Solaris logs - Tracking failed attempts from my host
Hey all I'm having a big problem here. Someone is attempting an SSH to a destination host on which an account resides and locking the account. I'm trying to determine who is performing the SSH attempts from my host. For instance they're logged in as their standard account but then (I'm assuming) they're performing something like:
where locked_account is the system account in question and after 9 tries with the wrong password it locks the account on the destination host. We know the failed attempts are coming from my host but not sure who is executing that command.
I checked /var/adm/sulog which doesn't show anyone performing su access to this system (functional - it's not bin or sys or anything like that) account. Is there a way to determine if someone executes the aforementioned SSH attempt? I was thinking their bash_history but some are using ksh and don't have history enabled. I'm using SunOS 5.10.
Last edited by jim mcnamara; 01-22-2012 at 09:40 AM..
Reason: moved to Solaris
Hi. I would like to be able to deny IP address for too many failed login attemps (either from ssh, sftp, ftp, etc). The system I wish this to work on is an AIX 5.1 system. I'm new to AIX but I'm a linux user. There is a program for linux called fail2ban which reads from the log files and see if... (1 Reply)
Hi,
I have created the below ftp script to put files over to our capacity server, the check at the end works if ftp fails to run however if the script cannot login or the transfer itself failed there is no warnings.
Does anyone know the syntax to trap the erorr codes or to put a check within... (3 Replies)
Hi,
I have a linux redhat 9 server and I am concerned about the security on that server.
I would like to be able to write a script that records all the commands that were typed at the command prompt before the user calls the 'history -c' command and deletes all the history.
I was thinking about... (4 Replies)
Dear experts,
I am seeing a lot of TCP failed connection attempts from "netstat -s" on one of our servers.
How can I pin point what connection failed and what are the ports involved?
Any tools/commands I can dig in deeper to diag. what went wrong on these "failed connection attempts"?
... (2 Replies)
I have two log files from two different days and some jobs start on one day and finish on the next. I also have jobs that start and then don't finish until other jobs start and finish. I'm trying to create a csv file with job name, start time and end time in the order that the jobs started.
... (2 Replies)
Hi All
I am having VxVm on two Solaris hosts. host1 is using disk group dgHR. right now this server went down due to hardware fault. Not I need to import this dgHR into host2 server. Please let me know the procedure for the same. (1 Reply)
The purpose of this thread is for everyone to follow the same methodology so we can create a future table, for the benefit of all, that shows how many failed login attempts (hacking) per day per server (and per minute) are happening.
This is not a thread on writing scripts or creating... (10 Replies)
Discussion started by: Neo
10 Replies
LEARN ABOUT OSX
dsenableroot
dsenableroot(8) BSD System Manager's Manual dsenableroot(8)NAME
dsenableroot -- enables or disables the root account.
SYNOPSIS
dsenableroot [-d] [-u username] [-p password] [-r rootPassword]
DESCRIPTION
dsenableroot sets the password for the root account if enabling the root user account. Otherwise, if disable [-d] is chosen, the root
account passwords are removed and the root user is disabled.
A list of flags and their descriptions:
-u username
Username of a user that has administrative privileges on this computer.
-p password
Password to use in conjunction with the specified username. If this is not specified, you will be prompted for entry.
-r rootPassword
Password to be used for the root account. If this is not specified for enabling, you will be prompted for entry.
EXAMPLES -dsenableroot
Your username will be used and you will be queried for both your password and the new root password to be set to enable the root
account.
-dsenableroot -d
Your username will be used and you will be queried for only your password to disable the root account.
-dsenableroot -u username -p userpassword -r rootpassword
The supplied arguments will be used to enable the root account.
-dsenableroot -d -u username -p userpassword
The supplied arguments will be used to disable the root account.
Mac OS August 08 2003 Mac OS