Displaying 20 results from an estimated 2000 matches similar to: "Anti-Rootkit app"
2006 Jun 12
3
Check integrity or rootkits on remote server?
Hello,
when one has physical access to a computer, he
can run something like tripwire, with keys and
checksum on a separate, write-only media, to
verify the integrity of the system.
What if the system is a remote one (in my case
Centos 4.3 on a User Mode Linux VPS some hundred
of KMs from here)?
Does it still make sense to run tripwire remotely?
If yes, how, since you cannot plug a floppy or
2004 May 21
12
Hacked or not ?
Hi,
I have a 4.9-STABLE FreeBSD box apparently hacked!
Yesterday I ran chkrootkit-0.41 and I don't like some of the outputs.
Those are:
chfn ... INFECTED
chsh ... INFECTED
date ... INFECTED
ls ... INFECTED
ps ... INFECTED
But all the rest is NOT PROMISC, NOT INFECTED, NOTHING FOUND, NOTHING DELETED, or NOTHING DETECTED.
I know by the FreeBSD-Security archives that
2003 Mar 30
2
Bindshell rootkit
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Ok...did some checking. I forgot to mention that I killed dead syslogd. Not just a -HUP but an actual kill and restarted. I did this several times. I was trying to get something else to work.
Anyway, I killed it again this morning and restarted. The infect message went away immediately.
Could this have been the problem?
-
2003 Dec 07
5
possible compromise or just misreading logs
I am not sure if I had a compromise but I am not sure I wanted some other
input.
I noticed in this in my daily security run output:
pc1 setuid diffs:
19c19
< 365635 -rwsr-xr-x 1 root wheel 204232 Sep 27 21:23:19 2003
/usr/X11R6/bin/xscreensaver
---
> 365781 -rwsr-xr-x 1 root wheel 205320 Dec 4 07:55:59 2003
/usr/X11R6/bin/xscreensaver
It was the only file listed and I didn't
2005 May 12
1
Do I have an infected init file?
Hello;
I'm running a FreeBSD 4.10-release-p2 box and both chkrootkit 0.44 & 0.45 report that my /sbin/init file is infected.
It appears as though the egrep for "UPX" in the output of "strings" triggers the infected notice. When I copy the init file from an uninfected box to this one chkrootkit continues to report it as infected. Is chkrootkit reading a copy of the
2009 Aug 19
5
How to tell if I've been hacked?
There is a lot of talk about the vulnerable Linux kernel. I'm simply
wondering the telltale signs if a given system has been hacked?
What, specifically, does a person look for?
Thanks.
Scott
2003 Aug 28
4
compromised server
I have a server that has been compromised.
I'm running version 4.6.2
when I do
>last
this line comes up in the list.
shutdown ~ Thu Aug 28 05:22
That was the time the server went down.
There seemed to be some configuration changes.
Some of the files seemed to revert back to default versions
(httpd.conf, resolv.conf)
Does anyone have a clue what type of
1998 Aug 25
1
Named Overflow Concern - SUMMARY (fwd)
George Brown sent this to my private Email address instead of to the
list. Because I forwarded it, my addres is in the header.
Roger.
----- Forwarded message from root -----
>From root@bull.bullnet.co.uk Mon Aug 24 16:20:29 1998
Received: from dutepp0.et.tudelft.nl
by rosie.BitWizard.nl (fetchmail-4.2.9 POP3 run by wolff)
for <wolff@localhost> (single-drop); Mon Aug 24
2006 Mar 11
4
Centosplus & CentOS Extras, Enlarge your tent
I think Jim (the other one) is doing a marvellous job with extras and
plus but he needs to expand the size of his tent. A sensible package
policy in extras/plus repo will mean fewer temptations to install 3rd
party repo's that can break your system. Some of the packages i
would like to see are :-
- MySQL 5 rpms
- php 5 rpms (already provided)
- Open Office 2.0 rpms
- webmin
- rkhunter
-
2003 May 02
4
Did i get hacked?
hello,
i have a FreeBSD 4.8-PRERELEASE #0 that i use as a gateway / nat box for
my home.
It also acts as a dns / mail server to the outside world.
I'm using ipf and basically filter for bogus networks on the way in and out.
I allow everything out keeping state,
and allow this in:
pass in proto icmp from any to any icmp-type squench group 200
pass in proto icmp from any to any icmp-type timex
2009 Jan 22
14
Antivirus for CentOS? (yuck!)
