netstat -lntp shows the open ports, you forgot the -lntp it sounds likechadi said:What am I supposed to be looking for exactly? I ran netstats and it showed about 100+ lines of info, some "timed wait" and others "established".
WHat should I show you?
You are suppose to run those form /usr/local/apache/domlogschadi said:Results:
[email protected] [~]# grep lynx *
install.log:lynx-2.8.5-15.i386.rpm
[email protected] [~]# grep rcp *
[email protected] [~]#
[email protected] [~]# grep scp *
[email protected] [~]#
[email protected] [~]# grep eggdrop *
[email protected] [~]#
[email protected] [~]# grep fetch *
install.log:Installing fetchmail-6.2.5-2.i386.
[email protected] [~]#
[email protected] [~]# grep curl *
install.log:Installing curl-7.11.1-1.i386.
install.log:Installing curl-devel-7.11.1-1.i386.
[email protected] [~]#
[email protected] [~]# grep "/tmp" *
install:$opt{directory} = "/tmp/sis-packages";
install: (defaults to '/tmp/sis-packages')
[email protected] [~]#
True that! Does cpanel have anything that would mail those?WestBend said:It would be a little strange to root someones box and then have any error emails sent to the email addresses on the rooted box..
Is autobotchk specific to eggdrop?WestBend said:Abe : The email going out would be from some crontab script tied to the autobotchk script (not cpanel )which checks if the bot is up and running and if not send an email etc. However before I would bother wasting anymore of my time trying to see if the box was rooted etc I would at least look at where the email is coming from (source ips etc) and if the files needed for an eggdrop are present. I am begining to think this is a case of someone putting in a goof email so it gets sent to the jesus domain etc..
Richy, where are the "nobody" user cron jobs on your server? What OS are you running?richy said:Find out where your user cron jobs are stored (IIRC it's somewhere like /var/usr/cpanel/cron.d/ - but a "locate cron | more" should help find the folder) and examine the "nobody" user cron jobs. It /should/ be empty, but if the eggdrop is similiar to ones we've had, then you'll find it installed a cron entry in "nobody" (probably as the eggdrop was installed via a PHP script running under Apache which runs as 'nobody'). I ended up wiping the "nobody" cron file and then "chattr +i nobody" to ensure that IF the eggdrop tries to get on the server again via another users website, then at least it can't install the cronjob.
Personally I don't think anybody is steering away from anything.. since all this person got is a couple of emails... there is no proof they were rooted/hacked/cross-dressed/windozed etc The thrust of my questions before i got pulled off to the side about eggdrops was...You all are steering away from finding the source, all you are doing is getting rid of the eggdrop. You have to find the source and patch it otherwise other bad could come of it, such as mass deface of websites, full root compromise, etc.
Looks like cpanels background process killerWestBend said:A) where did these emails come from
All signs point to yes, it is on his server. I've seen this time and time again. Finding the source should be key as the logs won't stick around forever. The quicker he finds the source, the better he will be able to patch and prepare himself for future attempts.WestBend said:B) are the eggs even on his server which would all point to.. was he rooted or should i send him a couple of Nigerian Scam emails for 20 Million$ if he pays 6500.
Man that was a real bugger.richy said:Find out where your user cron jobs are stored (IIRC it's somewhere like /var/usr/cpanel/cron.d/ - but a "locate cron | more" should help find the folder) and examine the "nobody" user cron jobs. It /should/ be empty, but if the eggdrop is similiar to ones we've had, then you'll find it installed a cron entry in "nobody" (probably as the eggdrop was installed via a PHP script running under Apache which runs as 'nobody'). I ended up wiping the "nobody" cron file and then "chattr +i nobody" to ensure that IF the eggdrop tries to get on the server again via another users website, then at least it can't install the cronjob.