So a server I maintain got broken into a few days ago, and I ran
rkhunter as part of my attempt to figure out what the attackers actually
did.  It didn't find anything.  The next day, I discover that sshd was
clearly modified with a backdoor.  The problem I have is that I realized
I was running rkhunter 1.3.0 (which was the current version in the
Ubuntu repository), not the newest 1.3.4.  I've installed 1.3.4 in a
directory, but is there any way to run it on the compromised file
without actually having to copy the compromised sshd back to
/usr/sbin/sshd?  

If someone tells me how to run it on that file, and rkhunter does NOT
detect it, is there a process to submit the file so that it can be
detected in the future?

Thanks,

Jeff

------------------------------------------------------------------------------
Open Source Business Conference (OSBC), March 24-25, 2009, San Francisco, CA
-OSBC tackles the biggest issue in open source: Open Sourcing the Enterprise
-Strategies to boost innovation and cut costs with open source participation
-Receive a $600 discount off the registration fee with the source code: SFAD
http://p.sf.net/sfu/XcvMzF8H
_______________________________________________
Rkhunter-users mailing list
Rkhunter-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/rkhunter-users

Reply via email to