Common rootkits that exploit weaknesses of old systems. I'd say it's enough to keep updated systems. If want some more hardening, close opened ports, use a firewall or iptables, create a DMZ, use strong passwords, disable unneeded services.
Re included the list. There are people who reads the threads. Sorry for the top-posting, I started :(
Merry christmas.
On Wed, 2013-12-18 at 12:50 -0500, bruce wrote:
Hey Rodolfo.
That's just it, I have no idea how it was hacked.. it might have been a security hoole in the older FC I was using...
the rootkits are cb Rootkit, SHV4 Rootkit, SHV5 Rootkit, Lite5-r Rootkit
On Wed, Dec 18, 2013 at 12:45 PM, Rodolfo Alcazar Portillo nospaze@gmail.com wrote:
As it in not common to be hacked on linux, and linux is really strong after install, perhaps you could specify a little under what conditions you were hacked. Was a physical intrusion? communicational? software? a web page? an open service or port? an injection? stolen passwd? Normally, hacking a linux box is the result of an inconscious administrator, sorry.
If the information you have is sensitive, -has some cost- you need to invest proportionally to it on security -hardening software, hardware, physical access.. etc.- Most persons on this list know enough to protect information to a certain level, but if you want to protect very expensive information, you should invest -as I said, proportionally- on a specialist. If not, google is enough.
Hope you find the solution...
R
bruce badouglas@gmail.com wrote:
Hey guys. - subject says it all!!
For a basic centos/fedora install. Need to have pointers/docs/suggestions/solid steps to actually harden/secure a system.
I've looked at a bunch of different articles/sites, so I'm also turning here.
Also, are there any good (i know) security lists/resources (people) I could talk to about remotely hiring for this process..
thanks
'ppreciate it!!
-- Sent from my Android device with K-9 Mail. Please excuse my brevity.