That advice is sound. Once someone gets in they frequently create multiple self-recreating backdoors and other goodies. There's no way to verify you ever got rid of them all other than starting over from scratch. I've experience it before and it's not fun.
chkconfig --list will show you what services are running. You'll want to look at 3 and maybe 5 to see if there's anything else important running on the server. There will be a lot of services running by default that you won't really need to worry about. For the important ones, keep a copy of the configuration files for reference, but don't copy them to the new server. Maybe printing them out is the way to go. You'll need to verify and understand the settings to make sure they haven't been changed to anything harmful, but at least you'll have a starting point for what needs to be done.
For the data files (web pages), hopefully you can take them from a backup or source repository on a different server rather than having to copy them over from the hacked server. If you have to copy them you can try scanning them with antivirus software, then look for anything unusual and hope for the best.