.xml report_template.html \
trojans.list weed_dist.cf weed_local.cf
all: all-stamp
all-stamp:
for subdir in $(SUBDIRS) ; do \
$(MAKE) -C $$subdir all ; \
done
sed -e 's|%%pkgconfdir%%|$(pkgconfdir)|g; s|%%TEMP_DIR%%|$(TEMP_DIR)|g; s|%%pkgvardir%%|$(pkgvardir)|g; s|%%LYNX_BIN%%|$(LYNX_BIN)|g' \
epylog.conf.in > epylog.conf
touch all-stamp
install: all installdirs
for CFGFILE in $(CFGFILES); do \
$(INSTALL_DATA) $$CFGFILE $(DESTDIR)$(pkgconfdir)/$$CFGFILE; \
done
for subdir in $(SUBDIRS) ; do \
$(MAKE) -C $$subdir install ; \
done
uninstall:
for subdir in $(SUBDIRS) ; do \
$(MAKE) -C $$subdir uninstall ; \
done
for CFGFILE in $(CFGFILES); do \
$(RM) $(pkgconfdir)/$$CFGFILE; \
done
rmdir $(pkgconfdir)
clean:
$(RM) epylog.conf
for subdir in $(SUBDIRS) ; do \
$(MAKE) -C $$subdir clean ; \
done
$(RM) all-stamp
distclean: clean
$(RM) Makefile
for subdir in $(SUBDIRS) ; do \
$(MAKE) -C $$subdir distclean ; \
done
installdirs:
for dir in $(INSTALLDIRS); do \
$(top_srcdir)/mkinstalldirs $(DESTDIR)/$$dir ; \
done
epylog/etc/notice_local.xml 0000644 0001750 0001750 00000000776 12527655413 015321 0 ustar tiago tiago
epylog/etc/weed_dist.cf 0000644 0001750 0001750 00000010361 12527655413 014414 0 ustar tiago tiago ##
# NOTE:
# Editing this file is not recommended. If you do, you might miss newer
# revisions of this list in the future versions.
# See weed_local.cf for instructions on how to add or delete rules.
#
[pam]
\(pam_unix\).*: session closed for
\(pam_unix\).*: check pass;
[dhcpd]
dhcpd: DHCPREQUEST
dhcpd: DHCPACK
dhcpd: DHCPDISCOVER
dhcpd: DHCPOFFER
dhcpd: DHCPRELEASE
dhcpd: DHCPINFORM
[rpc]
rpc.mountd: authenticated mount request from
rpc.mountd: authenticated unmount request
rpc.statd.*: Version .* Starting
rpc.statd.*: Caught signal 15, un-registering and exiting
[automount]
automount.*: expired
automount.*: attempting to mount entry
automount.*: lookup\(file\): .* failed
automount.*: starting automounter
automount.*: using kernel protocol
automount.*: shutting down
automount.*: .* No such key in map
[crond]
CROND.*: \(mailman\) CMD \(/usr/bin/python
CROND.*: \(root\) CMD \(.*/sbin/rmmod -as\)
CROND.*: \(root\) CMD \(/usr/lib/sa/sa\d
CROND.*: \(root\) CMD \(run-parts
anacron.*: Updated timestamp for job
[bind]
named.*: lame server resolving
named.*: .* NS points to CNAME
named.*: Response from unexpected source
named.*: .* All possible A RR's lame
named.*: bad referral
named.*: Cleaned cache
named.*: USAGE
named.*: NSTATS
named.*: XSTATS
named.*: .* points to a CNAME
named.*: denied update from
named.*: .* Bogus LOOPBACK
[gnome]
gnome-name-server.*: input condition is:
gnome-name-server.*: name server starting
gnome-name-server.*: starting
gnome-name-server.*: name server was running
gconfd.*: Resolved address
gconfd.*: GConf server is not in use
gconfd.*: Exiting
gconfd.*: starting
gconfd.*: .* shutting down cleanly
gdm.*: Couldn't authenticate user
xscreensaver.*: FAILED LOGIN
[sshd]
sshd.*: Generating new .* key.
