I recommend you boot with some live CD system and make a dump of each
partition, including swap, with dd. So you can analyze it after wipe
your system.

This analysis will help you to discover how attacker have gained root
access, protect your actual system and feed community with real case
information. If you need help, please let me know.

Best regards,

Fernando Mercês
Linux Registered User #432779
www.mentebinaria.com.br
softwarelivre-rj.org
@MenteBinaria
------------------------------------
II Hack'n Rio - 23 e 24/11
                 hacknrio.org
------------------------------------



On Wed, Feb 8, 2012 at 10:51 AM, Alexander Schreiber
<[email protected]> wrote:
> On Wed, Feb 08, 2012 at 11:53:14AM +0300, [email protected] wrote:
>> Today I found next things at squeeze. Please help to fix, I've no
>> experience in such tasks.
>>
>> # chkrootkit
>> ROOTDIR is `/'
>> Checking `ifconfig'...                                      INFECTED
>> Checking `netstat'...                                       INFECTED
>
> Don't even try to fix, with the system rooted you cannot trust it.
> The only safe course of action is to wipe the system and reinstall it.
>
> If you need the data on the machine and have no current backups, boot
> from a rescue CD (giving you a _clean_ environment) and copy the data
> off, then wipe & reinstall.
>
> Kind regards,
>           Alex.
> --
> "Opportunity is missed by most people because it is dressed in overalls and
>  looks like work."                                      -- Thomas A. Edison
>
>
> --
> To UNSUBSCRIBE, email to [email protected]
> with a subject of "unsubscribe". Trouble? Contact [email protected]
> Archive: http://lists.debian.org/[email protected]
>


--
To UNSUBSCRIBE, email to [email protected]
with a subject of "unsubscribe". Trouble? Contact [email protected]
Archive: 
http://lists.debian.org/CAM7p17PMimBO-Ouu4gRy7L7PXWdy�[email protected]

Reply via email to