On Thursday 20 May 2004 10:26 am, Stephen Kuhn wrote:
> On Fri, 2004-05-21 at 03:13, Aron Smith wrote:
> > I have been getting a *Lot8 of disk activity  around 7:00 am
> > the output from dmesg looks something like this
> > -----------------------------------------------------------------Shorewal
> >l:net2all:DROP:IN=eth0 OUT= MAC=00:07:95:fc:2d:40:00:90:1a:40:aa:4d:08:00
> > SRC=24.202.47.169 DST=64.81.53.247 LEN=48 TOS=0x00 PREC=0x00 TTL=108
> > ID=30226 DF PROTO=TCP SPT=2296 DPT=5554 WINDOW=64240 RES=0x00 SYN URGP=0
> > Shorewall:net2all:DROP:IN=eth0 OUT=
> > MAC=00:07:95:fc:2d:40:00:90:1a:40:aa:4d:08:00 SRC=24.202.47.169
> > DST=64.81.53.247 LEN=48 TOS=0x00 PREC=0x00 TTL=108 ID=30480 DF PROTO=TCP
> > SPT=2544 DPT=9898 WINDOW=64240 RES=0x00 SYN URGP=0
> > Shorewall:net2all:DROP:IN=eth0 OUT=
> > MAC=00:07:95:fc:2d:40:00:90:1a:40:aa:4d:08:00 SRC=83.64.20.224
> > DST=64.81.53.247 LEN=52 TOS=0x10 PREC=0x00 TTL=106 ID=11550 DF PROTO=TCP
> > SPT=4200 DPT=21 WINDOW=65535 RES=0x00 SYN URGP=0
> > Shorewall:net2all:DROP:IN=eth0 OUT=
> > MAC=00:07:95:fc:2d:40:00:90:1a:40:aa:4d:08:00 SRC=83.64.20.224
> > DST=64.81.53.247 LEN=52 TOS=0x10 PREC=0x00 TTL=106 ID=12990 DF PROTO=TCP
> > SPT=4200 DPT=21 WINDOW=65535 RES=0x00 SYN URGP=0
> > Shorewall:net2all:DROP:IN=eth0 OUT=
> > MAC=00:07:95:fc:2d:40:00:90:1a:40:aa:4d:08:00 SRC=64.78.124.187
> > DST=64.81.53.247 LEN=48 TOS=0x00 PREC=0x00 TTL=112 ID=1830 DF PROTO=TCP
> > SPT=4887 DPT=5000 WINDOW=64240 RES=0x00 SYN URGP=0
> > [EMAIL PROTECTED] aronsmith]$
> > -------------------------------------------------------------------------
> >------------ have I been hacked?
> > Thanks in advance
> > smitty
>
> Have you run a chkrootkit on this box yet?
Yes seems to be ok nothing detected
--------results------------------------------------------------
[EMAIL PROTECTED] aronsmith]# chkrootkit
ROOTDIR is `/'
Checking `amd'... not found
Checking `basename'... not infected
Checking `biff'... not found
Checking `chfn'... not infected
Checking `chsh'... not infected
Checking `cron'... not infected
Checking `date'... not infected
Checking `du'... not infected
Checking `dirname'... not infected
Checking `echo'... not infected
Checking `egrep'... not infected
Checking `env'... not infected
Checking `find'... not infected
Checking `fingerd'... not found
Checking `gpm'... not found
Checking `grep'... not infected
Checking `hdparm'... not infected
Checking `su'... not infected
Checking `ifconfig'... not infected
Checking `inetd'... not tested
Checking `inetdconf'... not found
Checking `identd'... not found
Checking `init'... not infected
Checking `killall'... not infected
Checking `ldsopreload'... not infected
Checking `login'... not infected
Checking `ls'... not infected
Checking `lsof'... not infected
Checking `mail'... not infected
Checking `mingetty'... not infected
Checking `netstat'... not infected
Checking `named'... not found
Checking `passwd'... not infected
Checking `pidof'... not infected
Checking `pop2'... not found
Checking `pop3'... not found
Checking `ps'... not infected
Checking `pstree'... not infected
Checking `rpcinfo'... not infected
Checking `rlogind'... not found
Checking `rshd'... not found
Checking `slogin'... not infected
Checking `sendmail'... not found
Checking `sshd'... not found
Checking `syslogd'... not infected
Checking `tar'... not infected
Checking `tcpd'... not infected
Checking `tcpdump'... not infected
Checking `top'... not infected
Checking `telnetd'... not found
Checking `timed'... not found
Checking `traceroute'... not infected
Checking `vdir'... not infected
Checking `w'... not infected
Checking `write'... not infected
Checking `aliens'... no suspect files
Searching for sniffer's logs, it may take a while... nothing found
Searching for HiDrootkit's default dir... nothing found
Searching for t0rn's default files and dirs... nothing found
Searching for t0rn's v8 defaults... nothing found
Searching for Lion Worm default files and dirs... nothing found
Searching for RSHA's default files and dir... nothing found
Searching for RH-Sharpe's default files... nothing found
Searching for Ambient's rootkit (ark) default files and dirs... nothing found
Searching for suspicious files and dirs, it may take a while... nothing found
Searching for LPD Worm files and dirs... nothing found
Searching for Ramen Worm files and dirs... nothing found
Searching for Maniac files and dirs... nothing found
Searching for RK17 files and dirs... nothing found
Searching for Ducoci rootkit... nothing found
Searching for Adore Worm... nothing found
Searching for ShitC Worm... nothing found
Searching for Omega Worm... nothing found
Searching for Sadmind/IIS Worm... nothing found
Searching for MonKit... nothing found
Searching for Showtee... nothing found
Searching for OpticKit... nothing found
Searching for T.R.K... nothing found
Searching for Mithra... nothing found
Searching for OBSD rk v1... nothing found
Searching for LOC rootkit ... nothing found
Searching for Romanian rootkit ... nothing found
Searching for HKRK rootkit ... nothing found
Searching for Suckit rootkit ... nothing found
Searching for Volc rootkit ... nothing found
Searching for Gold2 rootkit ... nothing found
Searching for TC2 Worm default files and dirs... nothing found
Searching for Anonoying rootkit default files and dirs... nothing found
Searching for ZK rootkit default files and dirs... nothing found
Searching for ShKit rootkit default files and dirs... nothing found
Searching for anomalies in shell history files... nothing found
Checking `asp'... not infected
Checking `bindshell'... not infected
Checking `lkm'... Checking `rexedcs'... not found
Checking `sniffer'... Checking `w55808'... not infected
Checking `wted'... nothing deleted
Checking `scalper'... not infected
Checking `slapper'... not infected
Checking `z2'... nothing deleted
[EMAIL PROTECTED] aronsmith]#
---------------------------------------------------------------
>
> stephen kuhn - owner
> ==============================
> illawarra computer services
> a kuhn media australia company
> http://kma.0catch.com
> ------------------------------------------------------------------
>   * This message was composed on a 100% Microsoft free computer *
>   We expressly refuse to utilise Microsoft DRM encoded documents
> ------------------------------------------------------------------
> FORTUNE'S FUN FACTS TO KNOW AND TELL: #44 Zebras are colored with dark
> stripes on a light background.

____________________________________________________
Want to buy your Pack or Services from MandrakeSoft? 
Go to http://www.mandrakestore.com
Join the Club : http://www.mandrakeclub.com
____________________________________________________

Reply via email to