sshd.*: .* key generation complete
sshd.*: Connection closed
sshd.*: Could not reverse map address
sshd.*: Received disconnect from
sshd.*: error: Could not get shadow information for
sshd.*: Invalid user .* from
[xinetd]
xinetd.*: .* Transport endpoint is not connected
xinetd.*: EXIT:
[uw-imap]
imapd.*: AUTHENTICATE
imapd.*: Logout
imapd.*: Killed
imapd.*: imap.*service init
imapd.*: Command stream end of file
imapd.*: Autologout
imapd.*: Connection reset by peer
ipop3d.*: AUTHENTICATE
ipop3d.*: Logout
ipop3d.*: Killed
ipop3d.*: Autologout
ipop3d.*: pop3.*service init
[courier-imap]
imapd.*: Connection, ip=\[\S+\]
imapd.*: LOGOUT, user=\S+, ip=\[\S+\]
imapd.*: Disconnected, ip=\[\S+\]
imapd.*: DISCONNECTED, user=\S+, ip=\[\S+\]
imapd.*: LOGOUT, ip=\[\S+\]
pop3d.*: Connection, ip=\[\S+\]
pop3d.*: LOGOUT, user=\S+, ip=\[\S+\]
pop3d.*: Disconnected, ip=\[\S+\]
pop3d.*: DISCONNECTED, user=\S+, ip=\[\S+\]
pop3d.*: LOGOUT, ip=\[\S+\]
[postfix]
postfix/smtp\[\d+\]: connect to
postfix/smtp\[\d+\]: warning: no MX host
postfix/smtp\[\d+\]: warning: numeric domain name in resource data
postfix/smtp\[\d+\]: warning: host .* with my own hostname
postfix/smtpd.*: connect from
postfix/smtpd.*: disconnect from
postfix/smtpd.*: TLS connection established
postfix/smtpd.*: lost connection
postfix/cleanup
postfix/pickup
[sendmail]
sendmail\[.*:.*NOQUEUE: Null connection from
sendmail\[.*:.*timeout waiting for input
[qmail]
qmail:.* new msg
qmail:.* end msg
qmail:.* status:
[spamd]
spamd\[.*: info:
spamd\[.*: processing message
spamd\[.*: checking message
spamd\[.*: connection from
spamd\[.*: Creating default_prefs
[printer]
printer: ready to print
printer: status change
printer: printing
printer: peripheral low-power state
[pumpd]
pumpd.*: renewed lease for interface
pumpd.*: configured interface
[afpd]
afpd.*: ASIP session:
afpd.*: afp_flushfork:
afpd.*: .*B read,.*B written
[ntpd]
ntpd.*: kernel time discipline status change
[kernel]
kernel: application .* uses obsolete OSS audio interface
kernel: SELinux: initialized
kernel: device .* left promiscuous mode
kernel: .*: disabled promiscuous mode
usb-uhci.c: interrupt, status
PCI: Found IRQ
PCI: Sharing IRQ
PCI: Setting latency timer
kernel: agpgart: Found
kernel: agpgart: Putting
[misc]
modprobe: Can't locate module
logger: punching nameserver .* through the firewall
HORDE\[\S*\s*\[imp\] Logout
LOGIN ON tty.
dhclient: DHCPREQUEST
dhclient: DHCPACK
dhclient: DHCPDISCOVER
dhclient: bound to
dbus: avc: .* buckets used
[systemd]
systemd-logind\[\d+\]: Removed session \d+\.
