On Thu, Jan 26, 2012 at 08:37, Lynda <shr...@deaddrop.org> wrote:

> On 1/26/2012 2:29 AM, Dan Foster wrote:
>
>> Hot Diggety! Tom Perrine was rumored to have written:
>>
>>> On Tue, Jan 24, 2012 at 12:08 PM, Dan Schlitt<d...@2600c.com>  wrote:
>>
>>  Thanks for all the suggestions. Reinstalling didn't seem to change
>>>> anything, To take care of the file I just pointed it to /devnull.
>>>>
>>>
> If you haven't done the full system re-install, you really need to go
>>
>> that route.
>>>
>>
>        Tom speaks the absolute truth. From what you've described so
>> far, you've been compromised badly.
>>
>
> I can't believe this discussion is still going on. Let me add yet another
> voice here. It's pre-caffeinated, so I'm trying to be on my good behavior.
>

It may be pre-caffeinated, but it's dead on target.  That machine is not
trustworthy, period.

To the OP:

Duplicate the hard drives if you want to perform forensics, then nuke and
pave.  Ideally, restore only from trusted media, not from anything that was
actually on the compromised system.  DO NOT TRUST ANYTHING ON THE
COMPROMISED SYSTEM.

BTW, there is no aes1.h; it's fairly obviously hoping someone will miss the
difference between aes.h and asn1.h.  I've seen this kind of thing
(including using a supposed include file, which is a slight modification of
multiple standard file names chosen for maximum eyeglaze factor) on a bunch
of compromised systems (lots of that in the undergrad labs...); someone
gets an irony point for hiding it in the openssl hierarchy.  :)

-- 
brandon s allbery                                      allber...@gmail.com
wandering unix systems administrator (available)     (412) 475-9364 vm/sms
_______________________________________________
Tech mailing list
Tech@lists.lopsa.org
https://lists.lopsa.org/cgi-bin/mailman/listinfo/tech
This list provided by the League of Professional System Administrators
 http://lopsa.org/

Reply via email to