At 03:21 PM 3/4/2001 -0400, you wrote:
>Run a "ps ax | grep "/usr/local/sbin/s"  By doing the ps ax, it will
>not display the usernames, and will give you more of the process
>name.  Also note that it's not necessarily you that may have run the
>process...many daemon processes run whenever they run.  It'll be
>helpful to know what the process is.

Hmmm... I copied and pasted that line, hit *enter*, then realized (because 
of the *>* prompt) that I'd forgotten the closing quote mark, entered that 
and got a bunch of stuff. But when I ran it the second time I didn't.

 >>>
   PID TTY      STAT   TIME COMMAND
     1 ?        S      0:05 init [5]
     2 ?        SW     0:00 [kflushd]
     3 ?        SW     0:00 [kupdate]
     4 ?        SW     0:00 [kpiod]
     5 ?        SW     0:00 [kswapd]
     6 ?        SW<    0:00 [mdrecoveryd]
   312 ?        S      0:00 portmap
   367 ?        S      0:05 syslogd -m 0
   378 ?        S      0:00 klogd
   394 ?        S      0:00 /usr/sbin/atd
   410 ?        S      0:00 crond
   430 ?        S      0:00 inetd
   446 ?        S      0:00 lpd
   521 ?        S      0:02 /usr/sbin/httpsd -DSSL
   531 ?        S      0:00 sh /usr/bin/safe_mysqld 
--datadir=/var/lib/mysql --pi
   582 ?        S      0:00 xfs -droppriv -daemon -port -1
   606 ?        S      0:00 /usr/sbin/mysqld --basedir=/ 
--datadir=/var/lib/mysql
   609 ?        S      0:00 /usr/sbin/mysqld --basedir=/ 
--datadir=/var/lib/mysql
   610 ?        S      0:00 /usr/sbin/mysqld --basedir=/ 
--datadir=/var/lib/mysql
   635 ?        S      0:00 interchange
   661 ?        S      0:07 /usr/local/sbin/sshd
   669 tty1     S      0:00 /sbin/mingetty tty1
   670 tty2     S      0:00 /sbin/mingetty tty2
   671 tty3     S      0:00 /sbin/mingetty tty3
   672 tty4     S      0:00 /sbin/mingetty tty4
   673 tty5     S      0:00 /sbin/mingetty tty5
   674 tty6     S      0:00 /sbin/mingetty tty6
   675 ?        S      0:00 /usr/bin/gdm -nodaemon
   685 ?        S      0:00 perl /usr/libexec/webmin/miniserv.pl 
/etc/webmin/mini
   983 ?        Z      0:00 [X <defunct>]
   984 ?        Z      0:00 [gdm <defunct>]
  8087 ?        S      0:00 in.identd -e -o
  8091 ?        S      0:00 in.identd -e -o
  8092 ?        S      0:00 in.identd -e -o
  8093 ?        S      0:00 in.identd -e -o
  8094 ?        S      0:00 in.identd -e -o
  8095 ?        S      0:00 in.identd -e -o
  8096 ?        S      0:00 in.identd -e -o
  8097 ?        S      0:00 in.identd -e -o
  8098 ?        S      0:00 in.identd -e -o
  8099 ?        S      0:00 in.identd -e -o
  8100 ?        S      0:00 in.identd -e -o
16251 ?        S      0:00 sendmail: accepting connections on port 25
22288 ?        S      0:00 /usr/sbin/httpsd -DSSL
22289 ?        S      0:00 /usr/sbin/httpsd -DSSL
22290 ?        S      0:00 /usr/sbin/httpsd -DSSL
22291 ?        S      0:00 /usr/sbin/httpsd -DSSL
22292 ?        S      0:02 /usr/sbin/httpsd -DSSL
22293 ?        S      0:00 /usr/sbin/httpsd -DSSL
22294 ?        S      0:00 /usr/sbin/httpsd -DSSL
22295 ?        S      0:00 /usr/sbin/httpsd -DSSL
22296 ?        S      0:00 /usr/sbin/httpsd -DSSL
22297 ?        S      0:00 /usr/sbin/httpsd -DSSL
  2819 ?        S      0:00 /usr/sbin/mysqld --basedir=/ 
--datadir=/var/lib/mysql
  2823 ?        S      0:00 /usr/sbin/mysqld --basedir=/ 
--datadir=/var/lib/mysql
  2827 ?        S      0:00 /usr/sbin/mysqld --basedir=/ 
--datadir=/var/lib/mysql
  2828 ?        S      0:00 /usr/sbin/mysqld --basedir=/ 
--datadir=/var/lib/mysql
  2829 ?        S      0:02 /usr/sbin/httpsd -DSSL
  3321 ?        S      0:00 /usr/sbin/httpsd -DSSL
  3322 ?        S      0:00 /usr/sbin/httpsd -DSSL
  3849 ?        S      0:00 /usr/local/sbin/sshd
  3850 pts/0    S      0:00 -bash
  3945 pts/0    S      0:00 su root
  3946 pts/0    S      0:00 bash
  4232 ?        S      0:00 /usr/local/sbin/sshd
  4233 pts/1    S      0:00 -bash
  4304 ?        S      0:00 /usr/sbin/mysqld --basedir=/ 
--datadir=/var/lib/mysql
  4346 pts/1    S      0:00 su root
  4347 pts/1    S      0:00 bash
  4807 pts/1    R      0:00 ps ax
  4808 pts/1    R      0:00 bash
thewebsons:/apache/vhosts/downloads/chkrootkit-0.22# ps ax | grep 
"/usr/local/sb
in/s"|more
   661 ?        S      0:07 /usr/local/sbin/sshd
  3849 ?        S      0:00 /usr/local/sbin/sshd
  4232 ?        S      0:00 /usr/local/sbin/sshd
  4810 pts/1    S      0:00 grep /usr/local/sbin/s
thewebsons:/apache/vhosts/downloads/chkrootkit-0.22# ps ax | grep 
"/usr/local/sb
in/s"
   661 ?        S      0:07 /usr/local/sbin/sshd
  3849 ?        S      0:00 /usr/local/sbin/sshd
  4232 ?        S      0:00 /usr/local/sbin/sshd
<<<

As to what they did or didn't do...assuming that someone has gotten
>in, I have no idea.

Well, *did* they get in, or do we know? Did they get in as far as tty1 and 
stop cold? Or, since they apparently logged in as root, did they gain 
access to the entire box through tty1? If they did, how should I go about 
protecting the machine? Changing the password would not only be useless, it 
would tip them off that I know what happened.
TIA,
BenO



_______________________________________________
Redhat-list mailing list
[EMAIL PROTECTED]
https://listman.redhat.com/mailman/listinfo/redhat-list

Reply via email to