home *** CD-ROM | disk | FTP | other *** search
- From: chip@eniac.seas.upenn.edu (Charles H. Buchholtz)
- Newsgroups: comp.unix.admin
- Subject: Re: Cracked accounts
- Keywords: intruder security CERT
- Message-ID: <54618@netnews.upenn.edu>
- Date: 29 Oct 91 13:44:22 GMT
- References: <860@cert.sei.cmu.edu>
- Organization: University of Pennsylvania
-
- In article <860@cert.sei.cmu.edu> ecd@cert.sei.cmu.edu (Edward DeHart) writes:
- >
- >When examining files on your system, please do not stop with just the files
- >in the cracked account. Check the /etc/passwd file for uid changes or
- >new accounts. Check the /etc/inetd.conf file for modifications such as
- >the TFTP daemon being enabled or a service that executes /bin/sh or /bin/csh.
-
- And check all file systems for files owned by the cracked user. It's
- easy to hide a setuid shell somewhere.
-
- The easiest thing to do is to run COPS regularly, and immediately
- after discovering a breakin. I believe that COPS makes all of the
- above checks, and then some.
-
-
- Charles H. Buchholtz Systems Programmer chip@seas.upenn.edu
- School of Engineering and Applied Science
- University of Pennsylvania
-
-
-
-