On Fri, 2 Jan 2004, Daniel McAferty wrote:
> I downloaded the chkrootkit program you suggested earlier,
> and it looks like I may have some problems with infected
> files and "possible rootkits" installed.
...
> Now what do I do to fix or verify?
Try verifying with "rpm -V" that I suggested in earlier email. (Hopefully,
your rpm is not compromised too.)
I'd suggest you take your system off the network. You may want to run
your own safe (installed to yoru homr directory or from a CD for
example) tcpdump and netstat first and record some information on who is
abusing you.
You may want to simply unplug the box. Don't use halt or shutdown because
they may be compromised too.
Have a look at:
http://www.cert.org/tech_tips/root_compromise.html
http://secinf.net/unix_security/Linux_Security_HOWTO/Linux_Security_HOWTO__What_To_Do_During_and_After_a_Breakin.html
http://www.linuxsecurity.com/docs/harden-doc/html/securing-debian-howto/ch-after-compromise.en.html
Jeremy C. Reed
http://bsd.reedmedia.net/