Maybe I don't have a clue but is it wise to be sending adm-nxt.c to everyone on
the list?

On Fri, 03 Mar 2000, Alexander Feldman wrote:
> 
> Hello,
> 
> I have subscribed for this list after I found (or not found) information
> about the NXT Bug exploit in the BIND 8.2 from my RH6.0 package.
> 
> Yesterday I was hacked and I am still trying to understand the exact way
> this happened. I have not still reinstalled the OS of the exploited
> server as I am still trying to understand the steps of the hacker.
> 
> Is there anybody who can help me in doing this.
> 
> I understood that I am hacked after I found a directory
> /var/named/ADMROCKS. After that I found some system files replaced and a
> trojan inetd started. In the /tmp directory I found a small ELF binary. I
> started the started the binary (I know this is very risky) and then I searched the
binary (I know this is very risky) and then I searched the
> hackers' sites for similar programs.
> 
> Then I found the adm-nxt.c program (I am attaching it here) which when
> compiled matched the binary I found in /tmp.
> 
> After that step I was trying to exploit my own server with the help of
> this program but I have no success.
> 
> Any ideas?
> 
> Best regards:
> 
> Alexander Feldman
> 

----------------------------------------
Content-Type: TEXT/PLAIN; name="adm-nxt.c"
Content-Transfer-Encoding: BASE64
Content-Description: 
----------------------------------------

-- 
Steve Gulick, Cornerstone Development, LLC.
[EMAIL PROTECTED]
AIM: gulicksteve
Voice (203) 855-1501
Fax (203) 838-9597


-- 
To unsubscribe: mail [EMAIL PROTECTED] with "unsubscribe"
as the Subject.

Reply via email to