[Techtalk] Server was broken into ... what good tools are there to probe vulnerabilities?

Michael Carson mikecarson at usa.net
Wed Nov 21 15:33:57 EST 2001


Raven, corporate courtesan wrote:

>Heya --
>
>Quoth Jeff Dike (Wed, Nov 21, 2001 at 01:55:46PM -0500):
>
>>raven at oneeyedcrow.net said:
>>
>>>Then reinstall from original source media and restore your backups of
>>>data.
>>>
>>Backups are suspect if you don't know for how long you've been rooted.
>>
>
>	They can be, yah.  That's why I specified backups of data, and
>no binaries.  (Read: nothing executable.  Check all your scripts, too.)
>That lessens your risk of having a backdoor on there -- even if they
>have one in your data, if it's not +x it can't (to the best of my
>knowledge) do anything.
>
    The only thing I can think of is that a shell script that is not 
marked executable can be executed with the source command, or by 
specifying it on a shell's command line.  OTOH, if the bad guys can do 
*that* there are already larger issues.  :)

C.







More information about the Techtalk mailing list