Answer the question
In order to leave comments, you need to log in
Answer the question
In order to leave comments, you need to log in
The attack is launched after uploading the file via HTTP (how else?). Find a file in an ftp folder using the find utility by creation/modification time, kill it. Check process list, check outgoing connections (especially irc). Make sure the script doesn't restart itself with another process. For the future, separate the folder with scripts that can be run and the ftp folder.
Didn't find what you were looking for?
Ask your questionAsk a Question
731 491 924 answers to any question