## $Revision$ ##
epylog/etc/trojans.list 0000644 0001750 0001750 00000020232 12527655413 014506 0 ustar tiago tiago 1/udp Sockets des Troie
2/tcp Death
30/tcp Agent 40421
31/tcp Agent 31
41/tcp Deep Throat
48/tcp DRAT
58/tcp DMSetup
59/tcp DMSetup
79/tcp CDK
81/tcp RemoConChubo
99/tcp Hidden Port
121/tcp Attack Bot
133/tcp Farnaz
142/tcp NetTaxi
146/tcp Infector
146/udp Infector
170/tcp A-trojan
334/tcp Backage
411/tcp Backage
420/tcp Breach
421/tcp TCP Wrappers trojan
455/tcp Fatal Connections
456/tcp Hackers Paradise
513/tcp Grlogin
514/tcp RPC Backdoor
531/tcp Net666, Rasmin
555/tcp Seven-Eleven
605/tcp Secret Service
666/tcp The Ripperz
667/tcp SniperNet
669/tcp DP trojan
692/tcp GayOL
777/tcp AimSpy
808/tcp WinHole
911/tcp Dark Shadow
999/tcp Deep Throat
1000/tcp Der Spaeher
1001/tcp Der Spaeher
1010/tcp Doly Trojan
1011/tcp Doly Trojan
1012/tcp Doly Trojan
1015/tcp Doly Trojan
1016/tcp Doly Trojan
1020/tcp Vampire
1024/tcp NetSpy
1025/tcp Remote Storm
1025/udp Remote Storm
1035/tcp Multidropper
1042/tcp BLA trojan
1045/tcp Rasmin
1049/tcp /sbin/initd
1050/tcp MiniCommand
1053/tcp The Thief
1054/tcp AckCmd
1080/tcp WinHole
1081/tcp WinHole
1082/tcp WinHole
1083/tcp WinHole
1090/tcp Xtreme
1095/tcp RAT
1097/tcp RAT
1098/tcp RAT
1099/tcp RAT
1150/tcp Orion
1151/tcp Orion
1170/tcp PSS
1200/udp NoBackO
1201/udp NoBackO
1207/tcp SoftWAR
1208/tcp Infector
1212/tcp Kaos
1234/tcp SubSeven
1243/tcp BackDoor-G
1245/tcp VooDoo Doll
1255/tcp Scarab
1256/tcp Project nEXT
1269/tcp Matrix
1272/tcp The Matrix
1313/tcp NETrojan
1338/tcp Millenium Worm
1349/tcp Bo dll
1394/tcp GoFriller
1441/tcp Remote Storm
1492/tcp FTP99CMP
1524/tcp Trinoo
1568/tcp Remote Hack
1600/tcp Shivka-Burka
1703/tcp Exploiter
1777/tcp Scarab
1807/tcp SpySender
1966/tcp Fake FTP
1967/tcp WM FTP Server
1969/tcp OpC BO
1981/tcp Bowl, Shockrave
1999/tcp SubSeven
2000/tcp Der Spaeher
2001/tcp Der Späher
2023/tcp Ripper Pro
2080/tcp WinHole
2115/tcp Bugs
2130/udp Mini Backlash
2140/tcp The Invasor
2140/udp Deep Throat
2155/tcp Illusion Mailer
2255/tcp Nirvana
2283/tcp Hvl RAT
2300/tcp Xplorer
2311/tcp Studio 54
2330/tcp Contact
2331/tcp Contact
2332/tcp Contact
2333/tcp Contact
2334/tcp Contact
2335/tcp Contact
2336/tcp Contact
2337/tcp Contact
2338/tcp Contact
2339/tcp Contact
2339/udp Voice Spy
2345/tcp Doly Trojan
2565/tcp Striker trojan
2583/tcp WinCrash
2600/tcp Digital RootBeer
2716/tcp The Prayer
2773/tcp SubSeven
2774/tcp SubSeven
2801/tcp Phineas Phucker
2989/udp RAT
3000/tcp Remote Shut
3024/tcp WinCrash
3031/tcp Microspy
3128/tcp Ringzero
3129/tcp Masters Paradise
3150/tcp The Invasor
3150/udp Deep Throat
3456/tcp Terror trojan
3459/tcp Eclipse 2000
3700/tcp Portal of Doom
3777/tcp PsychWard
3791/tcp Total Solar Eclypse
3801/tcp Total Solar Eclypse
4000/tcp SkyDance
4092/tcp WinCrash
4242/tcp VHM
4321/tcp BoBo
4444/tcp Prosiak
4567/tcp File Nail
4590/tcp ICQ Trojan
4950/tcp ICQ Trogen (Lm)
5000/tcp Back Door Setup
5001/tcp Back Door Setup
5002/tcp cd00r
5010/tcp Solo
5011/tcp OOTLT
5025/tcp WM Remote KeyLogger
5031/tcp Net Metropolitan
5032/tcp Net Metropolitan
5321/tcp Firehotcker
5333/tcp Backage
5343/tcp wCrat
5400/tcp Back Construction
5401/tcp Back Construction
5402/tcp Back Construction
5512/tcp Illusion Mailer
5534/tcp The Flu
5550/tcp Xtcp
5555/tcp ServeMe
5556/tcp BO Facil
5557/tcp BO Facil
5569/tcp Robo-Hack
5637/tcp PC Crasher
5638/tcp PC Crasher
5742/tcp WinCrash
5760/tcp Portmap Remote Root Linux Exploit
5880/tcp Y3K RAT
5882/tcp Y3K RAT
5882/udp Y3K RAT
5888/tcp Y3K RAT
5888/udp Y3K RAT
5889/tcp Y3K RAT
6000/tcp The Thing
6006/tcp Bad Blood
6272/tcp Secret Service
6400/tcp The Thing
6661/tcp TEMan
6666/tcp Dark Connection Inside
6667/tcp Dark FTP
6669/tcp Host Control, Vampire
6670/tcp BackWeb Server
6711/tcp BackDoor-G
6712/tcp Funny trojan
6713/tcp SubSeven
6723/tcp Mstream
6771/tcp Deep Throat
6776/tcp 2000 Cracks
6838/udp Mstream
6883/tcp Delta Source DarkStar (??)
