- 論壇徽章:
- 0
|
網(wǎng)關發(fā)現(xiàn)上聯(lián)的網(wǎng)絡端口有異常流量\r\n\r\n查看我的主機,發(fā)現(xiàn)不停的在報這個錯誤PING主機地址無法\r\nMar 31 12:32:37 radius-host /usr/lib/snmp/snmpdx: [ID 702911 daemon.error] error while receiving a pdu from 173.1.78.3.38328: Decode the header of message failed: asn length too long\r\nMar 31 12:32:37 radius-host last message repeated 1 time\r\nMar 31 12:32:40 radius-host /usr/lib/snmp/snmpdx: [ID 702911 daemon.error] error while receiving a pdu from 173.1.78.124.65378: Decode the header of message failed: asn length too long\r\nMar 31 12:32:40 radius-host last message repeated 1 time\r\nMar 31 12:32:41 radius-host /usr/lib/snmp/snmpdx: [ID 702911 daemon.error] error while receiving a pdu from 173.1.78.178.38040: Decode the header of message failed: asn length too long\r\nMar 31 12:32:41 radius-host last message repeated 1 time\r\nMar 31 12:32:42 radius-host /usr/lib/snmp/snmpdx: [ID 702911 daemon.error] error while receiving a pdu from 173.1.78.58.36007: Decode the header of message failed: asn length too long\r\nMar 31 12:32:42 radius-host last message repeated 1 time\r\nMar 31 12:32:42 radius-host /usr/lib/snmp/snmpdx: [ID 702911 daemon.error] error while receiving a pdu from 173.1.78.132.23222: Decode the header of message failed: asn length too long\r\nMar 31 12:32:42 radius-host last message repeated 1 time\r\nMar 31 12:32:43 radius-host snmpXdmid: [ID 334616 daemon.error] Error receiving PDU Decode the header of message failed: asn length too long.\r\nMar 31 12:32:43 radius-host snmpXdmid: [ID 352064 daemon.error] Error receiving packet from agent; rc = -1.\r\nMar 31 12:32:43 radius-host snmpXdmid: [ID 669004 daemon.error] Will attempt to re-establish connection.\r\nMar 31 12:32:43 radius-host snmpXdmid: [ID 334616 daemon.error] Error receiving PDU Decode the header of message failed: asn length too long.\r\nMar 31 12:32:43 radius-host snmpXdmid: [ID 352064 daemon.error] Error receiving packet from agent; rc = -1.\r\nMar 31 12:32:43 radius-host snmpXdmid: [ID 669004 daemon.error] Will attempt to re-establish connection.\r\n\r\n\r\n把SNMPXDIMD進程給KILL之后,地址就恢復響應了\r\n\r\n但我發(fā)現(xiàn)PRSTAT里面有一個進程叫G3M的,占用滿了CPU.但詭異的是用PS -EF|GREP G3M,無法查到這個進程,GREP進程號也不行.只知道是用ROOT用戶起的,從什么路經(jīng)起用的就不知道了..\r\n\r\n后來用FIND命令看到/usr/lib/有個/usr/lib/.../g3m的,把他更名后KILL掉所有的G3M的PID,CPU迅速的降下來了\r\n==============================================\r\n請問是否我的機器被人當作肉雞了?他怎么弄的?這個G3M有誰碰到過是什么東東??\r\n\r\n我已經(jīng)更改了所有賬戶的密碼,剔除出了所有PTS用WHO命令看到的登陸終端,后續(xù)我能做哪些防范?\r\n\r\n現(xiàn)在我發(fā)現(xiàn)我的/var/adm/sulog內(nèi)每分鐘都會有一條root-radius(日常操作的賬戶)記錄,是不是代表這個入侵的人還在我的系統(tǒng)內(nèi)?\n\n[ 本帖最后由 guozhongyan 于 2009-3-31 18:29 編輯 ] |
|