Watching
your own back
is easy
without any downloads:
Use of TFTP (Trivial File Transfer Protocol) to obtain password files
To test your system for this vulnerability, connect to your system using tftp and try
get /etc/motd
If you can do this, anyone else on the network can probably get your password file. To avoid the problem, disable tftpd. If you must have tftpd, ensure that it is configured with restricted access.
Vulnerabilities in sendmail
There have been a number of vulnerabilities identified over the years in sendmail(8). To the best of our knowledge, the current version of sendmail addresses those known vulnerabilities.
To determine which version of sendmail is running, use telnet to connect to the SMTP port (25) on your system:
telnet <your hostname> 25
To
quickly check for an IRC bot/
malicious server:
-
type the following command at an MS-DOS Prompt:
The
following is not good:
To
quickly check for an Ident server:
-
type the following command at an MS-DOS Prompt:
netstat
-an | find ":113 "
The
following is not good:
TCP
0.0.0.0:113 0.0.0.0:0 LISTENING
:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::
Find
out any suspicious port numbers, and check yourself by plugging one of
the numbers into the command string, just like above:
netstat
-an | find ":SUSPICIOUS PORT NUMBER"
|