Re: attack 2

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Tuesday 10 May 2005 09:41 pm, Leonard Isham wrote:
> On 5/10/05, roland brouwers <roland@xxxxxx> wrote:
> > Hello everyone,
> >
> > Panic...
> >
> > I noticed accepted passwords for different users, such as root, myself
> > and another one, coming from outside:::ffff:213.219.168.50
> >
> > How is that possible?
> > Can I detect somehow what he/she did?
> >
> > In the mean time I changed passwords.
>
Changing passwords now does nothing.

> The only way to guarantee that the system is not longer compromised is
> to reload the OS.
>
I'll have to agree. 
> --
> Leonard Isham, CISSP
> Ostendo non ostento.

The only issue would be data and files needed and irreplaceable S.A. work 
files, letters, journals, etc., but, no executables bin, script, config 
files, etc. All these may well have been downloaded by the cracker.

Scan them before and after removal (put them on a cdrom, tape, or the like 
mass storage unit. Reload them only as needed and as you can verify their 
cleanness.

It would be better if you could declare the system a total loss.
-- 
John H Ludwig

Common sense is so rare, why do they call it common!!!



[Index of Archives]     [Current Fedora Users]     [Fedora Desktop]     [Fedora SELinux]     [Yosemite News]     [Yosemite Photos]     [KDE Users]     [Fedora Tools]     [Fedora Docs]

  Powered by Linux