hi ya...

wasnt this a MS bug/attack... and if so...
why are you looking at your linux logss???

or are these the logs of your firewall ??? which shoulda kept
track of iincoming traffic to that MS server

and if you were doing some poking around...
- logs can be erased  and covered up.....
        utmp and wtmp ( binary files, use "last -f /var/log/wtmp" )
        check your webserver logs too

when checking your logs...if you use the "replaced/trojaned"
binaries to vi, ls, cat, ps, grep your log files...
they could have put a few lines of code to hide themself...
so you wont see anything.... even if the are sitting in the
machine at the same time you're looking for them...

- always use binaries from your CDROM... not the machine
  that was hacked

and....
- you'd need to check the checksum of your binaries
- you'd need to check the config files for new changes too
- you'd need to check for new directories and files you didnt install

how good you are at checking/preventing things is the "trick"...
and/or defending your box against incoming attacks

how much time you wanna spend on each detail is the other issue

c ya
alvin


On Sat, 26 May 2001, Nontakorn wrote:

> For my case....I've checked my logs (syslog, sulog, lastlog, logs in /usr,
> logs in /var, etc..) didn't find anything of suspicion.  Am I overlooking
> some log file?  How are other fairing in tracing the source?
> 
> Sincerely yours,
> 

-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]

Reply via email to