does chkrootkit properly detect a promisc interface?

2003-12-17 Thread Jordan Lederman
While doing some normal system maintenance on a box of mine that primarily runs snort as an ids, I ran chkrootkit which ran cleanly, reporting nothing out of the ordinary. Normally this is a good thing, but then I got to thinking that if I am running snort, than I am in promiscuous mode and

does chkrootkit properly detect a promisc interface?

2003-12-17 Thread Jordan Lederman
While doing some normal system maintenance on a box of mine that primarily runs snort as an ids, I ran chkrootkit which ran cleanly, reporting nothing out of the ordinary. Normally this is a good thing, but then I got to thinking that if I am running snort, than I am in promiscuous mode and

Re: OT: An Idea for an IDS

2003-07-01 Thread Jordan Lederman
Check out psad, which is similar to what you want (and I use it)... You can see psad at http://www.cipherdyne.com/psad/, which is somehow related to Bastille Linux http://www.bastille-linux.org/. Or just apt-get install psad. --jordan On Mon, Jun 30, 2003 at 06:38:33PM -0400,

Re: OT: An Idea for an IDS

2003-07-01 Thread Jordan Lederman
Check out psad, which is similar to what you want (and I use it)... You can see psad at http://www.cipherdyne.com/psad/, which is somehow related to Bastille Linux http://www.bastille-linux.org/. Or just apt-get install psad. --jordan On Mon, Jun 30, 2003 at 06:38:33PM -0400,

Re: Follow up on the NCSDRecover DDOS perl script

2003-06-19 Thread Jordan Lederman
Robert, The only way to truly recover from a break-in, is to fully restore the system from a trusted medium. That being said, here's what your script does: 1) Hide it's name in the process table as '/usr/sbin/nscd ' (100 spaces). 2) Bind to UDP port 1337 in

Re: Probable SSH Vulnerability

2003-06-13 Thread Jordan Lederman
TIm, If I were in your shoes, the first thing i'd do is set up a small honeypot with a similar configuration to your other machines. Run the same services, as you have running on your other woody boxen, but just don't use it for anything. This way it will appear like 'just another one'

Re: Probable SSH Vulnerability

2003-06-13 Thread Jordan Lederman
TIm, If I were in your shoes, the first thing i'd do is set up a small honeypot with a similar configuration to your other machines. Run the same services, as you have running on your other woody boxen, but just don't use it for anything. This way it will appear like 'just another one'

Re: scan

2003-04-10 Thread Jordan Lederman
Where you using nmap's -O flag? If so try w/o it. --jordan On Thursday 10 April 2003 1:33 pm, danilo lujambio wrote: Hi ; I have experimented a strange situation in one of the servers It runs debian woody (kernel bf24) When I scanned with nmap this server ,

Re: Maybe an intruder?

2003-03-29 Thread Jordan Lederman
At first glance, it looks perfectly normal. You just seemed to have installed some sort intruder monitor/ids and you'll see things like this for a while until you establish a good working baseline. --jordan On 29 Mar 2003, Cau de Alencar wrote: The syslog entries below

Re: Maybe an intruder?

2003-03-29 Thread Jordan Lederman
At first glance, it looks perfectly normal. You just seemed to have installed some sort intruder monitor/ids and you'll see things like this for a while until you establish a good working baseline. --jordan On 29 Mar 2003, Cau de Alencar wrote: The syslog entries below