Re: CleanLog.h

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]



On Fri, Nov 30, 2007 at 10:04:19AM -0600, B.J. McClure wrote:
> On Fri, 2007-11-30 at 09:36 -0500, Evans F. Mitchell KD4EFM / AFA2TH /
> WQFK-894 wrote:
> 
> > By any chances, have you ran 'ps ax' from root and looked
> > to see what does not look like it should be there??
> 
> The box is already down and replaced by a backup.  Implemented some of your suggestions on it. 
> Issue was unauthorized web site.I have bash_history logs for all the users created by hacker so 
> I know commands run including starting httpd.  When I get back from an 11 day business trip I will 
> set those drives on a slow as molasses test machine and see what I can figure out...for educational purposes.
> 
> 
> B.J.
> 
> 
> > IF you are willing, paste your 'ps' output for us to
> > help you find the program that is running and sending out
> > the emails.
> > 
> > also review your sendmail rule set.
> > Next, to help lock down your server a little more
> > make sure you have set a password on your VNC.
> > I had and Italian 17 year old poking around one
> > of my Amateur Radio boxes via VNC, simply cause I
> > forgot to set a vnc password, so it was wide open
> > like a windoz server box without a login screen,
> > you know, the good old "I AM OPEN FOR YOUR PLEASURES..."
> > 
> > Also change your sshd, the port it is on, and do a rule
> > set that only allows a specific ip to access it.
> > I think I am correct saying you can do that as well with VNC.
> > 
> > The other option would be to stop the service all together
> > IF your not needing it.
> > 
> > Good Luck.
> > 
> > Evans F. Mitchell KD4EFM/AFA2TH/WQFK-894
> > 
> >  
> > 
> > 
> > -----Original Message-----
> > From: centos-bounces@xxxxxxxxxx [mailto:centos-bounces@xxxxxxxxxx] On Behalf
> > Of Alfredo Perez
> > Sent: Friday, November 30, 2007 7:40 AM
> > To: CentOS mailing list
> > Subject: Re:  CleanLog.h
> > 
> > On Thu, Nov 29, 2007 at 04:43:44PM -0600, B.J. McClure wrote:
> > > Sad to say one of my file servers was exploited and used to run a 
> > > Phishing scam.  Have identified subject virus amongst other things.  
> > > It appears twice in a virus scan; /sbin/z (which I assume can just be
> > > deleted) and /sys/bus/serio/drivers/atkbd/description.  The latter 
> > > file is also present in identical uninfected machines.  I have been 
> > > unable to open the file, even with root privileges, although it 
> > > appears to be a text file.  Any suggestions on how to proceed 
> > > appreciated.  Guess I could delete it and copy over the file from an
> > identical machine.
> > > 
> > > Thanks in advance,
> > > B.J.
> > > 
> > > CentOS 5.0, Linux 2.6.18-8.1.15.el5 x86_64 16:26:48 up 10:46, 1 user, 
> > > load average: 0.07, 0.08, 0.04
> > 
> > Hi Can you tell me which virus scan you are using?
> > 
> > Thanks
> > 
Can you share your findings with us?

Furthermore, this question is for the list

I have a Centos 5 server running sshd
for me to signon and check my emails.

I use denyhosts to protect port 22.

Is there anyother software you people use
to protect your servers.

Thanks in advance

Alfredo - The sauce

_______________________________________________
CentOS mailing list
CentOS@xxxxxxxxxx
http://lists.centos.org/mailman/listinfo/centos

[Index of Archives]     [CentOS]     [CentOS Announce]     [CentOS Development]     [CentOS ARM Devel]     [CentOS Docs]     [CentOS Virtualization]     [Carrier Grade Linux]     [Linux Media]     [Asterisk]     [DCCP]     [Netdev]     [Xorg]     [Linux USB]
  Powered by Linux