I am a Linux security novice and would appreciate feedback regarding 1) how this attack may have been accomplished and 2) what I should do to secure this box. I am working on configuring a firewall script but am afraid I might miss some security flaws created by the attackers.
Any advice would be appreciated.
What kinds of network services did you run when the machine was attacked/ rooted?
Thanks.
Chris Quinn
Thanks,
Roman.
--
- -
| Roman Drahtmüller