<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Hacking attack in Operating System - Linux</title>
    <link>https://community.hpe.com/t5/operating-system-linux/hacking-attack/m-p/3443175#M15366</link>
    <description>Make sure if you don't have tripwire loaded, that you load it.. Tripwire is a HIDS package that came detect attempts on the host. &lt;BR /&gt;&lt;BR /&gt;I've caught and thwarted several SSH exploit attempts..  &lt;BR /&gt;&lt;BR /&gt;It reports failure and successful logins.. &lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Check CERT for any vulnerabilities for your aforementioned packages and Patch, Patch, Patch!!&lt;BR /&gt;&lt;BR /&gt;Make sure SSH is current and you define a decent password policy.  NO all, Alpha or Numeric, use a combination of Alpha, Numeric, and other such as (Some of these may act  as escape shutdown any protocol with a login that throws a clear text login, telnet, ftp. If you need http or ftp logins use https or sftp or scp</description>
    <pubDate>Thu, 16 Dec 2004 09:38:20 GMT</pubDate>
    <dc:creator>rmueller58</dc:creator>
    <dc:date>2004-12-16T09:38:20Z</dc:date>
    <item>
      <title>Hacking attack</title>
      <link>https://community.hpe.com/t5/operating-system-linux/hacking-attack/m-p/3443171#M15362</link>
      <description>&lt;BR /&gt;Hi. I suspect a hacking attack on my Fedora2 server. I get segmentation fault on commands like ls and su. Is there a way of verifying the presence of an attack or a root kit?&lt;BR /&gt;&lt;BR /&gt;And how did they get in? There are loads of services like telnet and Samba enabled on the server, but on the outside the firewall only SSH (tcp port 22), Apache web server (tcp port 80), Tomcat (tcp port 8080) and Postfix SMTP (tcp port 25) are exposed. What do I need to tighten?&lt;BR /&gt;&lt;BR /&gt;Is there a remedy somewhere or am I looking at burning the midnight oil with a fresh install?&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Tue, 14 Dec 2004 08:39:51 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/hacking-attack/m-p/3443171#M15362</guid>
      <dc:creator>Karsten Breivik_1</dc:creator>
      <dc:date>2004-12-14T08:39:51Z</dc:date>
    </item>
    <item>
      <title>Re: Hacking attack</title>
      <link>https://community.hpe.com/t5/operating-system-linux/hacking-attack/m-p/3443172#M15363</link>
      <description>the first step I recommend - it's disconnect linux box from network &amp;amp; reboot to single-user mode.&lt;BR /&gt;&lt;BR /&gt;After it you may :&lt;BR /&gt;&lt;BR /&gt;- go to security sites or take some book and learn about next steps - a long way&lt;BR /&gt;&lt;BR /&gt;- a short way - run "rpm -Va" for verify system integrity - you will receive a list of changed programs/files.&lt;BR /&gt;In addition you can search&amp;amp;download&amp;amp;run utilities for rootkit detections.</description>
      <pubDate>Tue, 14 Dec 2004 08:54:09 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/hacking-attack/m-p/3443172#M15363</guid>
      <dc:creator>Vitaly Karasik_1</dc:creator>
      <dc:date>2004-12-14T08:54:09Z</dc:date>
    </item>
    <item>
      <title>Re: Hacking attack</title>
      <link>https://community.hpe.com/t5/operating-system-linux/hacking-attack/m-p/3443173#M15364</link>
      <description>Recommandations.&lt;BR /&gt;&lt;BR /&gt;Change the firewall configuration.&lt;BR /&gt;&lt;BR /&gt;Block all protocols. Don't allow telent at all. If possible don't allow ftp. These two protocols use clear text authentication.&lt;BR /&gt;&lt;BR /&gt;Test your firewall with the telnet hostname 78 (tests port 78).&lt;BR /&gt;&lt;BR /&gt;Common current attacks:&lt;BR /&gt;Port 25 scripting to relay spam - watch /var/log/maillog&lt;BR /&gt;CGI script abuse. Use a formmail form to relay spam. watch maillog and access and error log for the webv server&lt;BR /&gt;&lt;BR /&gt;Take a look at /etc/passwd Look for additional accounts added, especially uid zero accounts. If you find any of these, take the machine off the network.&lt;BR /&gt;&lt;BR /&gt;I would suggest running Bastille security hardening on the box.&lt;BR /&gt;&lt;BR /&gt;If you feel the box is compromised, back up your data and do a complete new OS install. Fedora Core 3 is now out.&lt;BR /&gt;&lt;BR /&gt;Please post details of the actual attack for further assistance.&lt;BR /&gt;&lt;BR /&gt;SEP</description>
      <pubDate>Tue, 14 Dec 2004 09:17:56 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/hacking-attack/m-p/3443173#M15364</guid>
      <dc:creator>Steven E. Protter</dc:creator>
      <dc:date>2004-12-14T09:17:56Z</dc:date>
    </item>
    <item>
      <title>Re: Hacking attack</title>
      <link>https://community.hpe.com/t5/operating-system-linux/hacking-attack/m-p/3443174#M15365</link>
      <description>Last time when I have segmentation fault  It was virus. &lt;BR /&gt;YESSS VIRUS.  try panda software for linux.&lt;BR /&gt;I think that panda is free trail :)&lt;BR /&gt;&lt;BR /&gt;Tell me after that :))&lt;BR /&gt;&lt;BR /&gt;trq to verify your rpm using &lt;BR /&gt;rpm -v &lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Tue, 14 Dec 2004 09:44:54 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/hacking-attack/m-p/3443174#M15365</guid>
      <dc:creator>Ivajlo Yanakiev</dc:creator>
      <dc:date>2004-12-14T09:44:54Z</dc:date>
    </item>
    <item>
      <title>Re: Hacking attack</title>
      <link>https://community.hpe.com/t5/operating-system-linux/hacking-attack/m-p/3443175#M15366</link>
      <description>Make sure if you don't have tripwire loaded, that you load it.. Tripwire is a HIDS package that came detect attempts on the host. &lt;BR /&gt;&lt;BR /&gt;I've caught and thwarted several SSH exploit attempts..  &lt;BR /&gt;&lt;BR /&gt;It reports failure and successful logins.. &lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Check CERT for any vulnerabilities for your aforementioned packages and Patch, Patch, Patch!!&lt;BR /&gt;&lt;BR /&gt;Make sure SSH is current and you define a decent password policy.  NO all, Alpha or Numeric, use a combination of Alpha, Numeric, and other such as (Some of these may act  as escape shutdown any protocol with a login that throws a clear text login, telnet, ftp. If you need http or ftp logins use https or sftp or scp</description>
      <pubDate>Thu, 16 Dec 2004 09:38:20 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/hacking-attack/m-p/3443175#M15366</guid>
      <dc:creator>rmueller58</dc:creator>
      <dc:date>2004-12-16T09:38:20Z</dc:date>
    </item>
  </channel>
</rss>

