> > which isnt backdoored. Only problem with this is, once it is on your 
> > potentially infected box, its output can no longer be trusted, as one of 
> > those 69 processes could maim the output of your new ps, not to mention how 
> > easily a kernel backdoor [LKM, kernel patch (hard or /dev/kmem)]could to do.

If a user was to gain local root priveledges, it is also possible that
he/she has loaded/forced a kernel module also.  Check your modules
directory and files to see what is being loaded (off the network).  It
could be that ps and /proc agree, but the kernel is not reporting
correctly to either (given that a rogue module is loaded).  You could
also compile a kernel from clean source and boot with it (off the
network) then check binaries to be sure they md5 up correctly.

-- 
Nathan Yocom <[EMAIL PROTECTED]>

Reply via email to