Sponsored Content
Special Forums Cybersecurity How can someone hack into a Linux server ? Post 302827681 by Scrutinizer on Sunday 30th of June 2013 11:35:36 AM
Old 06-30-2013
What services do you use, what ports do you have open? If you are not using a web server what is the account www-data for? Any service that is running on the server and that can be approached from the Internet by some port number, can be used for a hack and can be vulnerable. If there is a weakness in a service / daemon, than an attacker could potentially acquire the access rights of the user that is used to run that daemon, bypassing any strong password authentication you might have in place..
 

5 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

Hack CPU Utilization

Hi friends, I am currently working on an issue where i should write a program which utilizes Cpu as specified by the user. The function should be provided with an argument ( how much percentage of CPU has to be utilized by the process ) for example CPU(75) should utilize 75% of CPU. The function... (11 Replies)
Discussion started by: nerdychandru
11 Replies

2. Solaris

tty hack

hi all, what i want to do when user open terminal like tty5 and do his work i want to see his terminal how can i do this (1 Reply)
Discussion started by: xxmasrawy
1 Replies

3. IP Networking

how to hack linux driver to delay incoming packets

hello, can anyone suggest how to delay the incoming packets ?? or how the packets are prossed inside the kernal and a way to make the packets wait a while?? it wud be vry helpful regards sameer (7 Replies)
Discussion started by: sameer kulkarni
7 Replies

4. Red Hat

Hack a centos Linux box

HI, I have a Centos linux box and there is interface connect to internet. I stop the iptables in this box . After a few day , I find the linux box have been hacked and install some perl script into the box . Could anyone tell me how the hacker can login into the centos box without knowing... (1 Reply)
Discussion started by: chuikingman
1 Replies

5. Homework & Coursework Questions

Configure the AD Window server with Linux server(google Authenticator is installed)

Hi my name is Manju. ->I have configure the two way authentication on my linux server. ->Now I am able to apply two way authenticator on particuler user. ->Now I want to map this linux server to my AD server. ->Kindly tell me how to map AD(Active Directory) with this linux server. ... (2 Replies)
Discussion started by: manjusharma128
2 Replies
filetea(8)						      System Manager's Manual							filetea(8)

NAME
filetea - Web based file sharing service daemon SYNOPSIS
filetea [OPTIONS] DESCRIPTION
This manual page documents briefly the filetea command. FileTea is a Web service that provides instant and anonymous file-sharing using only a standard browser as client. Unlike traditional Web based file-sharing services, FileTea does not store files server-side. Instead, files are just routed on-the-fly from seeder to leecher, through the server. filetea is the service daemon that runs on a FileTea server. It handles peer synchronization, file routing and status reporting; and also acts as web-server for static HTML content when run in standalone mode. OPTIONS
-h, --help Display a brief summary of the command-line options and their default values. -c config, --conf=config Absolute path for the configuration file to use, default is /etc/filetea/filetea.conf. -D, --daemonize Run the service in the background. -p port, --http-port=port Port to listen on for plain HTTP service, overriding the value specified in configuration file. -P port, --https-port=port Port to listen on for secure HTTP service (https), overriding the value specified in configuration file. FILES
/etc/filetea/filetea.conf Filetea config file. AUTHOR
This manpage has been written by Eduardo Lima Mitev <elima@igalia.com> 2011-10-21 filetea(8)
All times are GMT -4. The time now is 01:39 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy