<div dir="ltr"><div><div class="gmail_extra"><div class="gmail_quote"><blockquote class="gmail_quote" style="margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">
This post:<br>
<br>
<a href="http://www.welivesecurity.com/2013/04/26/linuxcdorked-new-apache-backdoor-in-the-wild-serves-blackhole/" target="_blank">http://www.welivesecurity.com/2013/04/26/linuxcdorked-new-apache-backdoor-in-the-wild-serves-blackhole/</a><br>
<br>
discusses an Apache backdoor exploit that is in the wild. It includes a python script to test for the exploit,</blockquote><div><br>the above post has a very simple python script to check for the shared
memory allocation which would be created by the Linux/Cdorked.A
exploit. it of course presumes a simple non-openvz server environment.<br><br>any openvz hackers here? i
don't have python in my openvz containers, but i bet it's simple for
the HN to look at shared memory allocated by a container. probably via
/proc. probably simple, if you know how. anybody know? <br></div></div></div></div></div>