lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <871080DEC5874D41B4E3AFC5C400611E06B476F9@UTDEVS02.campus.ad.utdallas.edu>
From: pauls at utdallas.edu (Schmehl, Paul L)
Subject: Rootkit

> -----Original Message-----
> From: David Hane [mailto:dlhane@...global.net] 
> Sent: Friday, September 26, 2003 3:57 PM
> To: full-disclosure@...ts.netsys.com
> Subject: [Full-Disclosure] Rootkit
> 
> 
> Hi all,
> 
> I recently had a machine get hacked before I could finish 
> installing all the 
> damn remote-root exploit patches that have been released in 
> the last week. I've done the forensics and I know how they 
> got in and what they did but I 
> would like to know what rootkit they used.
> 
> Can anyone recommend a good scanner or info site where I can 
> compare some of 
> the binaries I saved (the machine has been wiped)?

This is a great tool for many things, not just forensics.  Everyone who
has to do investigations or restorations should have a current copy.
http://fire.dmzs.com/

You might also want to get chkrootkit.
http://www.chkrootkit.org/ (This sometimes doesn't respond.)
http://www.pangeia.com.br/download.htm (You can also get it here.)

Paul Schmehl (pauls@...allas.edu)
Adjunct Information Security Officer
The University of Texas at Dallas
AVIEN Founding Member
http://www.utdallas.edu/~pauls/ 


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