Excellent advice and well thought out, Cory.

Regards, Jim

At 10:57 AM 3/30/2001 -0800, you wrote:
>(also posted)
>
>This is a messy situation, especially if an intruder knows more about a 
>system than the administrator.
>
>Determining how an intruder entered is essential in closing those 
>holes.  It may be that he used brute force on your telnet daemon, which 
>means you passwords likely weren't tough enough, and you didn't have any 
>logging to notice 10,000 failed login attempts to r00t or some other 
>user.  Check out ippl (http://pltplp.net/ippl/) for a logger, and logcheck 
>(http://www.psionic.com/) for a utility that will email you highlights of 
>your logs.  It will search for words like 'failed', 'r00t', or whatever 
>you specify.
>
>If he didn't use brute force, he likely exploited bugs or inadequate 
>security measures in other programs, such as a web server, or the cobalt 
>administration module.
>
>You should contact cobalt and tell them their system was cracked, assuming 
>it wasn't your fault (ie weak passwords).  Perhaps they can offer help 
>determining how, and how to clean it.  Although if it was cracked because 
>of lack of knowledge on their part, their help may not be too useful in 
>'securing' the system.
>
>Then it may be a very good idea to reinstall the whole system from 
>scratch, as your binaries could have been replaced by trojaned versions 
>which can allow the intruder to reenter.
>
>Also, you should contact the local police.  They want to hear about 
>it.  Even if they only 'file' the information, they may get more involved.
>
>Cory
>
>On Thu, Mar 29, 2001 at 09:45:05PM -0800, John Marsh wrote:
> >
> >  **  This message was sent from the EUGLUG message board. Since  **
> >  **   the person who submitted this question may not be on the   **
> >  ** mailing list, please reply directly or on the message board: **
> >  **            http://www.euglug.org/board.phtml?id=64           **
> >
> > Well I should have listened to Joe Hartman and installed secure
> > shell.  I was busted and someone got into my Cobalt RaQ4 server.
> > They posted a Kill the "[we won't say]" page as the home page
> > for each 6 of my virtual sites.  They also changed the root
> > password.  What a pain.
> >
> > So I was wondering what is the best secure shell to use;
> > and how can I set up the server to only accept telnet traffic
> > from certian IPs?
> >
> > When I discovered the event I had no choice but to http in
> > through the Cobalt admin page.  (Interestingly this seems to be
> > in the clear too.) I was able to get into the admin panel with
> > the first password challange, then I went immediatly to change
> > the password and it wouldn't work.  As if it was changed just as
> > I was about to change it myself.
> >
> > Yes I'm new to Linux and appreciate any help.  Also what file
> > would I look at to see the telnet traffic maybe the guy didn't
> > cover his tracks and I could look for patterns in the ip
> > addresses.
> >
> > Thanks, John

Reply via email to