RE: OT: Security....

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 




> -----Original Message-----
> From: fedora-list-bounces@xxxxxxxxxx 
> [mailto:fedora-list-bounces@xxxxxxxxxx] On Behalf Of HaJo Schatz
> Sent: Thursday, 28 October 2004 17:37
> To: For users of Fedora Core releases
> Subject: Re: OT: Security....
> 
> 
> 
> On Wed, October 27, 2004 18:54, Jim Higson said:
> >> Good points James...you missed one though... port 22. I see more 
> >> attempts on SSH than any other port....stupid and LAME 
> attempts but 
> >> more on this than any other...
> >
> > Out of curiosity, how much does it really matter so long as 
> you have 
> > strong passwords?
> 
> I do see more brute force attempts @ ssh these days and start 
> wondering how much longer some script kiddie needs to make 
> the algortihm a bit more clever (and eg attack user names on 
> certain hosts which are likely to exist. This could be 
> harvested eg from email addresses...).

If you do some Googling, you will no doubt find the info on this in some
security forums that I found when it first started on Port 22 a few months
ago.  A couple of people seet up "honey pots" and waited and watched... the
result was that after one of the scripted attacks detects a well known
account / password combination, the attack changes fromn being scripted to
manual and a "root kit" is installed.  The attackers were not good at
covering their tracks in terms of command history, so that is what gave it
away as a manual as opposed to a scripted attack.  Here's a list of hack
source addresses that I've recorded over a period of two months:-

SSH Hack source addresses
	147.46.60.75
	220.70.167.67 
	141.45.183.18
	150.7.57.239
	155.207.19.247
	219.238.179.101
	220.69.12.96
	211.91.23.171
	67.42.142.160
	210.223.178.180
	216.93.183.244
	61.185.226.211
	222.99.91.173
	218.21.129.105
	66.55.167.210
	219.238.239.178
	193.0.122.75
	210.82.97.74
	211.174.185.89
	218.30.21.223
	200.153.74.133
	211.91.135.60
	212.182.102.66
	216.38.218.83
	163.26.22.18
	202.64.28.81
	203.251.202.83
	194.78.243.110
	220.64.160.18
	66.111.192.25
	200.231.30.83
	67.43.3.69
	147.142.232.200
	211.91.98.115
	61.166.6.60
	203.115.96.151
	211.98.106.33
	130.34.218.125
	210.107.239.79
	219.145.217.78
	130.34.218.125
	207.218.206.95
	165.229.192.210
	218.158.126.247
	211.114.239.129
	66.162.179.32
	163.19.1.111
	203.146.102.54
	61.234.47.16
	82.165.240.101
	210.22.128.135
	203.249.35.252
	210.103.69.193
	61.144.253.218
	211.114.246.8
	213.164.155.75
	218.234.208.2
	61.100.180.125
	212.92.88.253
	219.140.29.242
	202.155.108.211
	211.229.177.114
	144.230.99.53 
	222.45.45.132
	218.75.54.67

I checked one the other day and the IP was owned by a Korean University.

Regards,
David.
---------


> 
> I have hacked a script which tails /var/log/secure and reacts 
> on attempts to log in as root with password. Such offending 
> IPs are then denied port 22 access. Any comments, positive or 
> negative, on this?
> 
> 
> -- 
> HaJo Schatz <hajo@xxxxxxxx>
> http://www.HaJo.Net
> 
> PGP-Key:  http://www.hajo.net/hajonet/keys/pgpkey_hajo.txt
> 
> 
> -- 
> fedora-list mailing list
> fedora-list@xxxxxxxxxx
> To unsubscribe: http://www.redhat.com/mailman/listinfo/fedora-list
> 


[Index of Archives]     [Current Fedora Users]     [Fedora Desktop]     [Fedora SELinux]     [Yosemite News]     [Yosemite Photos]     [KDE Users]     [Fedora Tools]     [Fedora Docs]

  Powered by Linux