On Tue, 31 Jul 2007 18:32:12 +0200 Eddy Belew <[EMAIL PROTECTED]> 
wrote:
>I should know better. Former employee loaded and configured this 
>system...

>Running RHL 9 (very old, I know) using cPanel as a web 
server/nameserver...
>Rootkit Hunter 1.2.9 is running.. One website on it had/has been 
>hacked.

Running a deprecated distribution, putting a webserver on a 
nameserver, email that doesn't get tended to, a website getting 
compromised... steep learning curve I'd say if you're not really 
into GNU/Linux.


>Strange things happen with email users. Email might stop 
>altogether, or some
>can't send mail and get an error 500 because of dictionary attack. 
>Solution
>always seems to be reboot system. Solves everything for a day or 
>two and
>then back, so I just restart the server every morning.
>Everytime I restart the system I get emails stating httpd, ftpd, 
>and cpsrvd
>on the system failed. Although all sites and ftp seems to be 
>working.

Sorry to say but restarting a server does only address the 
symptoms, not the cause. It won't go away unless you deal with it, 
decisively.


>I do have a new suse 10 server box (with subscription) loaded but 
>not online
>to move things over once I figure out/learn how. I just want to 
>make sure I
>don't transfer anything bad to the new system. So backup and 
>reload may be
>the only option.


>One email contains:
> 
>Running updater...

Next time please attach instead of pasting it in the email body. 
Makes it easier to read. Also for Rootkit Hunter please attach the 
*logfile* not the cronjob or stdout output. Pieces I picked from 
the output:

Rootkit Hunter 1.2.9 is running
/bin/dmesg [ BAD ]
/bin/kill [ BAD ]
/bin/login [ BAD ]
/bin/mount [ BAD ]

We've talked about these. I gave you a CERT URI. Please read first. 
Then investigate.


* Trojan specific characteristics
shv4
* Suspicious file properties
chmod properties
Scanning for hidden files... [ Warning! ]
---------------
/etc/.pwd.lock
/etc/.whostmgrft
/etc/.java
---------------
Please inspect: /etc/.java (directory)

Looking at the name alone all three seem valid. However you should 
still verify package contents. If the files don't belong to any 
package then save file information (stat, file, MD5sum) and perform 
visual inspection.


Application advisories
* Check: SSH
Searching for sshd_config...
Found /etc/ssh/sshd_config
Checking for allowed root login... Watch out Root login possible. 
Possible risk!
info: No 'PermitRootLogin' entry found in file /etc/ssh/sshd_config
Hint: See logfile for more information about this issue

See the logfile. Change RootLogin value in/etc/ssh/sshd_config. Do 
not ask how: read the FAQ.


>Another email contains:
>
>Security Violations
(..)
>Unusual System Events

Logcheck. Nothing I see at first glance that's a #1 priority.



>And yet another email contains:
(..)
>/usr/lib/php/.channels/.alias INFECTED (PORTS: 465)
>
>You have 20 process hidden for ps command
>
>chkproc: Warning: Possible LKM Trojan installed The tty of the 
>following
>user process(es) were not found in /var/run/utmp !

Chkrootkit. Hidden processes may be false positives (see the 
Chkrootkit FAQ). Repeat. Getty's not found in /var/run/utmp is also 
a valid situation if the getty's can be validated as known-good 
files.


Please please please read the first CERT URI I gave you and inspect 
the box using it as a checklist. 


TIA, unSpawn

--
Save hundreds on a Study Abroad Program - Click here.
http://tagline.hushmail.com/fc/Ioyw6h4dFF9dMjcQqEtVSBz8MAlo7smCLGlBnXHn6L72MBhzv3Oh3a/


-------------------------------------------------------------------------
This SF.net email is sponsored by: Splunk Inc.
Still grepping through log files to find problems?  Stop.
Now Search log events and configuration files using AJAX and a browser.
Download your FREE copy of Splunk now >>  http://get.splunk.com/
_______________________________________________
Rkhunter-users mailing list
Rkhunter-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/rkhunter-users

Reply via email to