John,
Ran chkrootkit - had a lot of warnings about one application in
particular - Eclipse. Otherwise clean.
I guess eclipse is just a messy programme.
Simono
On Tue, 2010-10-19 at 00:19 +0100, John Cooper wrote:
> On 18/10/10 22:38, Ralph Corderoy wrote:
> >
> > Hi John,
> >
> >>>> Which type of hacker represents the highest risk to your network?
> >>>>
> >>>> A. Disgruntled employee
> >>>> B. Black-hat hacker
> >>>> C. Grey-Hat hacker
> >>>> D. Script kiddies
> >>
> >> All 4 do define their ability. A kiddie with Black-hat skills is a
> >> Black hat. There is one correct answer.
> >
> > OK, I'll bite.  :-)  I'd say A, since they often exist and they've easy
> > access to "private" systems.
> >
> > Two cases I can think of off the top of my head.  A sys. admin. employee
> > was cracking encrypted passwords, fair enough, helps highlight poor
> > passwords.  I could tell he was since some machines were slow and he
> > didn't hide it, e.g. argv[0].  After he left, disgruntledly, he guessed
> > that some of those users may use the same, non-trivial but crackable,
> > passwords on rented machines on the Internet and from there got access
> > to a database he wanted to examine.
> >
> > The other one is an intern at a company, bright enough, learning his way
> > around Unix, decided to create, e.g. /tmp/{ls,sl} for those with a PATH
> > that looks in the current working directory, just to gain that user's ID
> > for a bit of fun with his colleagues.  Completely non-malicious, I'm
> > sure.  The scripts were found, their existence went upwards and across
> > to personnel and he was escorted off site.  Unfortunate since the
> > company was helping fund his way through university.  (Yes, perhaps the
> > company could have handled it better, but people cover their backsides.)
> >
> > I've only experience any of the others once.  Someone used a flaw in an
> > old Red Hat system that was still on the net.  It should have been
> > updated and wasn't.  That got him a root shell prompt, but I suspect he
> > was a script kiddie because he did little of note other than pull down a
> > rootkit and fail to cover his tracks.  (I was watching his actions by
> > then since it broke the system in an odd way.)  He removed .bash_history
> > and then logged out.  He should have known .bash_history is written on
> > exit and done `kill -9 $$'.  :-)
> >
> > Cheers,
> > Ralph.
> >
> >
> 
> Correct! The book says A. and I agree. It is far easier to hack a system 
> when you already work there!
> 
> The writing of the bash history after you have logged out was a clever 
> move and well worth knowing (a colleague told me that in 2005 and 
> something I check).
> 
> I've only had my website hacked once and that was due to an old version 
> of Moodle which I'd forgot about. It was a kiddie scripter as all they 
> did was modify the index.html with "hacked by ..". I restored a backup 
> anyway.
> 
> My home system was potentially hacked in to recently. rkhunter said 
> everything was fine but chkrootkit picked up a modified init. I couldn't 
> find any other files associated with the trojan but Bitdefender for 
> Unices found a couple of malware. I had someone using a proxy to access 
> one of my websites which DNS name was "." and therefore could not find 
> the IP address in the logs. I'm sure by me just going to some of the 
> proxies to find their IP addresses introduced the malware and probably 
> lured an attack.
> 
> My advice
> 
> 1. Don't use anon proxies, especially from a Windows box
> 2. Run chkrootkit and rkhunter.
> 3. Run a virus checker like Bitdefender for Unices (free for non 
> commercial use)
> 4. Install denyhosts and fail2ban if you are connected to the internet 
> for SSH,http etc.
> 5. Install OSSEC . This monitors file changes and logs, very useful, and 
> would have picked up the init change.
> 
> John.
> 



--
Next meeting:  Crown Hotel, Blandford Forum, Tuesday 2010-11-02 20:00
Meets, Mailing list, IRC, LinkedIn, ...  http://dorset.lug.org.uk/
How to Report Bugs Effectively:  http://goo.gl/4Xue

Reply via email to