질문&답변
클라우드/리눅스에 관한 질문과 답변을 주고 받는 곳입니다.
리눅스 분류

해킹을 당했습니다. 파일은 삭제 했지만, 에어젼트가 있는지 다시 생겨버리네요....

작성자 정보

  • adaylily 작성
  • 작성일

컨텐츠 정보

본문

일단 아랫글에 이어서, 2번째 이야기입니다.

삭제는 했지만, /tmp 폴더에 이런 것이 또 생겼습니다.

vi guidlist

/usr/libexec/utempter/utempter
/usr/sbin/sendmail.sendmail
/usr/sbin/lockdev
/usr/bin/wall
/usr/bin/write
/usr/bin/screen
/usr/bin/locate
/usr/bin/lockfile
/usr/bin/crontab
/usr/bin/ssh-agent
/usr/local/src/re2c-0.12.3/.deps
/sbin/netreport


[root@www .ICE-unix]# rpm -qf /usr/libexec/utempter/utempter
libutempter-1.1.4-4.el5
libutempter-1.1.4-4.el5
[root@www .ICE-unix]# rpm -qV libutempter-1.1.4-4.el5

 

[root@www .ICE-unix]# rpm -qf /usr/sbin/lockdev
lockdev-1.0.1-10
lockdev-1.0.1-10
[root@www .ICE-unix]# rpm -qV lockdev-1.0.1-10
prelink: /usr/sbin/lockdev: at least one of file's dependencies has changed since prelinking
S.?.....    /usr/sbin/lockdev

/usr/bin/lockfile
[root@www .ICE-unix]# rpm -qV mlocate-0.15-1.el5.2
[root@www .ICE-unix]# rpm -qf /usr/bin/lockfile
procmail-3.22-17.1.el5.centos
[root@www .ICE-unix]# rpm -qV procmail-3.22-17.1.el5.centos
prelink: /usr/bin/formail: at least one of file's dependencies has changed since prelinking
S.?.....    /usr/bin/formail
prelink: /usr/bin/lockfile: at least one of file's dependencies has changed since prelinking
S.?.....    /usr/bin/lockfile
prelink: /usr/bin/procmail: at least one of file's dependencies has changed since prelinking
S.?.....    /usr/bin/procmail

prelinking 라고 계속 생기는데, 저 서버는 procmail을 사용하지 않습니다.



netstat -nlp
Active Internet connections (only servers)
Proto Recv-Q Send-Q Local Address               Foreign Address             State       PID/Program name  
tcp        0      0 0.0.0.0:2049                0.0.0.0:*                   LISTEN      -                  
tcp        0      0 0.0.0.0:4003                0.0.0.0:*                   LISTEN      7590/rpc.rquotad   
tcp        0      0 0.0.0.0:646                 0.0.0.0:*                   LISTEN      7675/rpc.mountd    
tcp        0      0 0.0.0.0:873                 0.0.0.0:*                   LISTEN      2798/xinetd        
tcp        0      0 0.0.0.0:111                 0.0.0.0:*                   LISTEN      7570/portmap       
tcp        0      0 0.0.0.0:21                  0.0.0.0:*                   LISTEN      8056/vsftpd        
tcp        0      0 192.168.0.2:53              0.0.0.0:*                   LISTEN      2702/named         
tcp        0      0 211.234.100.120:53          0.0.0.0:*                   LISTEN      2702/named         
tcp        0      0 127.0.0.1:53                0.0.0.0:*                   LISTEN      2702/named         
tcp        0      0 0.0.0.0:25                  0.0.0.0:*                   LISTEN      2817/sendmail: acce
tcp        0      0 127.0.0.1:953               0.0.0.0:*                   LISTEN      2702/named         
tcp        0      0 0.0.0.0:60955               0.0.0.0:*                   LISTEN      -                  
tcp        0      0 :::80                       :::*                        LISTEN      8826/httpd         
tcp        0      0 :::24                       :::*                        LISTEN      2766/sshd          
tcp        0      0 :::443                      :::*                        LISTEN      8826/httpd         
udp        0      0 0.0.0.0:2049                0.0.0.0:*                               -                  
udp        0      0 0.0.0.0:643                 0.0.0.0:*                               7675/rpc.mountd    
udp        0      0 0.0.0.0:4003                0.0.0.0:*                               7590/rpc.rquotad   
udp        0      0 0.0.0.0:58666               0.0.0.0:*                               -                  
udp        0      0 192.168.0.2:53              0.0.0.0:*                               2702/named         
udp        0      0 211.234.100.120:53          0.0.0.0:*                               2702/named         
udp        0      0 127.0.0.1:53                0.0.0.0:*                               2702/named         
udp        0      0 0.0.0.0:111                 0.0.0.0:*                               7570/portmap       
Active UNIX domain sockets (only servers)
Proto RefCnt Flags       Type       State         I-Node PID/Program name    Path
unix  2      [ ACC ]     STREAM     LISTENING     6692   2863/gam_server     @/tmp/fam-root-
unix  2      [ ACC ]     STREAM     LISTENING     744365 15097/0             /tmp/ssh-ifFPC15097/agent.15097

그리고 관련 데몬은 모두 내렸는데, 신기하게 웹 서버 루트 디렉토리  또 에어젼트가 생겨버렸습니다.

근데 자꾸 왠놈이 들어와서 ftp로 접속하는 것인지...
와서, 자꾸 실행을 거네요...
어떻게 거는지도,  chmod 는 일반사용자는 권한이 없는데 어떻게 실행시키는것인지 모르겠습니다.

ls
chmod 7777 1
ls -al
./1
dir
pwd
su
cd ~
pwd
exit
gcc
cd ..
ls
pwd
cd ..
ls
ls
cd chmod
ls
ls
touch
tocuh 1
vi 1.txt
ls
chmod 7777 1.txt
ls -al
vi 1
ls
chmod 7777 1
exit
ls
rm 1
rm 1.txt
chmod 7777 1
./1
w
exit
ftp localhost
exit

관련자료

댓글 3

족구왕슛돌이님의 댓글

  • 족구왕슛돌이
  • 작성일
웹 쉘 한번 검색 해보세요..'';
php가 감염 됐다면...

adaylily님의 댓글

  • adaylily
  • 작성일
상용 말고, 무료로 사용할 수 있는 웹쉘이 있는지요? KISA에서 받아야 하는 건가요?

족구왕슛돌이님의 댓글의 댓글

  • 족구왕슛돌이
  • 작성일
네 KISA에서 다운 받아서 설치 하고 검색 해보세요..^^
별 도움이 안되서..ㅠ

공지사항


뉴스광장


  • 현재 회원수 :  60,132 명
  • 현재 강좌수 :  36,168 개
  • 현재 접속자 :  495 명