A
Android Question
Guest
I have downloaded and ran the programme Rootkit Hunter on my Macbook Pro 10.8.3 and got the following results:
For "Checking LD_LIBRARY_PATH variable", it says in yellow "skipped".
For "Checking for hidden processes", it also says in yellow "skipped".
I also have red warning notices in relation to system configuration file checks and filesystem checks alerting me to the following:
"Checking if SSH protocol v1 in allowed The SSH configuration option 'Protocol' has not been set";
"Checking if syslog remote logging is allowed Syslog configuration file allows remote logging: install.* .0.1:32376"
"Checking /dev for suspicious file types Suspicious file types found in /dev: /dev/fd/6: MS Windows icon resource"
"Checking for hidden files and directories Hidden file found: /usr/share/man/man5/. rhosts.5: troff or preprocessor input text".
I am working on getting rid of this nasty stuff, but I also have a Galaxy Tab 10.1 and a Samsung S4 phone as well which I believe are also infected.
The individual who has been infecting me with malware via malicious email targeted an iPhone 4 which I owned (which I have now gotten rid of and replaced with a Samsung S4); and from there broke into my house Wifi network and quickly wormed their way into my Macbook and Galaxy Tab too (I know that for sure: the malicious individual has been taunting me with information stolen from the devices), and most likely my brand new Samsung S4 as well (although this has yet to be confirmed; I'd appreciate it if someone could tell me how I can check for sure) as well as the other devices in my house belonging to family members.
I have posted on other forums and been told to "nuke" the Macbook drive. However I do not know how to get rid of this stuff from my Android devices. Doing a restore to factory settings does not work.
Any advice on how to do this would be much appreciated. As would any advice on how to prevent reinfection, as it seems very easy for someone to use one machine to infect another on a network - mine is WAP2, protected with a strong password, and this posed no problem for an amateur hacker.
For "Checking LD_LIBRARY_PATH variable", it says in yellow "skipped".
For "Checking for hidden processes", it also says in yellow "skipped".
I also have red warning notices in relation to system configuration file checks and filesystem checks alerting me to the following:
"Checking if SSH protocol v1 in allowed The SSH configuration option 'Protocol' has not been set";
"Checking if syslog remote logging is allowed Syslog configuration file allows remote logging: install.* .0.1:32376"
"Checking /dev for suspicious file types Suspicious file types found in /dev: /dev/fd/6: MS Windows icon resource"
"Checking for hidden files and directories Hidden file found: /usr/share/man/man5/. rhosts.5: troff or preprocessor input text".
I am working on getting rid of this nasty stuff, but I also have a Galaxy Tab 10.1 and a Samsung S4 phone as well which I believe are also infected.
The individual who has been infecting me with malware via malicious email targeted an iPhone 4 which I owned (which I have now gotten rid of and replaced with a Samsung S4); and from there broke into my house Wifi network and quickly wormed their way into my Macbook and Galaxy Tab too (I know that for sure: the malicious individual has been taunting me with information stolen from the devices), and most likely my brand new Samsung S4 as well (although this has yet to be confirmed; I'd appreciate it if someone could tell me how I can check for sure) as well as the other devices in my house belonging to family members.
I have posted on other forums and been told to "nuke" the Macbook drive. However I do not know how to get rid of this stuff from my Android devices. Doing a restore to factory settings does not work.
Any advice on how to do this would be much appreciated. As would any advice on how to prevent reinfection, as it seems very easy for someone to use one machine to infect another on a network - mine is WAP2, protected with a strong password, and this posed no problem for an amateur hacker.