6912/tcp Shit Heep
6939/tcp Indoctrination
6969/tcp GateCrasher
6970/tcp GateCrasher
7000/tcp Exploit Translation Server
7001/tcp Freak88
7215/tcp SubSeven
7300/tcp NetMonitor
7301/tcp NetMonitor
7306/tcp NetMonitor
7307/tcp NetMonitor
7308/tcp NetMonitor
7424/tcp Host Control
7424/udp Host Control
7597/tcp Qaz
7626/tcp Glacier
7777/tcp God Message, Tini
7789/tcp Back Door Setup, ICKiller
7891/tcp The ReVeNgEr
7983/tcp Mstream
8080/tcp Brown Orifice
8787/tcp Back Orifice 2000
8988/tcp BacHack
8989/tcp Rcon
9000/tcp Netministrator
9325/udp Mstream
9400/tcp InCommand
9872/tcp Portal of Doom
9873/tcp Portal of Doom
9874/tcp Portal of Doom
9875/tcp Portal of Doom
9876/tcp Cyber Attacker, Rux
9878/tcp TransScout
9989/tcp Ini-Killer
9999/tcp The Prayer
10000/tcp OpwinTRojan
10005/tcp OpwinTRojan
10067/udp Portal of Doom
10085/tcp Syphillis
10086/tcp Syphillis
10100/tcp Control Total
10101/tcp BrainSpy
10167/udp Portal of Doom
10520/tcp Acid Shivers
10528/tcp Host Control
10607/tcp Coma
10666/udp Ambush
11000/tcp Senna Spy Trojan Generator
11050/tcp Host Control
11051/tcp Host Control
11223/tcp Progenic trojan
12076/tcp Gjamer
12223/tcp Hack-99 KeyLogger
12345/tcp Ashley
12346/tcp Fat Bitch
12349/tcp BioNet
12361/tcp Whack-a-mole
12362/tcp Whack-a-mole
12363/tcp Whack-a-mole
12623/udp DUN Control
12624/tcp ButtMan
12631/tcp Whack Job
12754/tcp Mstream
13000/tcp Senna Spy
13010/tcp Hacker Brasil - HBR
13013/tcp PsychWard
13014/tcp PsychWard
13223/tcp Hack´99 KeyLogger
13473/tcp Chupacabra
14500/tcp PC Invader
14501/tcp PC Invader
14502/tcp PC Invader
14503/tcp PC Invader
15000/tcp NetDemon
15092/tcp Host Control
15104/tcp Mstream
15382/tcp SubZero
15858/tcp CDK
16484/tcp Mosucker
16660/tcp Stacheldraht
16772/tcp ICQ Revenge
16959/tcp SubSeven
16969/tcp Priority
17166/tcp Mosaic
17300/tcp Kuang2 the virus
17449/tcp Kid Terror
17499/tcp CrazzyNet
17500/tcp CrazzyNet
17569/tcp Infector
17593/tcp Audiodoor
17777/tcp Nephron
18753/udp Shaft
19864/tcp ICQ Revenge
20000/tcp Millenium
20001/tcp Millenium
20002/tcp AcidkoR
20005/tcp Mosucker
20023/tcp VP Killer
20034/tcp NetBus
20203/tcp Chupacabra
20331/tcp BLA trojan
20432/tcp Shaft
20433/udp Shaft
21544/tcp GirlFriend, Kid Terror
21554/tcp Exploiter
22222/tcp Donald Dick
23005/tcp NetTrash
23006/tcp NetTrash
23023/tcp Logged
23032/tcp Amanda
23432/tcp Asylum
23456/tcp Evil FTP
23476/tcp Donald Dick
23476/udp Donald Dick
23477/tcp Donald Dick
23777/tcp InetSpy
24000/tcp Infector
25685/tcp Moonpie
25686/tcp Moonpie
25982/tcp Moonpie
26274/udp Delta Source
26681/tcp Voice Spy
27374/tcp Bad Blood
27444/udp Trinoo
27573/tcp SubSeven
27665/tcp Trinoo
28678/tcp Exploiter
