On Fri, Apr 16, 2010 at 02:28:09AM -0700, terry white wrote: > ... ciao: > > : on "4-15-2010" "Chris" writ: > : web servers which occasionally have hacks that are uploaded > : know more about them to actually prevent them from happening. > : Any thoughts would be appreciated! > > from my reading, this is a security nightmare. and , i , am hard > pressed to find a time when "what's" been uploaded, more important than > the fact, "that is was". > > without a meaningful translation of "web server hacks" is a real > limiting factory in problem resolution. however, your logs are your > friend; access, error, and referrer. > > securityfocus recently disclosed a problem with apache and wordpress. > > a specific description of the environment would be a big help ... These are large shared servers serving a lot of stuff. I could only wish that I had control over how up to date all the web apps were! Anyway, in this case, finding what is being uploaded is fairly important since I don't have the luxery of having control over everything. I don't have a problem with nuking the processes once started, but I would really like to prevent them from ever making it do disk and run to begin with. In order to do that, I need a pretty good idea of what the hack looks like. Not only that, pure curiousity plays a large role too. My question was not so much about web security (I would pick a different mailing list for that), as much as it was about whether anyone had experience or trickery to recover/trap file contents that someone is working really hard to hide. Perl obviously read the file to run the sript (anyone can run perl, so any flags on the /tmp mount are pointless in this case, as perl can read /tmp all it wants). Like I said before, reading the open file from proc yields nothing. I guess I might have to bite the bullet and set up a huge space to log a gazzillion POSTs until I can find what is. -- To unsubscribe from this list: send the line "unsubscribe linux-admin" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html