Re: hacker files

2002-10-10 Thread Muhammad Faisal Rauf Danka
honeynet's immense work at : www.honeynet.org Yes tripwire or aide is what you need for sure. As far as the files are concerned, mostly the files used for routine admin purpose are changed by intruders. If you look at major rootkits, they mostly replace the following files: ps ls w /bin/login s

Re: hacker files

2002-10-10 Thread Mitchell Wright
What you are asking for is impossible. The exploits are discovered and passed around all the time... What you should consider is a file integrity assessment application. We use Tripwire and it is good. The docs are available from the files area on their sourceforge website. That, plus a well co

hacker files

2002-10-10 Thread Steve Buehler
Can anybody point me to a list or email me a list of the files on a redhat system that are the files that hackers would replace if they got in. Basically, I want to be able to restore these files easily if I ever need too. If I have a list of them that I can backup, than it would be easier t

RE: How can I take action on the hacker if I manager to get his IP address

2002-05-03 Thread Robb Anderson
EMAIL PROTECTED]] Sent: Friday, May 03, 2002 9:24 AM To: [EMAIL PROTECTED] Subject: Re: How can I take action on the hacker if I manager to get his IP address I downloaded and ran the nmap program on one all of my servers. Does the "shell" really need to be on? I noticed that only on

Re: How can I take action on the hacker if I manager to get his IP address

2002-05-03 Thread Steve Buehler
se, thanks for your help"... > >Jim. > > > >- Original Message - > >From: "Tsing Moh Lim" <[EMAIL PROTECTED]> > >To: <[EMAIL PROTECTED]> > >Sent: Friday, May 03, 2002 2:26 AM > >Subject: How can I take action on the hacker

Re: How can I take action on the hacker if I manager to get his IP address

2002-05-03 Thread patrick1
inal Message - >From: "Tsing Moh Lim" <[EMAIL PROTECTED]> >To: <[EMAIL PROTECTED]> >Sent: Friday, May 03, 2002 2:26 AM >Subject: How can I take action on the hacker if I manager to get his IP >address > > >> My server was hack and I managed to ca

Re: How can I take action on the hacker if I manager to get his IP address

2002-05-03 Thread Jim Bija
hanks for your help"... Jim. - Original Message - From: "Tsing Moh Lim" <[EMAIL PROTECTED]> To: <[EMAIL PROTECTED]> Sent: Friday, May 03, 2002 2:26 AM Subject: How can I take action on the hacker if I manager to get his IP address > My server was hack and I man

How can I take action on the hacker if I manager to get his IP address

2002-05-03 Thread Tsing Moh Lim
My server was hack and I managed to capture the ip address with date and time on a remote logging system. How can I take action against him or warn him ? ? Is there a tool that I could use to check on my server vulnerability. Thanks and regards Moke __

RE: there's a hacker!

2000-05-21 Thread Juha Saarinen
%-> A recent popular method of gaining root access to some %-> networked machines %-> involved exploitation of the NXT record buffer overflow in %-> BIND; it became %-> so popular in later March that CERT put out a new advisory on %-> the problem %-> which had been the subject of an advisory last

RE: there's a hacker!

2000-05-20 Thread Rick Warner
deny > ie: 60400:ALL > > > > -Original Message- > > From: Brad [SMTP:[EMAIL PROTECTED]] > > Sent: Sunday, May 14, 2000 9:07 PM > > To: [EMAIL PROTECTED] > > Subject:there's a hacker! > > > > Dear all, > > I am a newb

Re: there's a hacker!

2000-05-20 Thread Sam Bayne
1 0 Mar 21 ?0:04 ftp mew.tcs > root 7439 7419 0 08:42:13 pts/70:00 /usr/bin/ps -ef > root 7417 135 0 08:12:59 ?0:00 in.telnetd >ccchu 4607 1 0 Mar 15 ? 0:00 fs > guest 7419 7417

RE: there's a hacker!

2000-05-20 Thread Burke, Thomas G.
Message- > From: Brad [SMTP:[EMAIL PROTECTED]] > Sent: Sunday, May 14, 2000 9:07 PM > To: [EMAIL PROTECTED] > Subject: there's a hacker! > > Dear all, > I am a newbie as a administrator of company's workstations. > Now I find(use "netstat") someone us

there's a hacker!

