Home
| Calendar
| Mail Lists
| List Archives
| Desktop SIG
| Hardware Hacking SIG
Wiki | Flickr | PicasaWeb | Video | Maps & Directions | Installfests | Keysignings Linux Cafe | Meeting Notes | Linux Links | Bling | About BLU |
Bill Horne wrote: > David Kramer wrote: >> Bill Horne wrote: >>> Grant M. wrote: >>>> [snip] >>>> The Ubuntu Enterprise server we're using was compromised on a >>>> non-priviledged account once, but there isn't anything installed that >>>> the user could use, so no worries. >>> [snip] >>> >>> While we're on the subject, how did you find out? >> >> The first symptom was I was having problems with MySQL, which >> eventually led to my website not working. >> >> In the end, the point of origin was almost definitely an exploit in >> Zimbra, which is a web-based collaboration tool I installed to check >> out, but never used. I found all sorts of subtle hints, like a new >> zimbra user, which ended up in the /etc/sudoers file, and it was in >> the uucp group and the wheel group. >> >> The attack appears to have happened about three days after I installed >> Zimbra, too. > > Has anyone used a fingerprint verification scheme to check for hacks? > Would it have caught this? You mean like tripwire? That wouldn't have necessarily detected anything, unless a root-kit was installed in such a way as to replace system binaries. But I doubt they'd bother with that unless the attacker was looking for something very specific (ie they have a user targeted and want his password, so they replace the 'login' program). Typical script kiddies just want to install an irc-bot or spam-server, and won't mess with the rest of the system once they have root access. Now something like 'chkrootkit' or rootkit hunter (http://www.rootkit.nl/) may have a better chance. Of course, my musings may be complete baloney...so take them for what they're worth. Matt -- This message has been scanned for viruses and dangerous content by MailScanner, and is believed to be clean.
BLU is a member of BostonUserGroups | |
We also thank MIT for the use of their facilities. |