jsr wrote:
All signs point to him being compromised though. The atack program is a ssh cracking tool and part of the unixcod package. You can find it at
http://www.bart-design.co.uk/unixcod/Quote:
There are several other people that have had similar messages appear in their logs and they were all compromised too. I posted a link to one earlier. Here is another that found atack running in "/var/tmp/ ....... / . /unixcod/atack":/
http://ibot.rikers.org/%23debian/20080502.html.gzI didn't know that, even after googling for 'atack'. Thanks!
Quote:
While I agree he needs to figure out how he got compromised in order to patch and protect against it in the future, telling him that he was simply DoS'd and to not worry about it is not very good advice either.
In no way did I say that it wasn't anything to worry about. I specificially stated that with the information that was provided, the issue was difficult to analyze. Up to the point where I chimed in, there was nothing in the thread that suggested what you did up above. I live in a world where what's in your face is what you act upon...no data to act on hinders the process of analysis. Based on the facts provided at that time, it appeared to be a DoS to me, especially looking at the conntrack log entry.
As I said before, just posting an obscure kernel log entry by itself doesn't mean that a machine has been cracked.
Thanks for updating this thread with further info, though...it helps a ton in understanding what's going on.[/quote]