On Thu, 5 Mar 1998, David S Edwards wrote: > Well I busted somebody trying to hack my webserver that we do hosting on. > Since I'm not an expert at decoding some of this stuff, I thought I would > post the hacks here, hoping that somebody could shed some light on it. Oh, > by the way, I caught this guy because he was careless and didn't delete the > .bash_history file. ok... the source code you posted is the exploit for the gain root access via buffer overload on traceroute command. check your favorite places for more information on these and others. There is an errata patch for fixing this exploit. The a.out binary (glibc) is a nift binary that appears to have the purpose of running dip (dialup IP program for creating SLIP, CSLIP, PPP, ...) connections on a serial line. It appears to try to dial out to another computer (cannot tell where or anything else from binary). You may want to apply all current errata, and re-install the machine if possible, just in case this person has managed to replace binaries and such elsewhere on the system. Any other questions on procedure to implement on this or what he was doing I can help answer. ttylz -- Fire Dragon | RedHat 5.0 & Cyrix 6x86 P120+ [EMAIL PROTECTED] | Linux Kernel 2.1.85 and counting! http://nosferatu.world-net.net | What more could you ask for? ftp://nosferatu.world-net.net | Linux: For IQs higher than 95! Home life as we understand it is no more natural to us than a cage is to a cockatoo. -- George Bernard Shaw
ELF <4 @ 4 ( 4 44 ԀԀ < << /lib/ld-linux.so.2 < # 9 1 ? `h E ܄ W " \ a >