Sponsored Content
Special Forums Cybersecurity Maybe a security problem involving Linux hosts Post 302980273 by SInt on Thursday 25th of August 2016 03:42:13 PM
Old 08-25-2016
Maybe a security problem involving Linux hosts

Hello,

with the following problem I feel helpless because I do not know where to look for the problem.
Sorry in advance for my poor English.

At some point the interaction with people on Freenode IRC has become mysterious and offending so that I checked my modem/router device. When I tried to make a change the modem gave me the error message that another admin is logged in. It alerted me because all other computers were disconnected. So I called my ISP and they agreed that my device is listed there at "being attacked". They sent me a replacement and they also sent me a new password.

With the new modem I booted a linux livecd that i got from a linux magazine. And from there I downloaded the ISOs and wiped all my machines using DBAN.

With all the people in my social environment telling me to relax, think positive and all that stuff like "its only your false perceiption on things" I stopped paying attention on mysterious errors, etc. Until I needed the Hexchat client to check a local ircd install. And it launched with 1 network added. I am absolutely sure I had 0 networks in that network list when I went on an IRC break. Several months before there was a similar thing where all 18 or 19 networks had their name changed to EF-Net.

Another thing is that I stored all my website passwords in Lastpass and when I went offline for 3 days to install and configure some things my passphrase was changed to the one I used several months ago and all my stored passwords were deleted.

I could provide several more of these stories.

I hope none of you guys reacts now how most people reacted: "this guy is crazy, give him more meds" or something. I know it sounds crazy and it is crazy. But lets say my observations are correct where could the entry point be for an attacker?


friendly Greetings,
SInt
 

6 More Discussions You Might Find Interesting

1. Shell Programming and Scripting

remote hosts access problem on solaris

hey guys, i am on a box named pluto and i need to be able to log into another box named genesis. i need to be able to ssh into genesis as root and not get asked for the password. what file do i need to edit on genesis to make this happen? i searched for the .rhosts file it doesn't seem to exist.... (1 Reply)
Discussion started by: Terrible
1 Replies

2. UNIX for Dummies Questions & Answers

problem in script involving month arithmetic

advance happy new year to all, i am having a script.The purpose of the scripts is as follows.If the current month is march,june,september or december ,inc_flg should be set to '1' otherwise inc_flg should be set to '2' month= date +"%m" if || || || ; then inc_flg = 1 else ... (6 Replies)
Discussion started by: rajarp
6 Replies

3. Programming

A challenging problem involving symbolic links.

Hello, I'm working on an application that bridges together several applications involved in creating a video workflow for editing with digital cinema cameras. The main platform is MacOSX. Because of the nature of some of the utilities for working with this video footage I must spoof filenames... (2 Replies)
Discussion started by: ibloom
2 Replies

4. Shell Programming and Scripting

problem feeding netcat a list of hosts

Hi, I'm having difficulty in making a bash script to get netcat to scan a list of hosts and their ports from another file and could use some help. Here's an example host list, "nc.host": 192.168.2.110 22 And here's the first script I tried to feed "nc.host" into netcat: "nc1.sh" ... (3 Replies)
Discussion started by: seanovision
3 Replies

5. Shell Programming and Scripting

Problem in expect script with password involving trailing backslash

Hi all, I have wriiten an expect script that genearates a public private key pair through ssh-keygen and then copies that key to the authorized keys file of the remote system . The problem i am facing is when i get a password for the remote machine containg a trailing backslash , the send command... (4 Replies)
Discussion started by: pradeeptyagi23
4 Replies

6. Solaris

How to copy a tar file on a series of remote hosts and untar it on those hosts?

Am trying to copy a tar file onto a series of remote hosts and untar it at the destination. Need to do this without having to do multiple ssh. Actions to perform within a single ssh session via shell script - copy a file - untar at destination (remote host) OS : Linux RHEL6 (3 Replies)
Discussion started by: sankasu
3 Replies
pam_console(8)						   System Administrator's Manual					    pam_console(8)

NAME
pam_console - control permissions for users at the system console SYNOPSIS
session optional /lib/security/pam_console.so auth required /lib/security/pam_console.so DESCRIPTION
pam_console.so is designed to give users at the physical console (virtual terminals and local xdm-managed X sessions by default, but that is configurable) capabilities that they would not otherwise have, and to take those capabilities away when the are no longer logged in at the console. It provides two main kinds of capabilities: file permissions and authentication. When a user logs in at the console and no other user is currently logged in at the console, pam_console.so will change permissions and own- ership of files as described in the file /etc/security/console.perms. That user may then log in on other terminals that are considered part of the console, and as long as the user is still logged in at any one of those terminals, that user will own those devices. When the user logs out of the last terminal, the console may be taken by the next user to log in. Other users who have logged in at the console during the time that the first user was logged in will not be given ownership of the devices unless they log in on one of the terminals; having done so on any one terminal, the next user will own those devices until he or she has logged out of every terminal that is part of the physical console. Then the race can start for the next user. In practice, this is not a problem; the physical console is not gener- ally in use by many people at the same time, and pam_console.so just tries to do the right thing in weird cases. ARGUMENTS
debug turns on debugging allow_nonroot_tty gain console locks and change permissions even if the TTY's owner is not root. permsfile=filename tells pam_console.so to get its permissions database from a different file than /etc/security/console.perms fstab=filename tells pam_console.so to read the table of configured filesystems from a file other than /etc/fstab when scanning permsfile. This file is used to map directories to device names. FILES
/var/run/console.lock /var/run/console/ /etc/security/console.apps /etc/security/console.perms SEE ALSO
console.perms(5) console.apps(5) /usr/doc/pam*/html/index.html pam_console_apply(8) /usr/doc/pam*/html/index.html BUGS
Let's hope not, but if you find any, please report them via the "Bug Track" link at http://bugzilla.redhat.com/bugzilla/ AUTHOR
Michael K. Johnson <johnsonm@redhat.com> Red Hat 2000/7/11 pam_console(8)
All times are GMT -4. The time now is 01:09 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy