<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ROOT HACKED in Operating System - Linux</title>
    <link>https://community.hpe.com/t5/operating-system-linux/root-hacked/m-p/3591819#M18934</link>
    <description>rkhunter and chkrootkit are both tools for detecting whatever they might have left.&lt;BR /&gt;&lt;BR /&gt;for security auditing look into nessus.&lt;BR /&gt;&lt;BR /&gt;for tracing accesses use tripwire&lt;BR /&gt;&lt;BR /&gt;for gaining security, look at Your applications, as an example of steps involved:&lt;BR /&gt;&lt;BR /&gt;chroot apache &lt;BR /&gt;in it's startup script create a port-forward&lt;BR /&gt;from port 80 to 8080&lt;BR /&gt;create a non-priveleged user for it.&lt;BR /&gt;set it to listen on 8080&lt;BR /&gt;give it an own tmpdir and another one for i.e. php sessions&lt;BR /&gt;THEN start to lock it down apache/php-wise :)&lt;BR /&gt;&lt;BR /&gt;</description>
    <pubDate>Thu, 28 Jul 2005 09:00:59 GMT</pubDate>
    <dc:creator>Florian Heigl (new acc)</dc:creator>
    <dc:date>2005-07-28T09:00:59Z</dc:date>
    <item>
      <title>ROOT HACKED</title>
      <link>https://community.hpe.com/t5/operating-system-linux/root-hacked/m-p/3591817#M18932</link>
      <description>Last night my Linux RH9 server was hacked. Someoned gained access (don't) know how yet. But I tracked the IP address that they set up for proxy to Asia and Indonesia. My root account was changed and they created all kinds of new files in /sbin and in networking. Doesn't look like anything destructive however I still need to lock it down. This box has no services running on it. No rlogin, rexec, ftp etc....&lt;BR /&gt;&lt;BR /&gt;Is there a product I can use or process to use to help eliminate this act of someone getting to my root account?</description>
      <pubDate>Thu, 28 Jul 2005 08:40:32 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/root-hacked/m-p/3591817#M18932</guid>
      <dc:creator>Nobody's Hero</dc:creator>
      <dc:date>2005-07-28T08:40:32Z</dc:date>
    </item>
    <item>
      <title>Re: ROOT HACKED</title>
      <link>https://community.hpe.com/t5/operating-system-linux/root-hacked/m-p/3591818#M18933</link>
      <description>Recommendations:&lt;BR /&gt;&lt;BR /&gt;1) Leave the root account disabled when you don't need to use it. You can re-enable it from the console right before you need to use it.&lt;BR /&gt;&lt;BR /&gt;2) tripwire: It can spot changes and alert you early in the process of being hacked. You can set it up to check on a daily basis or more often. I use it once a day.&lt;BR /&gt;&lt;BR /&gt;3) checkrootkit - available from rpm or Linux distribution provider or yum. It helps spot the damage&lt;BR /&gt;&lt;BR /&gt;4) Disable root access accept for console access. This is practical only if you have physical acess to the box.&lt;BR /&gt;&lt;BR /&gt;SEP&lt;BR /&gt;Israel</description>
      <pubDate>Thu, 28 Jul 2005 08:48:40 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/root-hacked/m-p/3591818#M18933</guid>
      <dc:creator>Steven E. Protter</dc:creator>
      <dc:date>2005-07-28T08:48:40Z</dc:date>
    </item>
    <item>
      <title>Re: ROOT HACKED</title>
      <link>https://community.hpe.com/t5/operating-system-linux/root-hacked/m-p/3591819#M18934</link>
