Russ Kay wrote:

Well, I just got a phone call stating that my server has gone over its monthly bandwidth limit by 2TB. Taking into affect the amount of bandwidth I used, there are 2.3TB of unaccounted activity. I did a few checks to see what is going on (mainly to see if there are root kits or sniffers). I checked the log and saw a lot of ssh activity (all denials though). I am currently maxing out my pipe and need to stop this. So my question is what should one actually do to see how his/her box is compromised? What should I check, in which order should I check?

Any help is very much appreciated.

-Russ Kay

To try to determine the extent of damage, you can try verifying the rpm packages:
something like:
 rpm  -V -a

and look at the output, in particular, for "5" entries - indicating a checksum error - difference between what was actually istalled and what is there now - on system binary
files  e.g.  ls, cd, login, su...

keeping in mind that there will be legitimate differences in some files - mostly config type files.

Also, every file on your system is suspect, so you may want to actually add a new, clean "rpm" executable (using knoppix or something) and use that for your verify. You can try running with the existing rpm package and if you do see changes on major system executables, you can probably believe those. If you see nothing suspicious, you may want to go through the extra work of using
a "clean" rpm.

Also, it is easy to configure your system to save your system logs to another machine, since one
of the first things hackers may do is change or edit your local system logs.

Gary Whitten
[EMAIL PROTECTED]

Reply via email to