LinuxQuestions.org
Latest LQ Deal: Latest LQ Deals
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 05-19-2004, 12:16 AM   #1
sporkit
Member
 
Registered: Feb 2004
Posts: 71

Rep: Reputation: 15
Cracker delted my file server


Basicly i had a server and somebody hacked a pretty easy (yet important) ftp password. They gained access to my most important files and whipped out a few gigs of information.

I ran debugfs and lsdel to get a list of all the files that were erased. as you can see it started Sun May 16 19:06:46 2004.

http://www.sporkit.com/lsdel.txt

the new problem is what do i do with all that. its on a different drive currently mounted as read only so ill be able to copy to another file system when i need. what im afraid is if i do "dump <inodenumber> filename" how will i be able to tell what files are what?

i guess when i think about it i can really live without most of the stuff i lost. except for the php cms i spent a week or two writting. if you have a suggestion then im all ears. thanks for any help.

Last edited by sporkit; 05-19-2004 at 06:36 PM.
 
Old 05-19-2004, 03:05 AM   #2
agoatley
LQ Newbie
 
Registered: May 2004
Distribution: Slackware 9.1
Posts: 16

Rep: Reputation: 0
Points of information

1. It's called 'cracking'. 'Hacking' is programming creatively to solve a challenge.
2. Why was this password so weak, anyway?
3. That's the major problem with undeleting - you never know what the filename was. There really is no solution - you'll have to try to guess what it was by the contents.

-Ashton
 
Old 05-19-2004, 08:44 AM   #3
sporkit
Member
 
Registered: Feb 2004
Posts: 71

Original Poster
Rep: Reputation: 15
well im not here to get into a debate over the definition of hacking. although dictionary.com does define it as " To use one's skill in computer programming to gain illegal or unauthorized access to a file or network: hacked into the company's intranet.".

if a program was a jpeg or lets say avi file. would they look any different. maybe i could wirte a script to check this out?
 
Old 05-19-2004, 10:06 AM   #4
yamakid
LQ Newbie
 
Registered: Jan 2004
Location: Florida, U.S.A.
Distribution: knoppix,mandrake,
Posts: 24

Rep: Reputation: 15
Forensics

Welcome to the world of forensics. Checkout http://biatchux.dmzs.com/ for F.I.R.E. (My Fav)
http://www.sleuthkit.org/index.php http://www.thepacketmaster.com/ http://www.porcupine.org/forensics/tct.html http://www.knoppix-std.org/ I like to use live CDs.
for a simple how to try http://www.pcquest.com/content/searc...sp?artid=53892
Hope this helps.
 
Old 05-19-2004, 10:52 AM   #5
yamakid
LQ Newbie
 
Registered: Jan 2004
Location: Florida, U.S.A.
Distribution: knoppix,mandrake,
Posts: 24

Rep: Reputation: 15
More forensic HowTo

http://www.pcquest.com/content/searc...sp?artid=52048
http://www.pcquest.com/content/searc...sp?artid=53015
 
Old 05-19-2004, 11:09 AM   #6
mcleodnine
Senior Member
 
Registered: May 2001
Location: Left Coast - Canada
Distribution: s l a c k w a r e
Posts: 2,731

Rep: Reputation: 45
moved to the Linux - Security forum
 
Old 05-19-2004, 04:14 PM   #7
sporkit
Member
 
Registered: Feb 2004
Posts: 71

Original Poster
Rep: Reputation: 15
wow! thanks for the articles. thats the best information ive come across so far. that gui autospy tool looks like it could really help me out (and its included with that knoppix tool!).

ill probably use autos the autospy to try and recover the data. im thinking it just might be easier (and a good idea in the long run) to just download knoppix and get it with that. but how is loading the drives then? will it be using the /etc/fstab file of the comptuer it boots on?

oh also the autospy tutorail said it will give the filename of what was deleted. if thats the case then im really really really in luck.

Last edited by sporkit; 05-19-2004 at 04:29 PM.
 
Old 05-19-2004, 04:54 PM   #8
320mb
Senior Member
 
Registered: Nov 2002
Location: pikes peak
Distribution: Slackware, LFS
Posts: 2,577

Rep: Reputation: 48
Quote:
Originally posted by sporkit
well im not here to get into a debate over the definition of hacking. although dictionary.com does define it as " To use one's skill in computer programming to gain illegal or unauthorized access to a file or network: hacked into the company's intranet.".
this is the common misconception about "hackers" and "crackers"
Hackers DO NOT DESTROY peoples files, NOR do Hackers DEFACE WEBSITES!!!

Crackers and Scripts Kiddies are the LOWEST SCUM on the totem pole.............

You should go thru your files and make sure there is NO ROOTKIT
in there somewhere........
 
Old 05-19-2004, 06:35 PM   #9
sporkit
Member
 
Registered: Feb 2004
Posts: 71

Original Poster
Rep: Reputation: 15
Quote:
Originally posted by 320mb
this is the common misconception about "hackers" and "crackers"
Hackers DO NOT DESTROY peoples files, NOR do Hackers DEFACE WEBSITES!!!

Crackers and Scripts Kiddies are the LOWEST SCUM on the totem pole.............

You should go thru your files and make sure there is NO ROOTKIT
in there somewhere........
well that sever will most definatly be whipped out and ill be starting over. ill also change the title of this post. why dont we just make up a new name for hacking... you know... like one that doesnt already mean the opposite of what were trying to say.
 
Old 05-20-2004, 01:27 AM   #10
chort
Senior Member
 
Registered: Jul 2003
Location: Silicon Valley, USA
Distribution: OpenBSD 4.6, OS X 10.6.2, CentOS 4 & 5
Posts: 3,660

Rep: Reputation: 76
The media co-opted the term "hacker" and consequently, the common idiot on the street has no idea what it really means. That's why dictionaries even have the wrong definition.

The original hackers were people like Steve Wozniak who built computers from scratch and wrote programming languages for them.

Crackers got their name from "cracking" registration codes or disabling copy protection in software, in order to "unlock" all the features of a shareware or demo program. That is of course illegal. Now crackers applies in a much broader sense to people who are "criminal hackers" (although that's the current mnemonic, that's not where the word came from). Criminal hackers are anyone who illegally modifies software and/or software, or intrudes into restricted systems (basically any system they don't own or legally work on).
 
Old 05-20-2004, 03:52 AM   #11
crucial.com.au
LQ Newbie
 
Registered: May 2004
Posts: 3

Rep: Reputation: 0
1. Run chkrootkit and rkhunter to check for rootkits.
2. Don't use crackable passwords. (at least 8 characters long, numbers and letters)
3. Use a firewall (if you are not already).

There are a lot more suggestions I can give, but they are mostly for securing web servers.

__________________
Crucial Paradigm Web Solutions
Linux Talk Forum
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
Am I being Hacked ? rizhun Linux - Security 4 09-07-2005 08:08 AM
Did I get hacked? drj000 Linux - General 3 01-13-2005 02:54 PM
Have I been hacked? af_dave Linux - Security 3 07-14-2004 02:02 PM
Was I hacked? asktoby Linux - Security 37 01-18-2004 06:51 PM
hacked WannaLearnLinux Linux - Newbie 7 10-18-2003 01:34 AM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 05:11 PM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration