Re: bash_history from Cracked Computer

2000-05-03 Thread w trillich
Joey Hess wrote: > Let's cut it down some.. > > > cc anatomy.c -o anatomy > > cc kod.c -o kofd > > cp kofd kod > > rm kofd > > According to google, kod and kofd are related to the oracle database. > It's possible this is a cooincidence, or he was using these names to try > to appear innocous (wei

Re: bash_history from Cracked Computer

2000-05-03 Thread Matthew Dalton
"Dzuy M. Nguyen" wrote: > This linux box was plugged into the same LAN as our company NT Network. > It wasn't setup to access the NT Network or be involved in it. It just > get's > it's TCP/IP signal from the LAN. And what about the internet connection? Are all of your NT boxes connected directly

Re: bash_history from Cracked Computer

2000-05-03 Thread Dzuy M. Nguyen
ave scanned the ports of the computers physically connected on this LAN? Should I be concerned with the security of the whole office now? - Original Message - From: w trillich <[EMAIL PROTECTED]> To: Sent: Tuesday, May 02, 2000 6:58 PM Subject: Re: bash_history from Cracked Computer

Re: bash_history from Cracked Computer

2000-05-03 Thread Joey Hess
Dzuy M. Nguyen wrote: > Can someone help me figure out this "/.bash_history" from my > computer that someone cracked into and did some damage. > > I'll probably re-install the box, but I'd like to see what they did > before I destroy it. I've attached the "/.bash_history". Let's cut it down some

Re: bash_history from Cracked Computer

2000-05-03 Thread w trillich
if you run updatedb via cron (or run it from the shell by hand recently) it'll tell you if you have any of the evil files on your computer: locate pscan locate wuftp locate bnc2 locate .shit locate anatomy locate kod locate '/b$' if you find a

Re: bash_history from Cracked Computer

2000-05-03 Thread Matthew Dalton
That's an awesome trail your cracker left there...! Does anyone know what 'anatomy' and 'kofd/kod' are? Perhaps the source is still on the machine in /root/.dead/home/.dead/dead/ (or something like that) It looks like he was performing port scans from your machine (./pscan IP PORT entries). Don't