If you had setup your machine to send log messages to another host then
you could check that host for messages which, unless it too was
compromised, would be intact and safer to read. How much damage was
done depends on how somebody gets in, but if they were able to get
‘root’ access then unless you were watching ahead of time in a very
verbose way with logs sent to another machine you’re going to have a
hard time tracking this down because they would have had access to undo
anything that you did.
Good luck.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.15 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/
You don’t need passwords is you have vulnerable scripts or malware php
scripts. If you don;t have an AV solution, you need one. Try AVG,
its free, it works. Once installed do a basic scan: avgscan -x
/var/lib/ntp/proc -P -p -r ~/avgscan.log / Evil will show up in the
logs as follows:
Any of that stuff means you have been infested with a backdoor that
lets them do whatever they like, whenever they like. If your full scan
comes up clean ( thats good! ) then its a poorly written script allowing
SQL injection, or whatever…
Please look at your HTTP logs ( e.g. /var/log/apache2/access_log and
error_log ) and look for SQL or Perl injection. Perl injection
typically have a lot of semicolons. For example: