[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [cobalt-users] Detecting openssl Apache worm (slapper) automatically on your RaQs
- Subject: Re: [cobalt-users] Detecting openssl Apache worm (slapper) automatically on your RaQs
- From: Harry <harryl_2001@xxxxxxxxx>
- Date: Wed Sep 18 12:42:03 2002
- List-id: Mailing list for users to share thoughts on Sun Cobalt products. <cobalt-users.list.cobalt.com>
--- "Michelle A. Hoyle" <mahlist@xxxxxxxxxxxxx> wrote:
> The latest release of ChkRootKit (0.37) now detects
> the Apache
> OpenSSL worm (slapper) when run. The latest version
> is an easy
> install on a RaQ. Here's a set of instructions to
> help you install
> it, use it, and get it automated.
>
> Product Name: Chkrootkit-0.37
> Web page: http://www.chkrootkit.org/
> System Requirements: Intel-based RaQ boxes (3 & 4
> for sure).
I followed the instructions and ran chkroot with the
following results on a RAQ2. Please see the PASSWD
entry. Nothing else appears to be wrong. What should
I do now??
thanks,
Harry
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Checking `amd'... not found
Checking `basename'... not infected
Checking `biff'... not found
Checking `chfn'... not infected
Checking `chsh'... not infected
Checking `cron'... not infected
Checking `date'... not infected
Checking `du'... not infected
Checking `dirname'... not infected
Checking `echo'... not infected
Checking `egrep'... not infected
Checking `env'... not infected
Checking `find'... not infected
Checking `fingerd'... not infected
Checking `gpm'... not found
Checking `grep'... not infected
Checking `hdparm'... not infected
Checking `su'... not infected
Checking `ifconfig'... not infected
Checking `inetd'... not infected
Checking `inetdconf'... not infected
Checking `identd'... not found
Checking `killall'... not infected
Checking `ldsopreload'... can't exec ./strings-static,
not tested
Checking `login'... not infected
Checking `ls'... not infected
Checking `lsof'... not found
Checking `mail'... not infected
Checking `mingetty'... not found
Checking `netstat'... not infected
Checking `named'... not infected
Checking `passwd'... INFECTED
Checking `pidof'... not infected
Checking `pop2'... not found
Checking `pop3'... not found
Checking `ps'... not infected
Checking `pstree'... not infected
Checking `rpcinfo'... not infected
Checking `rlogind'... not infected
Checking `rshd'... not infected
Checking `slogin'... not infected
Checking `sendmail'... not infected
Checking `sshd'... not infected
Checking `syslogd'... not infected
Checking `tar'... not infected
Checking `tcpd'... not infected
Checking `top'... not infected
Checking `telnetd'... not infected
Checking `timed'... not found
Checking `traceroute'... not infected
Checking `w'... not infected
Checking `write'... not infected
Checking `aliens'... no suspect files
Searching for sniffer's logs, it may take a while...
nothing found
Searching for HiDrootkit's default dir... nothing
found
Searching for t0rn's default files and dirs... nothing
found
Searching for t0rn's v8 defaults... nothing found
Searching for Lion Worm default files and dirs...
nothing found
Searching for RSHA's default files and dir... nothing
found
Searching for RH-Sharpe's default files... nothing
found
Searching for Ambient's rootkit (ark) default files
and dirs... nothing found
Searching for suspicious files and dirs, it may take a
while...
/usr/lib/perl5/site_perl/mips-linux/auto/Net/.packlist
/usr/lib/perl5/site_perl/mips-linux/auto/Convert/BER/.packlist
/usr/lib/perl5/site_perl/mips-linux/auto/Digest/MD5/.packlist
/usr/lib/perl5/site_perl/mips-linux/auto/FCGI/.packlist
/usr/lib/perl5/site_perl/mips-linux/auto/Filter/.packlist
/usr/lib/perl5/site_perl/mips-linux/auto/HTML/Embperl/.packlist
/usr/lib/perl5/site_perl/mips-linux/auto/HTML/Parser/.packlist
/usr/lib/perl5/site_perl/mips-linux/auto/IO-stringy/.packlist
/usr/lib/perl5/site_perl/mips-linux/auto/MIME/Base64/.packlist
/usr/lib/perl5/site_perl/mips-linux/auto/MIME-tools/.packlist
/usr/lib/perl5/site_perl/mips-linux/auto/Mail/.packlist
/usr/lib/perl5/site_perl/mips-linux/auto/Text/.packlist
/usr/lib/perl5/site_perl/mips-linux/auto/TimeDate/.packlist
/usr/lib/perl5/site_perl/mips-linux/auto/URI/.packlist
/usr/lib/perl5/site_perl/mips-linux/auto/VRML/.packlist
/usr/lib/perl5/site_perl/mips-linux/auto/libwww-perl/.packlist
/usr/lib/perl5/site_perl/mips-linux/auto/perl-ldap/.packlist
/usr/lib/perl5/site_perl/mips-linux/auto/MD5/.packlist
Searching for LPD Worm files and dirs... nothing found
Searching for Ramen Worm files and dirs... nothing
found
Searching for Maniac files and dirs... nothing found
Searching for RK17 files and dirs... nothing found
Searching for Ducoci rootkit... nothing found
Searching for Adore Worm... nothing found
Searching for ShitC Worm... nothing found
Searching for Omega Worm... nothing found
Searching for Sadmind/IIS Worm... nothing found
Searching for MonKit... nothing found
Searching for Showtee... nothing found
Searching for OpticKit... nothing found
Searching for T.R.K... nothing found
Searching for Mithra... nothing found
Searching for OBSD rk v1... nothing found
Searching for anomalies in shell history files...
Warning: `//root/.bash_history' file size is zero
nothing found
Checking `asp'... not infected
Checking `bindshell'... not infected
Checking `lkm'... not tested: can't exec ./chkproc
Checking `rexedcs'... not found
Checking `sniffer'... not tested: can't exec
./ifpromisc
Checking `wted'... nothing deleted
Checking `scalper'... not infected
Checking `slapper'... not infected
Checking `z2'...
nothing deleted
__________________________________________________
Do you Yahoo!?
Yahoo! News - Today's headlines
http://news.yahoo.com