There are many ways they may have broken into your system.  Old versions
of BIND, sshd with RSAREF2, wu-ftpd with the SITE EXEC problem, and on and
on it goes.  You will need to do a thorough security review of the system.

But, the main message is shutting off telnet has probably NOT stopped them
at all.  Most of the DDoS attack tools have master/slave capabilities and
the master often gives them a back door.  If the master is still there,
they are still getting in most likely.  Also look to see if they modified
inetd.conf ; one of the simple backdoors that is often installed is to add
a line to inetd.conf that will fire off sh -i or bash -i when a certain
port is hit.  Another backdoor is to replace inetd with a version that has
a built-in backdoor.  You really should take the machine off-line, do
comparisons of binaries against the installed packages, clean up the
machine, and harden it before putting it back on-line.  www.cert.org has a
section on how to recover from compromises.

- rick warner

On Wed, 4 Oct 2000, Brian Schneider wrote:

> I was hacked last night  I was suddenly getting a huge load on my
> system. Looking at "top", I found a file td running with many
> instances. In searching, I found the file in /dev/chr/client. I found
> where the user x and noc were used and then deleted. 
> 
> How can I find where the logins came from. For now I have disabled telnet,
> except locally as I will use ssh to check my mail remotely.
> 
> Any ideas how they may have got in, or what should I look for to get more
> info on this.
> 
> TIA
> 
> 
> ------------------------------------------------------------------------
> "If you're not one of us, you are one of them" Morpheus
> 
> Brian Schneider           [EMAIL PROTECTED]            www.liberty.ddns.org 
> ________________________________________________________________________
> 
> 
> 
> _______________________________________________
> Redhat-list mailing list
> [EMAIL PROTECTED]
> https://listman.redhat.com/mailman/listinfo/redhat-list
> 



_______________________________________________
Redhat-list mailing list
[EMAIL PROTECTED]
https://listman.redhat.com/mailman/listinfo/redhat-list

Reply via email to