<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Be Hacked:  what is the login-authentication-flowchat in Operating System - Linux</title>
    <link>https://community.hpe.com/t5/operating-system-linux/be-hacked-what-is-the-login-authentication-flowchat/m-p/2784139#M2196</link>
    <description>i was bee hacked, one account can be login by telnet for root shell directory, but the others can't.&lt;BR /&gt;for normal root account can not login yet, so i think all of the secureety for telnet in /etc/ might have not bee admended;&lt;BR /&gt;&lt;BR /&gt;the second, the /bin/login file is normal wich size and date, &lt;BR /&gt;third, once i delete the account and add the same account with the same password again, all the privious previleges disappear, so, it seems not bybass admend in login file.&lt;BR /&gt;&lt;BR /&gt;now the question is : where the hacker revised so as for root telnet login?&lt;BR /&gt;in other words, what is the login-authentication-flowchat?  i think it is pam-login-util, anything else?  where can i get the source and documents?&lt;BR /&gt;&lt;BR /&gt;thanks for your tips;&lt;BR /&gt;fredeick&lt;BR /&gt;&lt;BR /&gt;ps: i do not want to reinstall my system at once, and i ususaly use ssh in place of telnet, i only want to know how the hacker can do that, and found the method to defend him.&lt;BR /&gt;&lt;BR /&gt;tha</description>
    <pubDate>Mon, 12 Aug 2002 13:48:51 GMT</pubDate>
    <dc:creator>frederick van targero</dc:creator>
    <dc:date>2002-08-12T13:48:51Z</dc:date>
    <item>
      <title>Be Hacked:  what is the login-authentication-flowchat</title>
      <link>https://community.hpe.com/t5/operating-system-linux/be-hacked-what-is-the-login-authentication-flowchat/m-p/2784139#M2196</link>
      <description>i was bee hacked, one account can be login by telnet for root shell directory, but the others can't.&lt;BR /&gt;for normal root account can not login yet, so i think all of the secureety for telnet in /etc/ might have not bee admended;&lt;BR /&gt;&lt;BR /&gt;the second, the /bin/login file is normal wich size and date, &lt;BR /&gt;third, once i delete the account and add the same account with the same password again, all the privious previleges disappear, so, it seems not bybass admend in login file.&lt;BR /&gt;&lt;BR /&gt;now the question is : where the hacker revised so as for root telnet login?&lt;BR /&gt;in other words, what is the login-authentication-flowchat?  i think it is pam-login-util, anything else?  where can i get the source and documents?&lt;BR /&gt;&lt;BR /&gt;thanks for your tips;&lt;BR /&gt;fredeick&lt;BR /&gt;&lt;BR /&gt;ps: i do not want to reinstall my system at once, and i ususaly use ssh in place of telnet, i only want to know how the hacker can do that, and found the method to defend him.&lt;BR /&gt;&lt;BR /&gt;tha</description>
      <pubDate>Mon, 12 Aug 2002 13:48:51 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/be-hacked-what-is-the-login-authentication-flowchat/m-p/2784139#M2196</guid>
      <dc:creator>frederick van targero</dc:creator>
      <dc:date>2002-08-12T13:48:51Z</dc:date>
    </item>
    <item>
      <title>Re: Be Hacked:  what is the login-authentication-flowchat</title>
      <link>https://community.hpe.com/t5/operating-system-linux/be-hacked-what-is-the-login-authentication-flowchat/m-p/2784140#M2197</link>
      <description>Checkout &lt;A href="http://www.kernel.org/pub/linux/libs/pam/Linux-PAM-html/pam.html" target="_blank"&gt;http://www.kernel.org/pub/linux/libs/pam/Linux-PAM-html/pam.html&lt;/A&gt; for information on PAM&lt;BR /&gt;&lt;BR /&gt;Also Checkout &lt;A href="http://ctdp.tripod.com/os/linux/howlinuxworks/linux_hllogin.html" target="_blank"&gt;http://ctdp.tripod.com/os/linux/howlinuxworks/linux_hllogin.html&lt;/A&gt; for how login works.&lt;BR /&gt;&lt;BR /&gt;If you have infact been compromised you should do a complete format and reload if that is possible. If that is not an option then run a check for installed trojans  and rootkits as well as other exploits. Also you may want to run nmap to see what ports are open and close anything that you don't want open for traffic. You can get these tools from the internet, one for rootkits is &lt;A href="http://www.chkrootkit.org/" target="_blank"&gt;http://www.chkrootkit.org/&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Use google to find any other security scanners that you may need.&lt;BR /&gt;&lt;BR /&gt;Hope it helps.</description>
