|
One time one of our servers running Fedora was exploited through a
security hole in the PHP Horde framework. Through the hole, they used
WGET to download a stand alone FTP server, which they then installed
and put on an IRC bot to start serving files. All this happened in our
/tmp directory, since it was one of the few that the web user (apache)
had access to. In order to clear it, we firewalled our box to not let any traffic in or out, then cleaned up the /tmp directory and searched for any files created in the last 24 hours and cleaned all suspicious ones. Then we patched the hole in Horde and loosened the firewall. That fixed it and we were hacker free. Not to say that your solution will be that easy, but if you have a somewhat competent admin, you can probably fix the server without nuking it. Sean Conner wrote: It was thus said that the Great Tom Ray [Lists] once stated:I'm running a SuSE 9.1 server with Apache 2.0.58 and as of last Thursday I'm seeing a ton of files created in spots they should be. All created by wwwrun (the webserver). I'm finding PHP scripts that are blatantly commented with hacker code, _vti_ directories in sites and this server doesn't have FP running on it. Cron jobs owned by wwwrun created and I can see my maching connected to a strange IP on port 22 which is telling me that my machine has opened a ssh connection with their server. |
- [EMAIL PROTECTED] I believe I've been compromised. Tom Ray [Lists]
- Re: [EMAIL PROTECTED] I believe I've been compromised... Sean Conner
- Re: [EMAIL PROTECTED] I believe I've been comprom... Jeff Pollard
- Re: [EMAIL PROTECTED] I believe I've been com... Tom Ray [Lists]
