01-15-2013
Hi,
There are some ways to enter a compromised system even if you have changed the root password. Probably the hacker has modified the system, so he can enter without being asked a password.
Your best bet to solve the problem is backup everything valuable and get a new server installed. The only way I know of investigating a compromised server that can lead anywhere is taking it offline to avoid more interference from the hacker.
Think that probably the hacker is inside your system and you could not detect it.
All the tools like rkhunter tell you to not relay only on them. And they are good for detection, but they don't serve for more than that.
Hope you get it solved
jmanel
This User Gave Thanks to jmanel For This Post:
9 More Discussions You Might Find Interesting
1. IP Networking
/* Linux Slackware */
looking in my logs I see tons of entries similar to below. Does anyone know what these mean, and should I be concerned. I looked up a few of the IP's at Arin.net and saw that many of them belong to isp's (not good).. Any information is helpful..
Body of Messages log... (1 Reply)
Discussion started by: LowOrderBit
1 Replies
2. Solaris
Hello!
I have a Linux nfs server (called server100 below) with a export nfs. My problem is that the Solaris client (called client100 below) doesn't seems to like it. In the Solaris syslog I got following messages (and after a while the solaris client behave liked its hanged/to buzy). Also see... (3 Replies)
Discussion started by: sap4ever
3 Replies
3. Windows & DOS: Issues & Discussions
Hi All,
I need your expertise in finding a way to solve my problem.Please excuse if this is not the right forum to ask this question and guide me to the correct forum,if possible.
I am a DBA and on a daily basis i have to ftp huge dump files from my company server to my laptop and then... (3 Replies)
Discussion started by: kunwar
3 Replies
4. Shell Programming and Scripting
Dear Friends,
Sorry for this basic request. But I just started learning Ksh recently and still I am a newbie in this field.
Q: I have files on one server and the date format is 20121001000009_224625.in which has year (yyyy) month (mm) and date (dd). I have these files on server A. The task... (8 Replies)
Discussion started by: BrownBob
8 Replies
5. Shell Programming and Scripting
I need to connect to a ftp server-1 from linux server-2 and copy/get a file from server-1 which follows a name pattern of FILENAME* (located on the root directory) and copy on a directory on server-2. Later, I have to use this file for ETL loading... For this I tried using as below
/usr/bin/ftp... (8 Replies)
Discussion started by: dhruuv369
8 Replies
6. Shell Programming and Scripting
Hi ,
Is there any script to copy a files (weblogic bianary + silent.xml ) from one server (linux) to another servers and then execute the copy file.
We want to copy a file on multiple servers and run the installation.
Thanks (1 Reply)
Discussion started by: Nawrajesh
1 Replies
7. UNIX for Dummies Questions & Answers
I have 3 servers A, B, C and server B is having some files in /u01/soa/ directory, these files i want to copy to server C, and i want to run the script from server A.
Script(Server A) --> Files at Server B (Source server) --> Copy the files to Server C(Target Server).
We dont have RSA key... (4 Replies)
Discussion started by: kiran_j
4 Replies
8. Solaris
Hi,
I am trying to automate the process of fetching files from remote server to local server through sftp. I have the username and password for the remote solaris server. But I need to give password manually everytime i run the script.
Can anyone help me in automating the script such that it... (3 Replies)
Discussion started by: ssk250
3 Replies
9. UNIX for Dummies Questions & Answers
Hi everyone,
I hope I am posting in the right spot and I really need some help. I am going through a horrible divorce and I am afraid that my husband has compromised . He set up my mac computer and router and for my job set up remote access for me. I caught him cheating on me and I think he... (6 Replies)
Discussion started by: kk243665
6 Replies
LEARN ABOUT HPUX
yppasswd
yppasswd(1) General Commands Manual yppasswd(1)
NAME
yppasswd - change login password in Network Information System (NIS)
SYNOPSIS
[name]
Remarks
The Network Information Service (NIS) was formerly known as Yellow Pages (YP). The functionality remains the same; only the name has
changed.
DESCRIPTION
changes or installs a password associated with the login name in the Network Information System (NIS). The NIS password can be different
from the one on your own machine. If name is omitted, it defaults to the name returned by (see getlogin(3C)).
prompts for the old NIS password (even if it does not exist), then twice for the new one. The old password must be entered correctly for
the change to take effect. Checks occur to ensure that the new password meets the following construction requirements.
o Only the first eight characters are significant.
o A password can be as few as four characters long if it contains
o at least one special character or
o a mixture of numeric, uppercase and lowercase letters.
o A password can be as few as five characters long if it contains a mixture of
o uppercase and lowercase letters or
o numeric and either uppercase or lowercase letters.
o A password must contain at least six characters if it contains only monocase letters.
All these rules except the first are relaxed if you try three times to enter an unacceptable new password. You cannot, however, enter a
null password.
Only the owner of the name or the superuser can change a password.
The Network Information System password daemon, must be running on the master NIS password server to change NIS passwords. See yppass-
wdd(1M).
WARNINGS
The password update protocol passes the old and new passwords to the master NIS server at once. Thus, if the old NIS password is incor-
rect, no notification is given until the new NIS password is successfully entered.
The password construction rules are different from those of the HP-UX command (see passwd(1)).
The root user's password cannot be changed using or Therefore, root users must change their password in the files database and then recon-
struct the NIS maps using the command. For more information on how to use the command, see ypmake(1M).
User applications that call this routine must be linked with For example,
AUTHOR
was developed by Sun Microsystems, Inc.
SEE ALSO
id(1), passwd(1), su(1), yppasswdd(1M), getlogin(3C), yppasswd(3N), ypfiles(4).
yppasswd(1)