Solved

RedHat Server Security Thread

Posted on 2007-04-01
6
194 Views
Last Modified: 2013-12-06
RedHat Linux 9.0
I think my system is being hacked.  
I saw the  .bash_profile under root have the lines as follows:

# User specific environment and startup programs
PATH=$PATH:$HOME/bin
BASH_ENV=$HOME/.bashrc
USERNAME="root"
export USERNAME BASH_ENV PATH

I see this differently in other linux box:
PATH=$PATH:$HOME/bin
export PATH
unset USERNAME

Can somebody explain what the lines mean ?
0
Comment
Question by:ChanYiuPong
  • 3
  • 2
6 Comments
 
LVL 48

Expert Comment

by:Tintin
Comment Utility
There's nothing in the .bash_profile that would indicate you have been hacked.  It's a perfectly acceptable profile, except that there's no need to manually set USERNAME
0
 
LVL 11

Expert Comment

by:kblack05
Comment Utility
In order to avoid spectulation on such things, you should install and run "chkrootkit" which checks many known methods to see if the system is compromised. You can get the progrem via Yum with 'yum install chkrootkit' or download and compile it from souce. See the home site at http://www.chkrootkit.org

Here is a good tutorial on installing and using chkrootkit http://www.webhostgear.com/25.html
0
 

Author Comment

by:ChanYiuPong
Comment Utility
Question abandon.
0
What Should I Do With This Threat Intelligence?

Are you wondering if you actually need threat intelligence? The answer is yes. We explain the basics for creating useful threat intelligence.

 
LVL 11

Expert Comment

by:kblack05
Comment Utility
Even though you abandoned the question, you received very legitimate answers.
0
 

Author Comment

by:ChanYiuPong
Comment Utility
well, you give me an article on chkrootkit
But you do not provide the information on what the lines differ means.
Still everyday the server being placed with phlishing sites.
0
 
LVL 11

Accepted Solution

by:
kblack05 earned 500 total points
Comment Utility
Editing the pages will not clear the trojan, and will not fix the problem. First you need to determine how the system was comprimised. If you edit or attempt to repair the system while someone still has rougue access then they will know you are on to them, and may just decide to format the server on their way out the door.

Please download chkrootkit from the url above, run it, and see if the system is in fact infected.

The differences are probably to force the server to use an alternate command directory, the one containing the infected executables.
0

Featured Post

How to improve team productivity

Quip adds documents, spreadsheets, and tasklists to your Slack experience
- Elevate ideas to Quip docs
- Share Quip docs in Slack
- Get notified of changes to your docs
- Available on iOS/Android/Desktop/Web
- Online/Offline

Join & Write a Comment

Hello EE, Today we will learn how to send all your network traffic through Tor which is useful to get around censorship and being tracked all together to a certain degree. This article assumes you will be using Linux, have a minimal knowledge of …
Many people tend to confuse the function of a virus with the one of adware, this misunderstanding of the basic of what each software is and how it operates causes users and organizations to take the wrong security measures that would protect them ag…
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
This tutorial demonstrates a quick way of adding group price to multiple Magento products.

771 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

11 Experts available now in Live!

Get 1:1 Help Now