08Jun2009 (UTC +8) They all got good suggestions here. Do activate your company's Incident Response Plan.
If you don't have one, and this is an ad hoc response, please *document* your every action before you start proceeding any further. Trust me, when a company does a post-mortem analysis later, sys admins get a lot of heat if upper management thinks they didn't respond well enough. Normally, I too would suggest that you go with Fooler's option #2 below, as it's exciting. You'd want to know who, what, where, when, why and how. Fooler's option #2 is great *if* you know what you want, how you're going to do it, if your systems have layers of defense, if you're certain that backups have not yet been compromised, and if you're confident enough to do it. If you decide to let the suspected machine to be online for a while, so you can observe anything that's happening, get a BackTrack CD, boot it from another machine, run "nmap -v -v -p0-65537 -sS -A --reason -oA CentOS-TCP-scan-date CentOS-server" and "nmap -v -v -p0-65537 -sU -A --reason -oA CentOS-UDP-scan-date CentOS-server". That may give you more answers than your basic nmap scan. Run on the same observation machine that's on the same hub as the suspect machine, "tcpdump -v -v -s 0 -i eth0" and see what's going on. Be prepared to analyze GB's of *.cap files, and note that Wireshark chokes on large files. You'll figure out what to do next based on your observations. If you decide to go with Fooler's option #1 however, at least document everything as well, and dd the hard disk of the suspect machine so you can have a hard disk image to examine later, before you re-install everything in that CentOS machine. On Mon, Jun 8, 2009 at 10:54, fooler mail<[email protected]> wrote: > On Mon, Jun 8, 2009 at 10:25 AM, Iris Lames<[email protected]> wrote: >> >> If my ftp problem does not bind to any service, I feel relieved. But then >> again, the question is "what caused my ftp to be open?". I'm now wondering >> if this is bug from Centos. > > it is not a bug.. your system was hacked.. you cannot use any > applications (eg. netstat, lsof, etc) in your system as the hacker > already modified those... > > the port 21 is the hacker remote backdoor going to your system... > > you have two options.. > > 1. reinstall your entire system without catching the hacker > 2. stay as is at the moment and catch the hacker... > > for number 2... there are lots of ways to catch the source ip address > of this hacker.. but dont do this inside your hacked system... if you > want option number 2... just let us know.. Drexx Laggui -- CISA, CISSP, CFE Associate, ISO27001 LA, CCSI, CSA http://www.laggui.com ( Singapore / Manila / California ) Computer forensics; Penetration testing; QMS & ISMS developers; K-Transfer PGP fingerprint = 6E62 A089 E3EA 1B93 BFB4 8363 FFEC 3976 FF31 8A4E _________________________________________________ Philippine Linux Users' Group (PLUG) Mailing List http://lists.linux.org.ph/mailman/listinfo/plug Searchable Archives: http://archives.free.net.ph