2000-05-18 Thread Brad
2:18 sim.v2 Does anybody knows how I can find the hacker ps,and stop it? thanks a lot. Brad -- Brad Chun [EMAIL PROTECTED] "The best way to esca

Re: question about possible hacker

2000-01-29 Thread Frederic Herman
The hacker wanted to exploit the bind security hole. See the CERT info at: http://www.cert.org/current/current_activity.html#bind This exploit is being used to break into linux boxes. I had one cracked last week. That taught me to keep the patches current. Make sure you have the latest bind

question about possible hacker

2000-01-29 Thread matt boex
i downloaded ippl, basically logs all tcp, udp connections. looking at the log today i see this entry- Jan 29 12:25:48 domain connection attempt from [EMAIL PROTECTED] [216.0.222.7] (216.0.222.7:4749->my-ip-address:53) Jan 29 12:33:41 port 113 connection attempt from ns.pfsfhq.com [216.0.222.7]

Re: Hacker Attack *help*

1999-12-07 Thread [EMAIL PROTECTED]
]>, "Wellington > >> Terumi Uemura" > >> writes: > >> > Considering the security of my server(RedHat6.1),and the every Linux > >> > community,i talk to a big friend of mine(a hacker) to try to hack my > >> > sistem,to test the server

Re: Hacker Attack *help*

1999-12-07 Thread Chris Worth
quot; >> writes: >> > Considering the security of my server(RedHat6.1),and the every Linux >> > community,i talk to a big friend of mine(a hacker) to try to hack my >> > sistem,to test the server and see how the server respond to that kind of >> [snip] >>

Re: Hacker Attack *help* thanks every one!!!

1999-11-23 Thread fllnx
Look into the PIX firewall by Cisco. fred > Date: Sun, 21 Nov 1999 20:31:44 PST > From: "Wellington Terumi Uemura" <[EMAIL PROTECTED]> > To:[EMAIL PROTECTED] > Subject: Re: Hacker Attack *help* thanks every one!!! >

Re: Hacker Attack *help*

1999-11-22 Thread Cokey de Percin
Gustav Schaffter wrote: > > Cokey, > > Where could I find more info on the Linux Router Project? > > Best regards > Gustav > > Cokey de Percin wrote: > > > If you happen to have an old 386/40 or better with 16M of ram or > > more (no hard drive, video or keyboard needed), you might want to >

Re: Hacker Attack *help*

1999-11-22 Thread Mike Erickson
Bob Taylor wrote: > > In message <[EMAIL PROTECTED]>, "Wellington > Terumi Uemura" > writes: > > Considering the security of my server(RedHat6.1),and the every Linux > > community,i talk to a big friend of mine(a hacker) to try to hack my > > si

Re: Hacker Attack *help*

1999-11-22 Thread Gustav Schaffter
Cokey, Where could I find more info on the Linux Router Project? Best regards Gustav Cokey de Percin wrote: > If you happen to have an old 386/40 or better with 16M of ram or > more (no hard drive, video or keyboard needed), you might want to > look at the Linux Router Project. It works very

Re: Hacker Attack *help* thanks every one!!!

1999-11-21 Thread Wellington Terumi Uemura
Thank you guys for the tips and recomendations:)Got to make my sys more secure now,bye __ Get Your Private, Free Email at http://www.hotmail.com -- To unsubscribe: mail [EMAIL PROTECTED] with "unsubscribe" as the Subject.

Re: Hacker Attack *help*

1999-11-21 Thread Cokey de Percin
Juha Saarinen wrote: > > Wellington, > > First, that Web site has trojanised binaries on it (it's mostly Windows > stuff). Don't download anything from there. > > Second, install a commercial-grade firewall, if you're worried about > security. There's a security advisory document over at the Li

RE: Hacker Attack *help*

1999-11-21 Thread Juha Saarinen
lington Terumi Uemura [mailto:[EMAIL PROTECTED]] > Sent: Monday, 22 November 1999 12:34 > To: [EMAIL PROTECTED] > Subject: Hacker Attack *help* > > -- To unsubscribe: mail [EMAIL PROTECTED] with "unsubscribe" as the Subject.

