help analyzing an attack

Dave Cramer davec-zxk95TxsVYDyHADnj0MGvQC/G2K4zDHf at public.gmane.org
Wed Apr 18 13:14:56 UTC 2007


I understand what it is, what I'd like to know is how. Are there good  
tools around for checking for rootkits ?

Dave
On 18-Apr-07, at 2:00 AM, Pavel Zaitsev wrote:

> Jamon Camisso(jamon.camisso-H217xnMUJC0sA/PxXw9srA at public.gmane.org)@Wed, Apr 18, 2007 at  
> 12:24:04AM -0400:
>> If it's a compromised root account, you're best off backing up  
>> your data
>> and reinstalling.
>
> I agree with Jamon, as long as most of your data is not code. If it  
> is code,
> there shall be validation of code, if copy of this code is only on  
> that
> system.
> Cheers,
> Pavel
>
>
> -- 
> Create like God. Command like a King. Work like a Slave.
> http://perlpimp.com | http://static.md5.ca/resume.pdf
> --
> The Toronto Linux Users Group.      Meetings: http://gtalug.org/
> TLUG requests: Linux topics, No HTML, wrap text below 80 columns
> How to UNSUBSCRIBE: http://gtalug.org/wiki/Mailing_lists

--
The Toronto Linux Users Group.      Meetings: http://gtalug.org/
TLUG requests: Linux topics, No HTML, wrap text below 80 columns
How to UNSUBSCRIBE: http://gtalug.org/wiki/Mailing_lists





More information about the Legacy mailing list