06-30-2013
I am considering attacks, actually i have proof of them and that's why i am posting here, trying to find out how they can get in other than SSH and FTP.
I do regular updates of my server so as far as i know everything is patched, should be no vulnerabilities,also,no one else has access to the server.
To brute-force my root account 506938 times they will need 253469 IP's cause they get permanently banned after 2 failed login attempts, but even if they did, my password is over 30 randomly generated characters long including upper + lower case letters, numbers, symbols and brackets.
For comparison a 10 char password with upper + lower case letters and numbers has a bit over 107 Billion combinations so i wish them good luck if they try to brute-force their way in lol.
Thats why i've posted here though to find out other ways they can get in other than SSH or FTP login so i can take measures to stop them or reduce their chances of success.
Last edited by DukeNuke2; 06-30-2013 at 10:20 AM..
5 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
Hi friends,
I am currently working on an issue where i should write a program which utilizes Cpu as specified by the user. The function should be provided with an argument ( how much percentage of CPU has to be utilized by the process ) for example CPU(75) should utilize 75% of CPU. The function... (11 Replies)
Discussion started by: nerdychandru
11 Replies
2. Solaris
hi all,
what i want to do
when user open terminal like tty5 and do his work
i want to see his terminal
how can i do this (1 Reply)
Discussion started by: xxmasrawy
1 Replies
3. IP Networking
hello,
can anyone suggest how to delay the incoming packets ??
or how the packets are prossed inside the kernal and a way to make the packets wait a while??
it wud be vry helpful
regards
sameer (7 Replies)
Discussion started by: sameer kulkarni
7 Replies
4. Red Hat
HI,
I have a Centos linux box and there is interface connect to internet.
I stop the iptables in this box .
After a few day , I find the linux box have been hacked and install some perl script into the box .
Could anyone tell me how the hacker can login into the centos box without knowing... (1 Reply)
Discussion started by: chuikingman
1 Replies
5. Homework & Coursework Questions
Hi my name is Manju.
->I have configure the two way authentication on my linux server.
->Now I am able to apply two way authenticator on particuler user.
->Now I want to map this linux server to my AD server.
->Kindly tell me how to map AD(Active Directory) with this linux server.
... (2 Replies)
Discussion started by: manjusharma128
2 Replies
LEARN ABOUT REDHAT
nwvolinfo
NWVOLINFO(8) nwvolinfo NWVOLINFO(8)
NAME
nwvolinfo - Diplay info on NetWare Volumes
SYNOPSIS
nwvolinfo [ -h ] [ -S server ] [ -U user name ] [ -P password | -n ] [ -C ] [ -v volume ] [ -N ]
DESCRIPTION
nwvolinfo displays information on a NetWare Server Volume.
nwvolinfo looks up the file $HOME/.nwclient to find a file server, a user name and possibly a password. See nwclient(5) for more informa-
tion. Please note that the access permissions of $HOME/.nwclient MUST be 600 for security reasons.
OPTIONS
-h
-h is used to print out a short help text.
-S server
server is the name of the server you want to use.
-U user
user is the user name to use for login.
-P password
password is the password to use for login. If neither -n nor -P are given, and the user has no open connection to the server, nwvolinfo
prompts for a password.
-n
-n should be given if no password is required for the login.
-C
By default, passwords are converted to uppercase before they are sent to the server, because most servers require this. You can turn off
this conversion by -C.
-v volume
The volume name to be used. Defaults to 'SYS'.
-N
Display the information in numeric-only format for use in a pipe.
AUTHORS
nwvolinfo was written by Jacek Stepniewski <cunio@gazeta.pl> based on utilities by Volker Lendecke.
nwvolinfo 7/9/1996 NWVOLINFO(8)