Security Basics mailing list archives
Re: rootedrooted
From: "Dev Null" <devj.nullj () gmail com>
Date: Fri, 17 Nov 2006 09:31:32 +0500
On 11/17/06, McGee, James <James.McGee () acs-inc com> wrote:
You've probably got a duff (compromised) version of ssh running. Someone has exploited this and now "owns" your machine
I would probably agree with you. rkhunter reported ssh that I was running to be vulnerable. It allowed for ssh ver 1 as well.
What next? Fdisk, start again, reinstall, patch the heck out of it and then connect to the network. Or, spend some time doing forensic investigations.
Forensics. Yes, I would like to. Any pointers that can help me about this.
How much time you got? Either way don't trust the machine anymore and consider it a zombie for some sort of botnet Regards James McGee, CISA, CISM, CISSP Affiliated Computer Services, Inc. Human Capital Management Solutions Information Security & Privacy Office EU Work +353 21 231 4715 US Work +1 214 416 3715 Mobile +353 870 515 776 james.mcgee () acs-inc com http://acs-inc.com
--------------------------------------------------------------------------- This list is sponsored by: Norwich University EARN A MASTER OF SCIENCE IN INFORMATION ASSURANCE - ONLINEThe NSA has designated Norwich University a center of Academic Excellence in Information Security. Our program offers unparalleled Infosec management education and the case study affords you unmatched consulting experience. Using interactive e-Learning technology, you can earn this esteemed degree, without disrupting your career or home life.
http://www.msia.norwich.edu/secfocus ---------------------------------------------------------------------------
Current thread:
- rootedrooted Dev Null (Nov 16)
- Re: rootedrooted Alexey Vesnin (Nov 17)
- Re: rootedrooted Deb (Nov 17)
- <Possible follow-ups>
- Re: rootedrooted Dev Null (Nov 17)
