Analyze a hacked system
Work with a Copy
Never try to work with a live disk.
Make a copy: preferably an image copy.
Don't use anything that will change file access times.
Live CDs
If you don't a spare machine, try to boot a live CD: a bootable, runnable system.
Things to look for
- What files were changed recently?
- Look at
ctime, not just mtime: mtime can be changed by a standard system call.
- Log files: check for suspicious entries from compromised machines.
- Outbound connections from known-infected machines can indicate attempts to spread the problem.
- Inbound connections
to infected machine can show how the problem started.
Funk filename:
- "..." (3 dots)
- "bin "(trailing blank)
- "usr/lbb" (instead "user/lib") you see what you want to see.