Solved

Magento styles.css file changed ? Compromised ?

Posted on 2013-06-02
3
257 Views
Last Modified: 2016-03-02
Hi Experts,

I got a complain that the Magento css has changed, and please check below what I have seen from the changed file. It's seems like we didn't had a release on anything planned for March 3rd. Or we are not sure some has did change using the Magento admin panel.

-rw-rw-r-- 1 1000 www-data 108090 2013-03-03 10:04 styles.css

I'm not sure who is 1000 ?

Can you please help me to investigate about this.

Thanks a lot for your time !
0
Comment
Question by:Shakthi777
  • 2
3 Comments
 
LVL 63

Assisted Solution

by:btan
btan earned 500 total points
ID: 39217765
I assume you also know this for ls command
2nd column is --> Number of links
3rd Column is --> File/directory owner
4th Column is --> File/directory group

Quick check is also etc user on such '1000' user, and check on system trails and symptoms available for breaches and login at pt of changes or creation of file

See this to help in check
http://wiki.metawerx.net/wiki/LBSA
0
 
LVL 63

Accepted Solution

by:
btan earned 500 total points
ID: 39217771
Likewise this has more info on checking the file permission abuses if any ...see the file Files and File system Security section. Likwise another useful sheet is the second link

http://www.ibiblio.org/pub/linux/docs/howto/other-formats/html_single/Security-HOWTO.html

http://www.sans.org/score/checklists/ID_Linux.pdf
This sheet is split into these sections:
• Unusual Processes and Services
• Unusual Files
• Unusual Network Usage
• Unusual Scheduled Tasks
• Unusual Accounts
• Unusual Log Entries
• Other Unusual Items
• Additional Supporting Tools
0
 

Author Closing Comment

by:Shakthi777
ID: 39297475
tnx !
0

Featured Post

Free Tool: Port Scanner

Check which ports are open to the outside world. Helps make sure that your firewall rules are working as intended.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
One of the biggest threats facing all high-value targets are APT's.  These threats include sophisticated tactics that "often starts with mapping human organization and collecting intelligence on employees, who are nowadays a weaker link than network…
This tutorial demonstrates a quick way of adding group price to multiple Magento products.
You have products, that come in variants and want to set different prices for them? Watch this micro tutorial that describes how to configure prices for Magento super attributes. Assigning simple products to configurable: We assigned simple products…

828 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question