From owner-freebsd-questions@FreeBSD.ORG Wed Jun 28 14:14:33 2006 Return-Path: X-Original-To: questions@freebsd.org Delivered-To: freebsd-questions@FreeBSD.ORG Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id 3167316A49E for ; Wed, 28 Jun 2006 14:14:33 +0000 (UTC) (envelope-from cswiger@mac.com) Received: from pi.codefab.com (pi.codefab.com [199.103.21.227]) by mx1.FreeBSD.org (Postfix) with ESMTP id 0FE3D442A2 for ; Wed, 28 Jun 2006 13:42:18 +0000 (GMT) (envelope-from cswiger@mac.com) Received: from localhost (localhost [127.0.0.1]) by pi.codefab.com (Postfix) with ESMTP id 6881E5EEF; Wed, 28 Jun 2006 09:42:17 -0400 (EDT) X-Virus-Scanned: amavisd-new at codefab.com Received: from pi.codefab.com ([127.0.0.1]) by localhost (pi.codefab.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id fKM3g2geMct7; Wed, 28 Jun 2006 09:42:16 -0400 (EDT) Received: from [192.168.1.251] (pool-68-160-201-170.ny325.east.verizon.net [68.160.201.170]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by pi.codefab.com (Postfix) with ESMTP id ECAED5DA7; Wed, 28 Jun 2006 09:42:15 -0400 (EDT) Message-ID: <44A2872E.8000500@mac.com> Date: Wed, 28 Jun 2006 09:42:06 -0400 From: Chuck Swiger User-Agent: Thunderbird 1.5.0.4 (Windows/20060516) MIME-Version: 1.0 To: Brent References: <20060628122920.M72053@bmyster.com> In-Reply-To: <20060628122920.M72053@bmyster.com> Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit Cc: questions@freebsd.org Subject: Re: how to check for a compromised system X-BeenThere: freebsd-questions@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: User questions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 28 Jun 2006 14:14:33 -0000 Brent wrote: > Hello, > Im running several servers all ranging from FBSD 4.11 through the 5.4 release > , patched of course. MY question is how do i check a system to see if has been > compromised ? I have already run a current version "chkrootkit" & found nothing. There isn't a simple answer to that, but start with looking under /var/log and at the output of `last`. You might consider running tcpdump -o _file_ for a day or so and review it for illicit traffic. > The symptom im seeing is yesterday all of a sudden the root user was removed > from the /etc/passwd file & Im not sure on how to track down what happened. I > managed to recover from this. Are there any other tools that i can use to > track down say who did what on the box? files that may have changed & time & > dates... find / -mtime 2 ...would probably be a good starting point. -- -Chuck