On Tue, Aug 08, 2000 at 11:24:09AM -0600, Chuck Mead wrote:
: Reinstall. Sorry but you're in an ugly situation... imagine that 
: /bin/login has
: been replaced!

At the very least!  Rootkits have become pretty sophisticated.  I've
even seen one that was PAMified, so it would work nicely on RedHat
machines.

: Alternatively you could scan the box and look for the hidden port 
: because there
: will be one...

That's always a good way to learn how entry was gained, but a re-install
from known-clean media, including scrubbing the disks is definitely in 
order.  The only data that should be kept is application data, and that
needs to have its integrity verified.  It's a wonderful thing to have 
backups, but which backup contains your data pre-intrusion?  It can 
be tough to know..

-- 
Jason Costomiris <><           |  Technologist, geek, human.
jcostom {at} jasons {dot} org  |  http://www.jasons.org/ 



_______________________________________________
Redhat-list mailing list
[EMAIL PROTECTED]
https://listman.redhat.com/mailman/listinfo/redhat-list

Reply via email to