On Fri, Aug 16, 2002 at 08:22:36AM -0500, Jim Crippen wrote:
> I'd start with the FTP or WWW logs.  It's not hard to get hacked through
> your FTP server.

Boot off a CD first and don't run any software that is on the hard
disk, that way you know any trojaned utilities are not messing with
your ability to look around for clues.

And consider your machine as a complete turncoat.  For example, did
you ever login to another machine from the cracked one?  Assume that
password has been sent back to some bad guy.  Did you ever type any
password or other sensitive information on the cracked machine?  The
bad guy might have it.

I recently rebuilt a machine.  I had no reason to believe that the old
machine had been cracked, but I still treated it like it was diseased.
I could copy data files off it, but I did not copy any executable (or
source) files from it.  I didn't log into the new machine from the old
one.  I didn't reuse passwords.

Once you have looked around to see what has been done, rebuild your
machine carefully.  Use original CDs.  The Red Hat 7.2 and 7.3 default
installations are pretty good, but look over what you have running and
turn off things you don't need.  For example, if you can live without
telnetd, leave it off.  (Use ssh.)  If you can live without ftpd,
leave it off too.  (Use sftp, which works off of ssh.)

Finally, 7.2 and 7.3 *have* security holes!  It wasn't so bad when
each first came out (the holes were not yet known), but now many are
known.  Immediately get the updates from ftp://updates.redhat.com, and
install them.  New holes will continue to be discovered, so check for
updates very frequently.  Consider using Red Hat's update service, it
costs money but makes it all easier.


-kb



-- 
redhat-list mailing list
unsubscribe mailto:[EMAIL PROTECTED]?subject=unsubscribe
https://listman.redhat.com/mailman/listinfo/redhat-list

Reply via email to