TCLUG Archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
RE: [TCLUG:22365] Hacked
The xferlog is probably clean because I don't think it logs anonymous users
by default. Can you upload files anonymously to your machine or make
directories anonymously?
CERT is http://www.cert.org
To find your version of bind do:
named -v
Make sure you look at your /etc/inetd.conf and see if anything was added and
check in the /var/named or /etc/named.d. Here is the link to the named
vulnerability: http://www.cert.org/advisories/CA-2000-03.html This exploit
requires the attacker to have control of a DNS server somewhere that is
authoritative for a valid domain.
Jay
-----Original Message-----
From: Brian [mailto:tobytoo@black-hole.com]
Sent: Sunday, October 08, 2000 3:54 PM
To: tclug-list@mn-linux.org
Subject: Re: [TCLUG:22365] Hacked
the xferlog is clean, as in empty, and the secure log has no mention of a
pbadmin logging in since i reinstalled on the 5th..
Do you have the url for CERT?
I should mentionthat my mobo is going wonky on me too. the battery that
holds the cmos is dead from the looks of it, it keeps defaulting my bios,
but
that only started after i shut down this afternoon.
where do i find my bind version?
"Austad, Jay" wrote:
> Look at /var/log/xferlog and look in /home/ftp and see if there's any
extra
> directories. If they knew what they were doing they would have removed
the
> extra directories that got created and wiped the log, but it's usually
some
> script kiddie who has no clue what he's doing. If the MKDIR's are logged,
> you'll be able to tell where they were coming from. Hopefully they were
> dumb enough to do it from their own machine. If you can find their IP,
> you'll want to notify the owner of that IP block because some of their
> machines may have been compromised.
>
> Also, CERT has a nice little article somewhere about rootkits and finding
if
> they installed one. Some have config files hidden in /dev that will give
> away the attackers IP.
>
> If you're running Bind older than 8.1.2, they could've used the IXFR
> exploit. Look in the directory that holds your zone files for a directory
> called ADMROCKS/. Also check your /etc/inetd.conf and see if they
appended
> anything to it.
>
> Jay Austad
> Network Administrator
> CBS Marketwatch
>
> -----Original Message-----
> From: Adam Maloney [mailto:adamm@sihope.com]
> Sent: Sunday, October 08, 2000 2:48 PM
> To: tclug-list
> Subject: Re: [TCLUG:22365] Hacked
>
> $10 says it's ftpd.
>
> Adam Maloney
> Systems Administrator
> Sihope Communications
>
> On Sun, 8 Oct 2000, Brian wrote:
>
> > My system was hacked last night, I was shut down from 10 pm until about
> > 9 this morning, when I rebooted I had a new account called pbadmin on my
> > login screen, before I just blow this acount away I would like to find
> > out how he got into my system. Any suggestions on how to back track
> > him?
> > I'm running caldera 2.4edesktop, with a dsl connection through a cisco
> > 675 and a netgear RT311 router.
> >
> >
> >
> > ---------------------------------------------------------------------
> > To unsubscribe, e-mail: tclug-list-unsubscribe@mn-linux.org
> > For additional commands, e-mail: tclug-list-help@mn-linux.org
> >
> >
>
> ---------------------------------------------------------------------
> To unsubscribe, e-mail: tclug-list-unsubscribe@mn-linux.org
> For additional commands, e-mail: tclug-list-help@mn-linux.org
>
> ---------------------------------------------------------------------
> To unsubscribe, e-mail: tclug-list-unsubscribe@mn-linux.org
> For additional commands, e-mail: tclug-list-help@mn-linux.org
---------------------------------------------------------------------
To unsubscribe, e-mail: tclug-list-unsubscribe@mn-linux.org
For additional commands, e-mail: tclug-list-help@mn-linux.org