Tom,
Go get this and run it to see if you've been hacked:
http://freshmeat.net/projects/chkrootkit/
You might consider building it on a known-safe box, then running it on the
server. I think it fits on a floppy.
--Joey
Thou spake:
>I come in to work and I try and ssh to my box, however I notice that the ssh
>key is changed and I get the appropriate warning message. Since I'm the only
>one that has root on this box, is there some other normal method for that to
>happen? (Someone please come up with a good answer!!! I don't want to
>rebuild this thing right now!!)
>
>Thanks
>Thomas
>___________________
>Nolug mailing list
>nolug@nolug.org
-- Joey Kelly < Minister of the Gospel | Computer Networking Consultant > http://joeykelly.net "Democracy is two wolves and a lamb voting on what to have for lunch. Liberty is a well-armed lamb contesting the vote." ___________________ Nolug mailing list nolug@nolug.orgReceived on 08/28/03
This archive was generated by hypermail 2.2.0 : 12/19/08 EST