Solved

am I hacked?

Posted on 2004-09-09
5
188 Views
Last Modified: 2013-12-04
Hi, I am using Windows 2000 with IIS. In the middle of the day, I realized that my web-site server is stopped. I tried to start it and I got an message like "address is alreaady in use"

I remove my IIS service from server completely but I still see that "port 80, port 21" is open on the server and when I try to connect using ftp port, it even ask me username and password with a microsoft FTP server message.

What is that? I dont understand. Am I hacked?

I dont have any other web server on the server. I had IIS and MSSQL. that's all..

Urgent help is needed. Thank you very much..
0
Comment
Question by:sophie1
5 Comments
 
LVL 2

Accepted Solution

by:
AbacusOnsite earned 250 total points
ID: 12023737
Are your files still intact, or have they changed at all?  You could have just had a IIS web service hiccup.  When you say that you “realized” the web-server was down, do you mean that the web site was inaccessible, or that you looked at the service and noticed it was stopped, or you saw this from within IIS?

I believe that port 21 and 80 are open by default, otherwise you wouldn’t be able to view web pages or use an FTP program to download files from a server.  Normally, however, if anyone tries to connect to your computer at these ports, the connection is refused… unless, of course, you are hosting a web or FTP server.

Bottom line... I don't think you were hacked.
0
 
LVL 5

Assisted Solution

by:burningmace
burningmace earned 250 total points
ID: 12033986
Un-install the Webserver and FTP server, reboot and re-install. That should fix it.

I had the same problem and it turned out to be a faulty install.
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Many people tend to confuse the function of a virus with the one of adware, this misunderstanding of the basic of what each software is and how it operates causes users and organizations to take the wrong security measures that would protect them ag…
Article by: btan
The intent is not to repeat what many has know about Ransomware but more to join its dots of what is it, who are the victims, why it exists, when and how we respond on infection. Lastly, sum up in a glance to share such information with more to help…
This tutorial demonstrates a quick way of adding group price to multiple Magento products.
This video demonstrates how to create an example email signature rule for a department in a company using CodeTwo Exchange Rules. The signature will be inserted beneath users' latest emails in conversations and will be displayed in users' Sent Items…

919 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

17 Experts available now in Live!

Get 1:1 Help Now