06-30-2013
I am considering attacks, actually i have proof of them and that's why i am posting here, trying to find out how they can get in other than SSH and FTP.
I do regular updates of my server so as far as i know everything is patched, should be no vulnerabilities,also,no one else has access to the server.
To brute-force my root account 506938 times they will need 253469 IP's cause they get permanently banned after 2 failed login attempts, but even if they did, my password is over 30 randomly generated characters long including upper + lower case letters, numbers, symbols and brackets.
For comparison a 10 char password with upper + lower case letters and numbers has a bit over 107 Billion combinations so i wish them good luck if they try to brute-force their way in lol.
Thats why i've posted here though to find out other ways they can get in other than SSH or FTP login so i can take measures to stop them or reduce their chances of success.
Last edited by DukeNuke2; 06-30-2013 at 10:20 AM..
5 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
Hi friends,
I am currently working on an issue where i should write a program which utilizes Cpu as specified by the user. The function should be provided with an argument ( how much percentage of CPU has to be utilized by the process ) for example CPU(75) should utilize 75% of CPU. The function... (11 Replies)
Discussion started by: nerdychandru
11 Replies
2. Solaris
hi all,
what i want to do
when user open terminal like tty5 and do his work
i want to see his terminal
how can i do this (1 Reply)
Discussion started by: xxmasrawy
1 Replies
3. IP Networking
hello,
can anyone suggest how to delay the incoming packets ??
or how the packets are prossed inside the kernal and a way to make the packets wait a while??
it wud be vry helpful
regards
sameer (7 Replies)
Discussion started by: sameer kulkarni
7 Replies
4. Red Hat
HI,
I have a Centos linux box and there is interface connect to internet.
I stop the iptables in this box .
After a few day , I find the linux box have been hacked and install some perl script into the box .
Could anyone tell me how the hacker can login into the centos box without knowing... (1 Reply)
Discussion started by: chuikingman
1 Replies
5. Homework & Coursework Questions
Hi my name is Manju.
->I have configure the two way authentication on my linux server.
->Now I am able to apply two way authenticator on particuler user.
->Now I want to map this linux server to my AD server.
->Kindly tell me how to map AD(Active Directory) with this linux server.
... (2 Replies)
Discussion started by: manjusharma128
2 Replies
LEARN ABOUT XFREE86
dpkg-preconfigure
DPKG-PRECONFIGURE(8) Debconf DPKG-PRECONFIGURE(8)
NAME
dpkg-preconfigure - let packages ask questions prior to their installation
SYNOPSIS
dpkg-preconfigure [options] package.deb
dpkg-preconfigure --apt
DESCRIPTION
dpkg-preconfigure lets packages ask questions before they are installed. It operates on a set of debian packages, and all packages that
use debconf will have their config script run so they can examine the system and ask questions.
OPTIONS
-ftype, --frontend=type
Select the frontend to use.
-pvalue, --priority=value
Set the lowest priority of questions you are interested in. Any questions with a priority below the selected priority will be ignored
and their default answers will be used.
--terse
Enables terse output mode. This affects only some frontends.
--apt
Run in apt mode. It will expect to read a set of package filenames from stdin, rather than getting them as parameters. Typically this
is used to make apt run dpkg-preconfigure on all packages before they are installed. To do this, add something like this to
/etc/apt/apt.conf:
// Pre-configure all packages before
// they are installed.
DPkg::Pre-Install-Pkgs {
"dpkg-preconfigure --apt --priority=low";
};
-h, --help
Display usage help.
SEE ALSO
debconf(7)
AUTHOR
Joey Hess <joeyh@debian.org>
2018-02-28 DPKG-PRECONFIGURE(8)