Hi,
I am trying to figure out what the best next step is for a server that I think is clean but I need to validate this assumption and there are some outstanding questions from Rootkit Hunter.
There were many warnings for files so I checked the MD5 value against another cPaenl install with the same version of CentOS. Everything checked out except for a few files.
For example /bin/passwd and /usr/local/cpanel/bin/jail_safe_passwd.
I used YUM to validate the file as well and it looks good.
What is a reasonable next step?
It is important to note that one site on the server was compromised via a files directory. There was compressed PHP code added that messed up search engine listings but I do not think they would have been able to alter the OS. No rootkits were found.
Thanks,
Steve
I am trying to figure out what the best next step is for a server that I think is clean but I need to validate this assumption and there are some outstanding questions from Rootkit Hunter.
There were many warnings for files so I checked the MD5 value against another cPaenl install with the same version of CentOS. Everything checked out except for a few files.
For example /bin/passwd and /usr/local/cpanel/bin/jail_safe_passwd.
I used YUM to validate the file as well and it looks good.
What is a reasonable next step?
It is important to note that one site on the server was compromised via a files directory. There was compressed PHP code added that messed up search engine listings but I do not think they would have been able to alter the OS. No rootkits were found.
Thanks,
Steve