Sponsored Content
Special Forums Cybersecurity How can someone hack into a Linux server ? Post 302827853 by ParanoiaUser on Monday 1st of July 2013 02:59:32 AM
Old 07-01-2013
Quote:
Originally Posted by Corona688
This kind of paranoid security can be used against you in a pretty effective denial-of-service. If someone wants to lock you out of your machine, failing two logins can do it.
Easier said than done, they will first need to have access to my PC to do that and even if by some miracle someone decides to do that my internet IP is dynamic so i can just reconnect to the internet and reset the ban Smilie or log in from my phone and reset the ban.

This aren't really the answers i am looking for though, would be nice if you guys can tell me other ways an external attacker could get in my machine or what to do to better secure it.
 

5 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

Hack CPU Utilization

Hi friends, I am currently working on an issue where i should write a program which utilizes Cpu as specified by the user. The function should be provided with an argument ( how much percentage of CPU has to be utilized by the process ) for example CPU(75) should utilize 75% of CPU. The function... (11 Replies)
Discussion started by: nerdychandru
11 Replies

2. Solaris

tty hack

hi all, what i want to do when user open terminal like tty5 and do his work i want to see his terminal how can i do this (1 Reply)
Discussion started by: xxmasrawy
1 Replies

3. IP Networking

how to hack linux driver to delay incoming packets

hello, can anyone suggest how to delay the incoming packets ?? or how the packets are prossed inside the kernal and a way to make the packets wait a while?? it wud be vry helpful regards sameer (7 Replies)
Discussion started by: sameer kulkarni
7 Replies

4. Red Hat

Hack a centos Linux box

HI, I have a Centos linux box and there is interface connect to internet. I stop the iptables in this box . After a few day , I find the linux box have been hacked and install some perl script into the box . Could anyone tell me how the hacker can login into the centos box without knowing... (1 Reply)
Discussion started by: chuikingman
1 Replies

5. Homework & Coursework Questions

Configure the AD Window server with Linux server(google Authenticator is installed)

Hi my name is Manju. ->I have configure the two way authentication on my linux server. ->Now I am able to apply two way authenticator on particuler user. ->Now I want to map this linux server to my AD server. ->Kindly tell me how to map AD(Active Directory) with this linux server. ... (2 Replies)
Discussion started by: manjusharma128
2 Replies
FAILLOG(8)						      System Manager's Manual							FAILLOG(8)

NAME
faillog - examine faillog and set login failure limits SYNOPSIS
faillog [-u login-name] [-a] [-t days] [-m max] [-pr] DESCRIPTION
faillog formats the contents of the failure log, /var/log/faillog, and maintains failure counts and limits. The order of the arguments to faillog is significant. Each argument is processed immediately in the order given. The -p flag causes failure entries to be printed in UID order. Entering -u login-name flag will cause the failure record for login-name only to be printed. Entering -t days will cause only the failures more recent than days to be printed. The -t flag overrides the use of -u. The -a flag causes all users to be selected. When used with the -p flag, this option selects all users who have ever had a login failure. It is meaningless with the -r flag. The -r flag is used to reset the count of login failures. Write access to /var/log/faillog is required for this option. Entering -u login-name will cause only the failure count for login-name to be reset. The -m flag is used to set the maximum number of login failures before the account is disabled. Write access to /var/log/faillog is required for this option. Entering -m max will cause all accounts to be disabled after max failed logins occur. This may be modified with -u login-name to limit this function to login-name only. Selecting a max value of 0 has the effect of not placing a limit on the number of failed logins. The maximum failure count should always be 0 for root to prevent a denial of services attack against the system. Options may be combined in virtually any fashion. Each -p, -r, and -m option will cause immediate execution using any -u or -t modifier. CAVEATS
faillog only prints out users with no successful login since the last failure. To print out a user who has had a successful login since their last failure, you must explicitly request the user with the -u flag, or print out all users with the -a flag. Some systems may replace /var/log with /var/adm or /usr/adm. FILES
/var/log/faillog - failure logging file SEE ALSO
login(1), faillog(5) AUTHOR
Julianne Frances Haugh (jockgrrl@ix.netcom.com) FAILLOG(8)
All times are GMT -4. The time now is 09:29 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy