Re: BIND exploited ? -UPDATE

2002-01-07 Thread Michael Wood
On Sat, Jan 05, 2002 at 01:43:24AM -0500, Thedore Knab wrote: [snip] Starting nmap V. 2.54BETA25 ( www.insecure.org/nmap/ ) Interesting ports on dns1.mywork.edu : (The 1540 ports scanned but not shown below are in state: closed) Port State Service 21/tcp openftp

Re: BIND exploited ? -UPDATE

2002-01-07 Thread Michael Wood
On Sat, Jan 05, 2002 at 01:43:24AM -0500, Thedore Knab wrote: [snip] Starting nmap V. 2.54BETA25 ( www.insecure.org/nmap/ ) Interesting ports on dns1.mywork.edu : (The 1540 ports scanned but not shown below are in state: closed) Port State Service 21/tcp openftp

RE: BIND exploited ? -UPDATE

2002-01-06 Thread Jeremy L. Gaddis
Sent: Saturday, January 05, 2002 1:43 AM To: [EMAIL PROTECTED] Subject: Re: BIND exploited ? -UPDATE Thanks for your help. This was not a debian box. Maybe the next one will be. I think it was updated from an earilier version that was hacked. I am under the assumption that this server

RE: BIND exploited ? -UPDATE

2002-01-06 Thread Martin WHEELER
On Sat, 5 Jan 2002, Jeremy L. Gaddis wrote: You dumbass. Everybody knows you don't try to fix a compromised machine. You take it in stride, wipe the drives and start all over from a clean install. Would you mind terribly not airing your oh-so-superior views in public? With such unbridled

Re: BIND exploited ? -UPDATE

2002-01-06 Thread Joachim Wieland
On Sat, Jan 05, 2002 at 01:43:24AM -0500, Thedore Knab wrote: Starting nmap V. 2.54BETA25 ( www.insecure.org/nmap/ ) Interesting ports on dns1.mywork.edu : (The 1540 ports scanned but not shown below are in state: closed) ^^ You seem to have only scanned your well-known ports?

Re: BIND exploited ? -UPDATE #2

2002-01-06 Thread Thedore Knab
How does this sound ? The system has been rebuilt. It is running Bind 9.2 chroot version on RH 7.2. Someone else built it. I prefer Debian or OpenBSD. I will add tripwire and chkroot kit to run as a cron job. The harddrives will be saved for further investigation at a later date. Since the

RE: BIND exploited ? -UPDATE

2002-01-06 Thread Jeremy L. Gaddis
: Saturday, January 05, 2002 1:43 AM To: debian-isp@lists.debian.org Subject: Re: BIND exploited ? -UPDATE Thanks for your help. This was not a debian box. Maybe the next one will be. I think it was updated from an earilier version that was hacked. I am under the assumption that this server

RE: BIND exploited ? -UPDATE

2002-01-06 Thread Martin WHEELER
On Sat, 5 Jan 2002, Jeremy L. Gaddis wrote: You dumbass. Everybody knows you don't try to fix a compromised machine. You take it in stride, wipe the drives and start all over from a clean install. Would you mind terribly not airing your oh-so-superior views in public? With such unbridled

Re: BIND exploited ? -UPDATE

2002-01-06 Thread Joachim Wieland
On Sat, Jan 05, 2002 at 01:43:24AM -0500, Thedore Knab wrote: Starting nmap V. 2.54BETA25 ( www.insecure.org/nmap/ ) Interesting ports on dns1.mywork.edu : (The 1540 ports scanned but not shown below are in state: closed) ^^ You seem to have only scanned your well-known ports?

Re: BIND exploited ? -UPDATE #2

2002-01-06 Thread Thedore Knab
How does this sound ? The system has been rebuilt. It is running Bind 9.2 chroot version on RH 7.2. Someone else built it. I prefer Debian or OpenBSD. I will add tripwire and chkroot kit to run as a cron job. The harddrives will be saved for further investigation at a later date. Since the

Re: BIND exploited ? -UPDATE

2002-01-05 Thread Thedore Knab
Thanks for your help. This was not a debian box. Maybe the next one will be. I think it was updated from an earilier version that was hacked. I am under the assumption that this server was this way for over 1 year. [ted@moe chkrootkit-0.34]$ cat /etc/redhat-release Red Hat Linux release 6.2

Re: BIND exploited ? -UPDATE

2002-01-05 Thread Thedore Knab
Thanks for your help. This was not a debian box. Maybe the next one will be. I think it was updated from an earilier version that was hacked. I am under the assumption that this server was this way for over 1 year. [EMAIL PROTECTED] chkrootkit-0.34]$ cat /etc/redhat-release Red Hat Linux