-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Hello Franz,

If your system has been compromised and the attacker has root access, then
it's possible that he has modified the logs anyway. You might want to
reinstall and this time beef up security.

By the way, there should be no reason to touch /etc/services. Removing
entries there will not close down ports. Other than /etc/inetd, you should
also check the startup scripts as that starts up programs that open ports
up as well.

Cheers.

- -- 
Harold Rodriguez  .:.  [EMAIL PROTECTED]
World Wide Web    .:.  http://it.yorku.ca/moonfrog
GnuPG Key ID      .:.  0x9ECCF021


On Fri, 8 Mar 2002, Franz Alt wrote:

+ Hello,
+
+ We've got a SUSE7.0 PC, which may have been affected by a Hacker. Of course, there 
+is no firewall or any IDS-System :-)
+ The PC is a small Fileserver for some Win2000 PCs (Samba) and a Testserver with 
+Apache. Also running SSH, FTP, X.
+ btw, in the past nobody concerned about security in this small network, because 
+there are no "secrets", we just buid webpages. But some days ago our network 
+(permanent) provider told us, there were incidents from our IP-adresses to others.
+
+ I just began learning security issues (I hope my English is not as bad as my 
+security knowledge).
+
+ Now, I tried to find some traces in /var/messages - none, command "last" - none
+
+ I tried "chkroot" - nothing found,
+
+ tried "kstat" (like ksec for OpenBSD) - I had Problems with the configuration 
+(system.map ...?)
+ but here the output of "kstat":
+ >kstat -M
+ Using /lib/modules/misc/knull.o
+ insmod: a module named knull already exists
+ Module              Address
+ knull               0xd002d000
+ ipv6                0xd0046000
+ 3c59x               0xd0036000
+ serial              0xd0021000
+ usbcore             0xd0000000
+                       0xc02758c0
+ > kstat -m 0xc02758c0
+ Probing memory at 0xc02758c0
+ Name:
+ Size: 0
+ Flags: MOD_RUNNING
+ First Registered Symbol:        drive_info at 0xc02bb660
+
+ I tried to reconfigure /etc/services and /etc/inetd.conf to disallow unwanted 
+services and Ports.
+ Then I made a scan with "superscan" at home via PPP.
+ Besides the installed service-ports there where 2 open Ports shown:
+ 37 and 113. A port-list told me 37 is "time" and 115 is "auth"
+
+ Is my kernel affected or are there any other possibilities than  /etc/services and 
+/etc/inetd.conf to open ports for daemons???
+
+ Is is suitable to scan the PC localy (login via ssh) with tools like nmap, nessus 
+... because i don't wont to get trouble with some Admins?
+
+ I would be thankfull for any hint !
+
+ Franz Alt
+
+
+
+
+
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.6 (GNU/Linux)
Comment: For info see http://www.gnupg.org

iD8DBQE8ioPl8mTSoJ7M8CERAvHYAJsFM9422PoUBJc/UeNBvlXw/uYNJgCeLc0X
gRH9Xl/Lt4m+uBmES8QtVbc=
=R7j8
-----END PGP SIGNATURE-----


Reply via email to