Re: shell access exploits (was Re: upgrading to MySQL 4 on woody)

2004-01-20 Thread Lucas Albers
I'm no expert. I run chkrootkit on a regular basis. Run a virus scanner it will find some exploits. Hacafee found a few rootkits and known kernel exploits. I use mcafee for linux. Analyze history files for certain keywords. The best way would be to analyze command frequency in history files and loo

Re: shell access exploits (was Re: upgrading to MySQL 4 on woody)

2004-01-20 Thread Lucas Albers
I'm no expert. I run chkrootkit on a regular basis. Run a virus scanner it will find some exploits. Hacafee found a few rootkits and known kernel exploits. I use mcafee for linux. Analyze history files for certain keywords. The best way would be to analyze command frequency in history files and loo

Re: shell access exploits (was Re: upgrading to MySQL 4 on woody)

2004-01-20 Thread Jason Lim
> > One of my hats is a junior sys admin in an academic environment. I'm > curious as to how you know when shell users are trying to exploit a kernel > hole. chkrootkit?

shell access exploits (was Re: upgrading to MySQL 4 on woody)

2004-01-20 Thread Dan MacNeil
> I have at most a week from a known kernel exploit to when one of my users > tries to exploit via shell access. One of my hats is a junior sys admin in an academic environment. I'm curious as to how you know when shell users are trying to exploit a kernel hole. In another non academic environme

Re: shell access exploits (was Re: upgrading to MySQL 4 on woody)

2004-01-19 Thread Jason Lim
> > One of my hats is a junior sys admin in an academic environment. I'm > curious as to how you know when shell users are trying to exploit a kernel > hole. chkrootkit? -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

shell access exploits (was Re: upgrading to MySQL 4 on woody)

2004-01-19 Thread Dan MacNeil
> I have at most a week from a known kernel exploit to when one of my users > tries to exploit via shell access. One of my hats is a junior sys admin in an academic environment. I'm curious as to how you know when shell users are trying to exploit a kernel hole. In another non academic environme