Solved

repquota -uga Results *Hacked?

Posted on 2004-04-21
3
311 Views
Last Modified: 2010-03-18
RH 7.3
Ensim 3.1

I might be way off here but I noticed something today when I was vailidating my quotas.  A few users in the quota area are not in my group or passwd files see below.  I have listed what I feel are possibly groups made by my system being hacked?

The only reason I say is the obvious #666 and in my group file these do not exist

***************repquota -uga

                        Block limits                File limits
Group           used    soft    hard  grace    used  soft  hard  grace
----------------------------------------------------------------------
#502      --     868       0       0            158     0     0
#575      --      36       0       0             11     0     0
#666      --    1048       0       0            257     0     0
#80       --     116       0       0             29     0     0
#96       --      48       0       0             12     0     0
#526      --     212       0       0             53     0     0

Any Ideas on whay this could be and how I would remove them?
0
Comment
Question by:hexfusion
  • 2
3 Comments
 
LVL 9

Accepted Solution

by:
Alf666 earned 250 total points
ID: 10878526
These may be old users removed from the system since.
You can find these files using the following command :

find / -uid 502 -o -uid 575 -o -uid 666 -o -uid 80 -o -uid 96 -o -uid 526 -ls

It might take a while if your disks are big.
I suggest redirecting the output to a file for later examination.

find / -uid 502 -o -uid 575 -o -uid 666 -o -uid 80 -o -uid 96 -o -uid 526 -ls > /tmp/fic
0
 
LVL 2

Author Comment

by:hexfusion
ID: 10883038
Came up clean must of been old stuff but the 666 group still seems odd anyways thanks a lot.
0
 
LVL 9

Expert Comment

by:Alf666
ID: 10884227
Sorry. please correct my command replacing all occurences of uid by gid.
Misread your question.

You should find files.

Sorry again.
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

I have seen several blogs and forum entries elsewhere state that because NTFS volumes do not support linux ownership or permissions, they cannot be used for anonymous ftp upload through the vsftpd program.   IT can be done and here's how to get i…
Note: for this to work properly you need to use a Cross-Over network cable. 1. Connect both servers S1 and S2 on the second network slots respectively. Note that you can use the 1st slots but usually these would be occupied by the Service Provide…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…
This video shows how to remove a single email address from the Outlook 2010 Auto Suggestion memory. NOTE: For Outlook 2016 and 2013 perform the exact same steps. Open a new email: Click the New email button in Outlook. Start typing the address: …

708 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

11 Experts available now in Live!

Get 1:1 Help Now