[sf-lug] Hacked RHEL4/PHP4 server
Rick Moen
rick at linuxmafia.com
Thu May 22 10:47:22 PDT 2008
Quoting Kristian Erik Hermansen (kristian.hermansen at gmail.com):
> Just realize that even if the system utilities don't appear to be
> trojaned, an attacker could have loaded a malicious kernel module
> which has patched the syscall table and is filtering all requests your
> binaries make...
Yes, of course. There are standard rootkits that do that. That's why the
only truly sound way to examine a suspect system is to boot different,
trusted media and mount the system's filesystems without running its
code -- but good luck doing that on a virthost.
More information about the sf-lug
mailing list