0

I am warned from my VPS provider that my server sends a lot of SSH SYN Attack to other servers, but I have no idea how to deal with it.

Here's the detail my provider sent me:

enter image description here

  1. Where can I find the logs that record all of these attack in my server?
  2. How do I deal with this (find the script that send these request) step by step ?
WoooHaaaa
  • 1,605
  • 4
  • 15
  • 13
  • The answer to (1) is "You can't". A decent attacker would have covered their tracks. The answer to (2) is contained in the question I've marked this as a duplicate of: "Figure out how they got in, then start over on a clean server and make sure to close that hole" – voretaq7 Oct 18 '13 at 15:34

1 Answers1

0

Finally I find the script.

  1. ps -ef I found 10 processes named ./u2000 &, I thought it was wired.
  2. ls -l /prod/PID/exe I find it links to Tomcat/bin/u2000.
  3. I never know such a thing in Tomcat, so I just remove it and stop all its processes.
  4. Disable tomcat's web console and users.
  5. Change tomcat dir to a standalone user which has limited permission.
WoooHaaaa
  • 1,605
  • 4
  • 15
  • 13