On Sat, 3 Feb 2001 [EMAIL PROTECTED] wrote:

>Hi.
>       I just realized that someone entered my debian box with
>cablemodem. I couldn't find anything in the logs, but the pump package was
>deleted.

If you've truly been cracked, of course you can't find anything in the
logs.  That's one of the first things a rootkit takes out. Then it takes
out the tools to dissect additional logs.  What catches me weird about
this is that the cracker basically nuked your connection: Cable uses DHCP
(pump) pretty regularly, so it'd be stupid for them to take out one of the
things that kept your box up on the 'net.  Basically, the cracker WANTS
your box to be up and online as much as possible once they're in.  I'd
have a look at some more pedestrian reasons that pump was taken out
first (like a bad sector on your disk or a bad $PATH)...

>       I replaced inetd for xinetd. took off services I didnt't use (It
>was left all default, as I installed in a rush), and now I'd like a good
>intrusion detection system.

snort works.  ippl, portsentry are some good "pre-IDS"es...

>       I'd like to hear about any advices about not security (too wide)
>but tools to run in cron and which may be usefull for this kind of
>situations.

tripwire to make sure the disk image doesn't change, reinstallation of
your computer (all of it: you have no idea what's been trojaned), cracklib
to ensure that your passwords are hardened.  Security isn't something you
install on your computer, it's something you install in your sysadmin's
mind (usually yourself in a singly owned computer).

>Thanks!
>
>
>

-- 
Artificial intelligence is no match for natural stupidity.

Who is John Galt?  [EMAIL PROTECTED], that's who!

Reply via email to