Re: Compromised FBSD/Apache

From: Greg A. Woods (woodsat_private)
Date: Mon Nov 18 2002 - 09:49:09 PST

  • Next message: Oliver Friedrichs: "DeepSight Analyzer 4.0 Announcement"

    [ On Saturday, November 16, 2002 at 08:11:44 (-0900), Greg S. Wirth wrote: ]
    > Subject: Compromised FBSD/Apache
    >
    > Hello...
    > November 14, 2002 I noticed a service running on port 127/tcp.
    > The box runs only Apache, no SSL.
    > Only open ports before this were 21/22/80
    > PHP was installed 5 days prior to this.
    > PHP runs in safemode.
    > I run netstat -an every morning, which is how I found the issue.
    
    "fstat" is your friend -- it can tell you which process holds the
    listening socket descriptor.  On FreeBSD you have to use 'netstat -aAn'
    first to find the address of the protocol control block (PCB), and then
    grep for that in the output of 'fstat'.  For example:
    
    12:44 [6] $ netstat -aAn | fgrep '*.80' 
    c49e0a40 tcp4       0      0  *.80               *.*                LISTEN
    12:44 [7] $ fstat | fgrep c49e0a40      
    wwwsrvr  thttpd       137    5* internet stream tcp c49e0a40
    
    
    -- 
    								Greg A. Woods
    
    +1 416 218-0098;            <g.a.woodsat_private>;           <woodsat_private>
    Planix, Inc. <woodsat_private>; VE3TCP; Secrets of the Weird <woodsat_private>
    
    ----------------------------------------------------------------------------
    This list is provided by the SecurityFocus ARIS analyzer service.
    For more information on this free incident handling, management 
    and tracking system please see: http://aris.securityfocus.com
    



    This archive was generated by hypermail 2b30 : Tue Nov 19 2002 - 12:58:22 PST