Comment PZ Re: Csh syntax


Operation Windigo - Linux ssh exploit and bot net


Csh syntax (Score: 2, Informative)

by on 2014-03-20 10:39 (#PX)

To not leave all the fun to [ba]sh users, here's the same test in [t]csh:
(ssh -G |& grep -e illegal -e unknown >/dev/null)&&echo "System clean"||echo "System infected"

Re: Csh syntax (Score: 1)

by on 2014-03-20 11:38 (#PY)

I meant to ask yesterday on Soylent, but if a system is infected is there a known solution? I haven't tested my machines at home yet and I can't really see how they might be infected, but other than just formatting them, which I might do anyway because I enjoy it, is there a way to clean infections off.

I suppose I could just Google it, but fostering discussion and all that.

Re: Csh syntax (Score: 1)

by on 2014-03-20 11:49 (#PZ)

the linked pdf has an appendix on cleaning, but basically, no, you need a complete wipe and reboot - as you would for any attack that's gained root access. By the way, unless your home machines are internet facing servers, they're not going to be affected.


Time Reason Points Voter
2014-03-20 13:56 Normal 0

Junk Status

Not marked as junk