29104/tcp NetTrojan
29369/tcp ovasOn
29891/tcp The Unexplained
30000/tcp Infector
30001/tcp ErrOr32
30003/tcp Lamers Death
30029/tcp AOL trojan
30100/tcp NetSphere
30101/tcp NetSphere
30102/tcp NetSphere
30103/tcp NetSphere
30103/udp NetSphere
30133/tcp NetSphere
30303/tcp Sockets des Troie
30947/tcp Intruse
30999/tcp Kuang2
31335/tcp Trinoo
31336/tcp Bo Whack, Butt Funnel
31337/tcp Back Fire
31337/udp Back Orifice
31338/tcp Back Orifice
31338/udp Deep BO
31339/tcp NetSpy (DK)
31666/tcp BOWhack
31785/tcp Hack´a´Tack
31787/tcp Hack´a´Tack
31788/tcp Hack´a´Tack
31789/udp Hack´a´Tack
31790/tcp Hack´a´Tack
31791/udp Hack´a´Tack
31792/tcp Hack´a´Tack
32001/tcp Donald Dick
32100/tcp Peanut Brittle
32418/tcp Acid Battery
33270/tcp Trinity
33333/tcp Blakharaz
33577/tcp Son of PsychWard
33777/tcp Son of PsychWard
33911/tcp Spirit 2000
34324/tcp Big Gluck
34444/tcp Donald Dick
34555/udp Trinoo
35555/udp Trinoo
37237/tcp Mantis
37651/tcp Yet Another Trojan - YAT
40412/tcp The Spy
40421/tcp Agent 40421
40422/tcp Masters Paradise
40423/tcp Masters Paradise
40425/tcp Masters Paradise
40426/tcp Masters Paradise
41337/tcp Storm
41666/tcp RBT
44444/tcp Prosiak
44575/tcp Exploiter
47262/udp Delta Source
49301/tcp OnLine KeyLogger
50130/tcp Enterprise
50505/tcp Sockets des Troie
50766/tcp Fore
51966/tcp Cafeini
52317/tcp Acid Battery 2000
53001/tcp RWS
54283/tcp SubSeven
54320/tcp Back Orifice 2000
54321/tcp Back Orifice 2000
55165/tcp File Manager trojan
55166/tcp WM Trojan Generator
57341/tcp NetRaider
58339/tcp Butt Funnel
60000/tcp Deep Throat
60001/tcp Trinity
60068/tcp Xzip 6000068
60411/tcp Connection
61348/tcp Bunker-Hill
61466/tcp TeleCommando
61603/tcp Bunker-Hill
63485/tcp Bunker-Hill
64101/tcp Taskman
65000/tcp Devil
65390/tcp Eclypse
65421/tcp Jade
65432/tcp The Traitor (= th3tr41t0r)
65432/udp The Traitor (= th3tr41t0r)
65534/tcp /sbin/initd
65535/tcp RC1 trojan
epylog/etc/notice_dist.xml 0000644 0001750 0001750 00000006363 12527655413 015170 0 ustar tiago tiago
gconfd.*: Failed to get lock.*Failed to create
gconfd.*: Error releasing lockfile
gconfd.*: .* Could not lock temporary file
gconfd.*: .* another process has the lock
GConf locking errors
Fatal X error
Fatal X errors
sftp-server.*
subsystem request for sftp
SFTP activity
floppy0:|\(floppy\)
Misc floppy errors
ypserv.*:\srefused\sconnect\sfrom\s(\S+):\d+\sto\sprocedure\s(\S+)
%s denied for %s
kernel:\sLinux\sversion\s(\S*)
Rebooted with Linux kernel %s
sshd\[\S*: Did not receive identification string from (\S*)
SSH scan from %s
VFS: busy inodes on changed media
dirty CDROM mount
kernel: cdrom: This disc doesn
kernel: .*Make sure there is a disc in the drive.