Hi All,
Yes, I know, it's really really embarrassing to have to ask but I'm
being pushed to the wall with PCI DSS Compliance procedure
(http://en.wikipedia.org/wiki/PCI_DSS) and have to either justify why
we don't need to install an anti-virus or find an anti-virus to run on
our CentOS 5 servers.
Whatever I do - it needs to be convincing enough to make the PCI
compliance guy tick the
2008 Sep 01
1
How to check for rootkit, troians etc in backed up files?
Hi,
there is a remote (VPS) Centos 4.2 server which *may* have been
compromised. Reinstalling everything from scratch isn't a problem, it
may even be an occasion to improve a few things, the question is
another.
There are backups of necessary shell script, ASCII configuration files
and more or less important email (maildir format, if it matters)
including messages with binary attachments in
1998 Jul 14
1
Different Forms of attack...
Question,
there are the teardrop, ping of death, DoS and a host of other forms of
attacks. While all of the research that I have been doing concerning
another form of an attack.... I became sorta stumped on an idea...
is there anywhere.... a description on what to expect or what happenes
during any one of these or other attacks listed somewhere? If so, could
someone please direct me in that
2003 Nov 12
1
really clean install?
Good evening, I was finish the FreeBSD4.9 installation from CD, and only do some edit with the /etc/rc.firewall, /etc/rc.conf, /boot/defaults/loader.conf, and recompiling the kernel to support my ext2 backup harddisk, with sndcard support too.
This's a old laptop (ibm380z), i have chkrootkit warning after all finished, i attached my uname -a, dmesg, pkg_info and chkrootkit result, please
1999 Nov 12
1
[RHSA-1999:054-01] Security problems in bind (fwd)
Woops... this didn't show up here but it did on BugTraq. Questions answered!
--
Chuck Mead, CTO, MoonGroup Consulting, Inc. <http://moongroup.com>
Mail problems? Send "s-u-b-s-c-r-i-b-e mailhelp" (no quotes and no
hyphens) in the body of a message to mailhelp-request@moongroup.com.
Public key available at: wwwkeys.us.pgp.net
----------
2010 Sep 30
6
ClamAV thinks Wine contains a rootkit?
Anyone wanna explain why ClamAV thinks Wine has a rootkit in it?
It finds "mountmgr.sys" and "usbd.sys" as "BC.Heuristics.Rootkit.B"
This is not altered Wine.. or even used... but it happens just pure straight up compile from source Wine even if its never been ran.... its finding them in the fakedlls folder.
I have not tried on Linux, only on Mac OS X, using the
2003 Jun 09
1
Have I been hacked?
I'm noticing something strange on two of my machines.. They're both
4.7-RELEASE-p3 i386 and they've both been up 150 days without any
problems...
/var/log/messages on each system contains only:
Jun 9 12:00:01 in newsyslog[60291]: logfile turned over
dmesg's output is truncated.. it periodically changes, but currently
it reads:
ite.net host=6532251hfc207.tampabay.rr.com
2007 Oct 04
3
Auditing software for a CentOS server
Hi, I'm running some databases's software on a CentOS 4.5 server and I'd like to know if there are any audit software in CentOS4.5 CDs packages?.....I need some software to audit all the files on the server, I mean, if some one delete a file, or change some permissions on any filesystems, if someone copy files to my server and some of this stuff... take in mind I'm not lookign for
2018 Jun 19
0
Design Decision for KVM based anti rootkit
On 19 June 2018 at 19:37, David Vrabel <david.vrabel at nutanix.com> wrote:
> It's not clear how this increases security. What threats is this
> protecting again?
It won't completely protect prevent rootkits, because still rootkits
can edit dynamic kernel data structures, but it will limit what
rootkits damage to only dynamic data.
This way system calls can't be changed, or
1998 May 19
7
Bind Overrun Bug and Linux
[mod: Just to show you that people DO get bitten after a bugwarning has
gone out on linux-security..... -- REW]
-----BEGIN PGP SIGNED MESSAGE-----
Content-Type: text/plain; charset=us-ascii
Has anyone been hit with the Bind Inverse Query Buffer Overrun on
their Linux servers? We have had 3 servers attacked using this
expoit and all of the machines had several binaries replaced with
trojan