On Friday 25 Nov 2005 18:30, Derek "The Monkey" Wueppelmann wrote:
> On Fri, 2005-25-11 at 23:21 +0530, Ritesh Raj Sarraf wrote:
> > That is what got confused my at first. Since there's no /usr/sbin/httpd
> > binary in a Debian based apache installation I was wondering how this was
> > being shown. And interestingly there was no /usr/sbin/httpd file present
> > also.
>
> If the system has been rooted, then you can't count on anything that is
> reported by ps. Probably one of those scripts in /tmp is being run and
> then it masquerades as being /usr/sbin/httpd, which on redhat systems
> and other *nix distributions would be considered inoquious.
>
> > That's the biggest challenge right now. I don't have physical access to
> > the system and I don't think my client will be able to bear my travelling
> > expenses.
>
> That does pose a problem. I don't know an easy way to validate the
> system and clean it while attacks are still happening, or even worse
> someone has a shell account onto the system.
>
> > chkrootkit came of no help. It reported that the system was absolutely
> > fine. I haven't tried tiger yet.
>
> Hmm, I'm pretty new to that tool and the tiger tool as well. So I'm not
> sure what else to suggest at this point. Hopefully others on this list
> and the debian-isp list will also be able to help out.

My email scanner blocked your fuhrer2 file claiming it had 
"Trojan.Perl.Shellbot.C" 

HTH,
Cheers,


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED] 
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to