Re: Attack using php+apache

2003-11-15 Thread Dion Mendel
On Sun, Nov 16, 2003 at 05:19:06AM +0100, Bernd Eckenfels wrote: > In article <[EMAIL PROTECTED]> you wrote: > > So what to do now? If /tmp was mounted ro, then none of the attacker's > > tools could run (from this attack anyway) > > Read Only tmp? :) Now that is a funny idea. I can understand to

Re: Attack using php+apache

2003-11-15 Thread Dion Mendel
On Sun, Nov 16, 2003 at 05:19:06AM +0100, Bernd Eckenfels wrote: > In article <[EMAIL PROTECTED]> you wrote: > > So what to do now? If /tmp was mounted ro, then none of the attacker's > > tools could run (from this attack anyway) > > Read Only tmp? :) Now that is a funny idea. I can understand to

Re: Attack using php+apache

2003-11-15 Thread Dion Mendel
A quick analysis. * After testing that the php hole works (id;uname -a) and (cd /tmp;ls), the attacker downloads an executable 'c4'. This executable is then run. A quick reverse of this executable shows it to simply exec a shell and bind to port 5678. Googling gives us this link to equi

Re: Attack using php+apache

2003-11-15 Thread Dion Mendel
A quick analysis. * After testing that the php hole works (id;uname -a) and (cd /tmp;ls), the attacker downloads an executable 'c4'. This executable is then run. A quick reverse of this executable shows it to simply exec a shell and bind to port 5678. Googling gives us this link to equi

Re: AIDE Information Overload

2002-10-22 Thread Dion Mendel
Hi all, I'm not providing an answer, but rather asking another question on this topic. Which files do people exclude when using integrity checkers (e.g. aide/tripwire etc)? Under normal system use, certain files do change (e.g. /etc/mtab, /dev/tty*). Including these files in the integrity check

Re: AIDE Information Overload

2002-10-22 Thread Dion Mendel
Hi all, I'm not providing an answer, but rather asking another question on this topic. Which files do people exclude when using integrity checkers (e.g. aide/tripwire etc)? Under normal system use, certain files do change (e.g. /etc/mtab, /dev/tty*). Including these files in the integrity check