      <description>rkhunter and chkrootkit are both tools for detecting whatever they might have left.&lt;BR /&gt;&lt;BR /&gt;for security auditing look into nessus.&lt;BR /&gt;&lt;BR /&gt;for tracing accesses use tripwire&lt;BR /&gt;&lt;BR /&gt;for gaining security, look at Your applications, as an example of steps involved:&lt;BR /&gt;&lt;BR /&gt;chroot apache &lt;BR /&gt;in it's startup script create a port-forward&lt;BR /&gt;from port 80 to 8080&lt;BR /&gt;create a non-priveleged user for it.&lt;BR /&gt;set it to listen on 8080&lt;BR /&gt;give it an own tmpdir and another one for i.e. php sessions&lt;BR /&gt;THEN start to lock it down apache/php-wise :)&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Thu, 28 Jul 2005 09:00:59 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/root-hacked/m-p/3591819#M18934</guid>
      <dc:creator>Florian Heigl (new acc)</dc:creator>
      <dc:date>2005-07-28T09:00:59Z</dc:date>
    </item>
    <item>
      <title>Re: ROOT HACKED</title>
      <link>https://community.hpe.com/t5/operating-system-linux/root-hacked/m-p/3591820#M18935</link>
      <description>Can't find the checkrootkit.&lt;BR /&gt;I am looking on rpmfind.net</description>
      <pubDate>Thu, 28 Jul 2005 09:08:03 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/root-hacked/m-p/3591820#M18935</guid>
      <dc:creator>Nobody's Hero</dc:creator>
      <dc:date>2005-07-28T09:08:03Z</dc:date>
    </item>
    <item>
      <title>Re: ROOT HACKED</title>
      <link>https://community.hpe.com/t5/operating-system-linux/root-hacked/m-p/3591821#M18936</link>
      <description>The best solution would be to strip the OS, reformat, reload the OS, install all these tools, update everything, then put on the network. Make sure all traces of intrusion are gone. &lt;BR /&gt;&lt;BR /&gt;This is not always possible...&lt;BR /&gt;&lt;BR /&gt;ckroot and tripwire are very good tools.&lt;BR /&gt;</description>
      <pubDate>Thu, 28 Jul 2005 09:23:55 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/root-hacked/m-p/3591821#M18936</guid>
      <dc:creator>Rick Garland</dc:creator>
      <dc:date>2005-07-28T09:23:55Z</dc:date>
    </item>
    <item>
      <title>Re: ROOT HACKED</title>
      <link>https://community.hpe.com/t5/operating-system-linux/root-hacked/m-p/3591822#M18937</link>
      <description>as I wrote, it's called chkrootkit :)</description>
      <pubDate>Thu, 28 Jul 2005 12:22:50 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/root-hacked/m-p/3591822#M18937</guid>
      <dc:creator>Florian Heigl (new acc)</dc:creator>
      <dc:date>2005-07-28T12:22:50Z</dc:date>
    </item>
    <item>
      <title>Re: ROOT HACKED</title>
      <link>https://community.hpe.com/t5/operating-system-linux/root-hacked/m-p/3591823#M18938</link>
      <description>Robert,&lt;BR /&gt;&lt;BR /&gt;You can get chkrootkit here:&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://www.chkrootkit.org/" target="_blank"&gt;http://www.chkrootkit.org/&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;JP&lt;BR /&gt;</description>
      <pubDate>Thu, 28 Jul 2005 15:03:25 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/root-hacked/m-p/3591823#M18938</guid>
      <dc:creator>John Poff</dc:creator>
      <dc:date>2005-07-28T15:03:25Z</dc:date>
    </item>
    <item>
      <title>Re: ROOT HACKED</title>
      <link>https://community.hpe.com/t5/operating-system-linux/root-hacked/m-p/3591824#M18939</link>
      <description>If possible check for vulnerabilities in ur installation by using some tools like nessus vulnerability scanner , which will tell u whether anything is open to the outside world and how u can fix it.</description>
      <pubDate>Thu, 28 Jul 2005 22:28:32 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/root-hacked/m-p/3591824#M18939</guid>
      <dc:creator>Bejoy C Alias</dc:creator>
      <dc:date>2005-07-28T22:28:32Z</dc:date>
    </item>
  </channel>
</rss>