Re: Hacker Attack *help*

1999-11-21 Thread Jason Costomiris
On Sun, Nov 21, 1999 at 03:33:52PM -0800, Wellington Terumi Uemura wrote: : 1 - How can we(linux community) make ftp,telnet and mail server,not to : respond to a brute force attack?Like, give "3" chances for logins and : passwords for all services. If you're really serious, I'd start by doing t

Re: Hacker Attack *help*

1999-11-21 Thread Bob Taylor
In message <[EMAIL PROTECTED]>, "Wellington Terumi Uemura" writes: > Considering the security of my server(RedHat6.1),and the every Linux > community,i talk to a big friend of mine(a hacker) to try to hack my > sistem,to test the server and see how the serve

Hacker Attack *help*

1999-11-21 Thread Wellington Terumi Uemura
Considering the security of my server(RedHat6.1),and the every Linux community,i talk to a big friend of mine(a hacker) to try to hack my sistem,to test the server and see how the server respond to that kind of attack.I've set the moust mix of words and numbers,like U7sxY4sF6 to be the

Re: hacker

1998-06-11 Thread Marcantonio Magnarapa
Chris, >based access, everyone can still get to your pages) this is ftp, telnet, since I need access to my own server from different servers, I cannot limit access by host number. Is there an alternative solution? Marcantonio -- PLEASE read the Red Hat FAQ, Tips, Errata and the MAILING LI

Re: hacker

1998-06-08 Thread redhat
> > How did you get that information? what commando did you use? rpm -q bind -- PLEASE read the Red Hat FAQ, Tips, Errata and the MAILING LIST ARCHIVES! http://www.redhat.com/RedHat-FAQ /RedHat-Errata /RedHat-Tips /mailing-lists To unsubscribe: mail [EMAIL PROTECTED] with

Re: hacker

1998-06-08 Thread Alfonso Barreto Lopez
How did you get that information? what commando did you use? __ Alfonso Barreto Lopez Inst. de Inv. de Matematicas U.N.A.M [EMAIL PROTECTED] -- PLEASE read the Red Hat FAQ, Tips, Errata and the MAILING LIST ARC

Re: hacker

1998-06-08 Thread redhat
> I would agree with this assessment. Check your BIND first, it's the > biggest hole that hackers are using these days. RedHat had an RPM for > the BIND vulerability, but it seems the description had downplayed the > importance of the upgrade. I think that was my problem. I sill had the old

Re: hacker

1998-06-08 Thread redhat
> stuff they find on the net. Another precaution is to go through you secure > log and look for servers you don't normally see access your server. The > more persistent hackers require you to check your logs normally (which you > should be doing anyway) if you can trace a hacker bac

Re: hacker

1998-06-08 Thread Piet Barber
[EMAIL PROTECTED] wrote: > > I had the following messages on my daily report for one of my web servers > today: > > Checking Packages... > changes from previous run... > --- [snip] > > SM5. /usr/sbin/in.rshd > 118a128 > > SM5. /bin/login > --- > > I assume this means I have been h

Re: hacker

1998-06-08 Thread Chris Newbill
see access your server. The more persistent hackers require you to check your logs normally (which you should be doing anyway) if you can trace a hacker back to where they came from call the ISP and the FBI. Chris -Original Message- From: [EMAIL PROTECTED] <[EMAIL PROTECTED]>

hacker

1998-06-08 Thread redhat
I had the following messages on my daily report for one of my web servers today: Checking Packages... changes from previous run... --- 1a2 > ..5. /usr/sbin/smbd 15a17,18 > ..5. /usr/sbin/imapd > S.5..UG. /usr/sbin/named 18c21 < ...T c /var/log/mars_nwe.log --- > S.5T c /var/

Re: How to be a linux hacker?

1998-05-08 Thread David E. Fox
On Fri, 08 May 1998, Patrick T. Berry wrote: >One thing we would really like is a Lisp to Perl translator so we could run >Autocad R14 on Linux. Unless someone out there knows how it can be done now. >I am s tired of Win95 crashing! hYou know we >would pay for the program. You could make a

Re: How to be a linux hacker?

1998-05-08 Thread Patrick T. Berry
happen? How to contact other linux developer? > > Read Eric Raymond's 'How to become a Hacker': > > http://sagan.earthspace.net/~esr/faqs/hacker-howto.html ...message snipped for brevity... -- PLEASE read the Red Hat FAQ, Tips, Errata and the MAILING LIS

Re: How to be a linux hacker?

1998-05-08 Thread Dave Wreski
; happen? How to contact other linux developer? Read Eric Raymond's 'How to become a Hacker': http://sagan.earthspace.net/~esr/faqs/hacker-howto.html And find something you like to do, not something that needs to be done. Spend some time configuring your work environment so its co

How to be a linux hacker?

1998-05-08 Thread Kenneth Lo
Well, first of all, "hacker" in the old sense. Anyway, I joined this community for about a year. I was pretty much a very "lite" linux user, until I start reading this mailing list. Maybe this is a little bit off topic, but I was wondering how to writing codes and