On Fri, 01 Jan 2010 02:44:37 +0100 Brent Clark 
<brentgclarkl...@gmail.com> wrote:
>Machine is running Debian Lenny and its compromised. First thing I 
do is 
>run rkhunter, and it reports everything ok.
>
>I found the scripts in /dev/shm.
>
>Please see attached screenshot. Interesting the person came in on 
user nagios.
>
>I had to find the script by running  command
>
>find . \( -name '*r00t*' -o -name 'ps' -o -name 'ssh-scan'  \)

I'm sorry to see you're disappointed with RKH. Unfortunately your 
email does not reveal much because screenshots usually are way too 
large in size (compared to the value of information they hold). 
What I'm missing is rkhunter version and configuration information, 
suspected process information (if any) like (*attached and 
compressed*) current process, network and open files listings. 
(Feel free to add the listings and a tarball with suspected files 
to a Sourceforge bug tracker ticket.) Without that information 
there is not much that could help us help you. Since the (ab)user 
dumps files as user nagios you could go find out what vulnerable 
parts of your setup are exposed to world. If you don't know where 
to start have a look at 
http://web.archive.org/web/20080109214340/http://www.cert.org/tech_t
ips/intruder_detection_checklist.html.


Best regards,
unSpawn
---


------------------------------------------------------------------------------
This SF.Net email is sponsored by the Verizon Developer Community
Take advantage of Verizon's best-in-class app development support
A streamlined, 14 day to market process makes app distribution fast and easy
Join now and get one step closer to millions of Verizon customers
http://p.sf.net/sfu/verizon-dev2dev 
_______________________________________________
Rkhunter-users mailing list
Rkhunter-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/rkhunter-users

Reply via email to