Thanks for the input. Going further on the security search though, I
ran nmap on <a href="http://127.0.0.1">127.0.0.1</a> and found some open ports, some flagged as
security risks and "holes" <br>
<br>
On port 10000 I found reference to PID 8923/perl running .... well, I
do not know. Nessus put out screeds of information about domino
databases:<br>
<br>
<meta http-equiv="CONTENT-TYPE" content="text/html; charset=utf-8"><title></title><meta name="GENERATOR" content="OpenOffice.org 1.1.3 (Linux)"><meta name="CREATED" content="20050808;15510100"><meta name="CHANGED" content="16010101;0">
<style>
<!--
@page { size: 21cm 29.7cm; margin: 2cm }
PRE.cjk { font-family: "????", "MSung Light SC", "Cumberland", "Courier New", "Courier", "Lucida Sans Typewriter", "Lucida Typewriter", "Monaco", "Monospaced", monospace }
P { margin-bottom: 0.21cm }
-->
</style>
<pre style="font-family: times new roman,serif; font-style: italic;" class="western"><font size="2">Warning|We found the following domino databases :<br>/log.nsf this must be considered a security risk since the server log can be retrieved
<br>/setup.nsf this must be considered a security risk since the server might be <br>configured remotely or the current setup might be downloaded<br>/catalog.nsf this must be considered a security risk since the list of databases
<br>in the server can be retrieved<br>/statrep.nsf this must be considered a security risk since the reports generated <br>by administrators can be read anoymously<br>/names.nsf this must be considered a security risk since the users and groups in the
<br> server can be accessed anonymously, in some cases, access to the hashed passwords<br> will be possible</font></pre>
<font style="font-family: times new roman,serif;" size="2">I searched
for these files and found them nowhere on my computer. There was a
reference to files on another server .... but I am using a single
computer as a server, networked with a windows box which has no
connection to the net. There were references to files of commercial
significance - DCShop? - and so on. So I must assume there has been
placed some nasty on my box, especially as the intruding box was a RH
user. <br>
<br>
1. Is this assumption correct?<br>
2. Having shut off those ports after:<br>
<br>
# netstat -tlp<br>
# kill -9 <PID of associated process><br>
<br>
I would like to find what has been placed (if anything) ... but after <br>
# updatedb <br>
<br>
I can find nothing untoward using <br>
<br>
# locate <name><br>
<br>
Am I being paranoid? <br>
<br>
Brian<br>
</font><br><div><span class="gmail_quote">On 8/8/05, <b class="gmail_sendername">Matt Patterson</b> <<a href="mailto:matt@v8zman.com">matt@v8zman.com</a>> wrote:</span><blockquote class="gmail_quote" style="border-left: 1px solid rgb(204, 204, 204); margin: 0pt 0pt 0pt 0.8ex; padding-left: 1ex;">
Hey Brian,<br><br>I don't know a whole lot about the hardening stuff, I simply run minimal<br>services, mostly on incorrect ports, maintain good passwords, and keep<br>up to date. For the majority of us I think that is good for the 5 nines
<br>(99.999%) of hackers.</blockquote><div><br>
I would have thought so until I began looking at this more seriously. Perhaps I just need mor medication?<br>
</div><br><blockquote class="gmail_quote" style="border-left: 1px solid rgb(204, 204, 204); margin: 0pt 0pt 0pt 0.8ex; padding-left: 1ex;">As for your plans of hitting them back, don't bother, you would just be<br>hitting some poor unsuspecting sap who already has the problem of a
<br>computer that is operating way too slowly with three million pop ads.<br>Most of the breakin attempts you recieve will be from zombie machines<br>doing automated scans of ip space.</blockquote><div><br>
Yes. Point taken. <br>
</div><br><blockquote class="gmail_quote" style="border-left: 1px solid rgb(204, 204, 204); margin: 0pt 0pt 0pt 0.8ex; padding-left: 1ex;">Your best approach is to locate the root domain or isp and send a quick<br>email with logs reporting that the computer has been compromised. The
<br>ISP will pull them from the net, and the owner will be notified.</blockquote><div><br>
Many thanks for the feedback<br>
<br>
Brian <br>
</div><br></div><br>