Misc CDROM errors
attempt to access beyond end of device
rw=\d+, want=\d+, limit=\d+
Directory sread .* failed
kernel: bread in fat_access failed
Dirty floppy mount [non-indicative]
nfs: server (\S+) not responding
nfs: server (\S+) OK
NFS timeouts to server %s
insmod: Hint: insmod errors
insmod errors
audit\S+:\s+avc:\s+denied\s+\{\s([^\}]+)\s\}.*exe=(\S+).*scontext=(\S+)
SELinux: denied "%s" for "%s" (scontext=%s)
CROND\S+: \((\S+)\) CMD \(([^\)]+)\)
crond\S+: \((\S+)\) CMD \(([^\)]+)\)
Cron: user '%s' (%s)
device (\S+) entered promiscuous mode
(\S+): Promiscuous mode enabled
(\S+): enabled promiscuous mode
device %s entered promiscuous mode
epylog/epylog.in 0000644 0001750 0001750 00000023202 12527655413 013205 0 ustar tiago tiago #!%%PYTHON_BIN%%
##
# Copyright (C) 2003 by Duke University
#
# This program is free software; you can redistribute it and/or
# modify it under the terms of the GNU General Public License
# as published by the Free Software Foundation; either version 2
# of the License, or (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA
# 02111-1307, USA.
#
# $Id$
#
# @Author Konstantin Ryabitsev
# @version $Date$
#
import os
import sys
import getopt
import time
import libxml2
sys.path.insert(0, '%%PY_MODULE_DIR%%')
from epylog import *
DEFAULT_EPYLOG_CONFIG = '%%pkgconfdir%%/epylog.conf'
EPYLOG_PIDFILE = '%%localstatedir%%/run/epylog.pid'
def unxmlify_offsets(ofile, logger):
"""
Take the XML file with offsets and return them as a dictionary.
"""
logger.put(5, '>epylog.unxmlify_offsets')
logger.put(3, 'Checking if we can read "%s"' % ofile)
if not os.access(ofile, os.R_OK):
logger.put(3, 'Could not read offsets file "%s"' % ofile)
logger.put(3, 'Returning blank tuple')
logger.put(5, 'epylog.xmlify_offsets')
try:
logger.put(3, 'Trying to open "%s" for writing.' % ofile)
fh = open(ofile, 'w')
except IOError:
logger.put(0, 'Could not open "%s" for writing! Offsets not saved!')
return
logger.puthang(3, 'Making XML out of offset map')
doc = libxml2.newDoc('1.0')
root = doc.newChild(None, 'epylog-offsets', None)
for entry in omap:
enode = root.newChild(None, 'entry', None)
enode.newChild(None, 'log', entry[0])
enode.newChild(None, 'inode', str(entry[1]))
enode.newChild(None, 'offset', str(entry[2]))
logger.endhang(3)
offsets = doc.serialize()
doc.freeDoc()
logger.put(5, offsets)
import fcntl
logger.put(3, 'Locking the offsets file')
fcntl.flock(fh.fileno(), fcntl.LOCK_EX)
logger.puthang(3, 'Writing the offsets into "%s"' % ofile)
fh.write(offsets)
logger.endhang(3)
logger.put(3, 'Unlocking the offsets file')
fcntl.flock(fh.fileno(), fcntl.LOCK_UN)
fh.close()
logger.put(5, 'epylog.restore_offsets')
ofile = os.path.join(epylog.vardir, 'offsets.xml')
omap = unxmlify_offsets(ofile, logger)
for o in omap:
try:
epylog.logtracker.set_start_offset_by_entry(o[0], o[1], o[2])
except NoSuchLogError:
logger.put(0, 'No such log in tracker: %s' % o[0])
logger.put(5, 'epylog.store_offsets')
ofile = os.path.join(epylog.vardir, 'offsets.xml')
omap = epylog.logtracker.get_offset_map()
xmlify_offsets(omap, ofile, logger)
logger.put(5, '