Re: MORE SSH Hacking: heads-up

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Fri, 2004-07-30 at 05:45, Brian Fahrlander wrote:

> rhost=216.97.110.1  : 1 Time(s)
>       authentication failure; logname= uid=0 euid=0 tty=NODEVssh ruser=
> rhost=ccia-062-204-197-193.uned.es  : 1 Time(s)
> 
> su:
>    Sessions Opened:
>       brian(uid=500) -> root: 1 Time(s)
> 
> ------------------------------------------------------------------------
> 
>     Ok, guys- what do we do with this?  Should we be writing down the
> addresses from which these attempts were made? They're probably all
> 'stooge' addresses, I know, but it might help authorities to know what
> other machines have been compromised...
> 
>     I'll go save the log somewhere...
> 
> ------------------------------------------------------------------------

Other than double checking your system, running chkrootkit, verify
tripwire is setup, monitoring logs, etc.  The best thing you can do if
you see the same addresses hitting your system is to block them in
iptables.  And if you don't really need ssh access out to the Internet
disable that service.

Every day people attempt to login into systems all over.  There is no
way anyone would be interested in doing anything unless they actually
compromise an important system at a company or government facility.  

I could be wrong about that but I doubt if any government organization
would lift a finger if someones personal system was hacked.  (unless you
have lots of money that is.)

But like I said, I could be way to cynical about this.

-- 
Scot L. Harris
webid@xxxxxxxxxx

The bug starts here. 



[Index of Archives]     [Current Fedora Users]     [Fedora Desktop]     [Fedora SELinux]     [Yosemite News]     [Yosemite Photos]     [KDE Users]     [Fedora Tools]     [Fedora Docs]

  Powered by Linux