      <pubDate>Mon, 12 Aug 2002 21:39:58 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/be-hacked-what-is-the-login-authentication-flowchat/m-p/2784140#M2197</guid>
      <dc:creator>Jeffrey S. Sims</dc:creator>
      <dc:date>2002-08-12T21:39:58Z</dc:date>
    </item>
    <item>
      <title>Re: Be Hacked:  what is the login-authentication-flowchat</title>
      <link>https://community.hpe.com/t5/operating-system-linux/be-hacked-what-is-the-login-authentication-flowchat/m-p/2784141#M2198</link>
      <description>Hi,&lt;BR /&gt;For Defending a system against hacking , you&lt;BR /&gt;have understand the methods of hacking . This&lt;BR /&gt;will give you enough knowledge for selecting&lt;BR /&gt;proper firewalls or tools for the your network&lt;BR /&gt;security.&lt;BR /&gt;go through this site.&lt;BR /&gt;&lt;A href="http://www.hackinglinuxexposed.com/" target="_blank"&gt;http://www.hackinglinuxexposed.com/&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;In your case I advise to reinstall the sytem as&lt;BR /&gt;soon as possible as lot of binaries will trojaned by the hacker. Some trojans may even launch a attack against some other innocent servers in internet. And prevent future attacks by knowing hacking methods from above said link.&lt;BR /&gt;&lt;BR /&gt;regards,&lt;BR /&gt;U.SivaKumar&lt;BR /&gt;</description>
      <pubDate>Tue, 13 Aug 2002 03:46:43 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/be-hacked-what-is-the-login-authentication-flowchat/m-p/2784141#M2198</guid>
      <dc:creator>U.SivaKumar_2</dc:creator>
      <dc:date>2002-08-13T03:46:43Z</dc:date>
    </item>
    <item>
      <title>Re: Be Hacked:  what is the login-authentication-flowchat</title>
      <link>https://community.hpe.com/t5/operating-system-linux/be-hacked-what-is-the-login-authentication-flowchat/m-p/2784142#M2199</link>
      <description>i have assign points to both of you, why it always display "unsigned"?</description>
      <pubDate>Wed, 14 Aug 2002 03:15:13 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/be-hacked-what-is-the-login-authentication-flowchat/m-p/2784142#M2199</guid>
      <dc:creator>frederick van targero</dc:creator>
      <dc:date>2002-08-14T03:15:13Z</dc:date>
    </item>
    <item>
      <title>Re: Be Hacked:  what is the login-authentication-flowchat</title>
      <link>https://community.hpe.com/t5/operating-system-linux/be-hacked-what-is-the-login-authentication-flowchat/m-p/2784143#M2200</link>
      <description>Did you find out how the attacker got in? What method did he used? Please reply, so this way the rest of us can learn from it and secure our systems from future attacks regarding this exploit. Thanks.</description>
      <pubDate>Thu, 15 Aug 2002 13:21:18 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/be-hacked-what-is-the-login-authentication-flowchat/m-p/2784143#M2200</guid>
      <dc:creator>K.C. Chan</dc:creator>
      <dc:date>2002-08-15T13:21:18Z</dc:date>
    </item>
    <item>
      <title>Re: Be Hacked:  what is the login-authentication-flowchat</title>
      <link>https://community.hpe.com/t5/operating-system-linux/be-hacked-what-is-the-login-authentication-flowchat/m-p/2784144#M2201</link>
      <description>seems it comes from openssh, i use the ssh which come with RH73, version 3.1, may be it is the problem, whether it use one account(with bash of nologin) and password, can attached via openssh weakness?&lt;BR /&gt;where is the source and documents?&lt;BR /&gt;thanks&lt;BR /&gt;&lt;BR /&gt;frederick</description>
      <pubDate>Fri, 16 Aug 2002 02:01:23 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/be-hacked-what-is-the-login-authentication-flowchat/m-p/2784144#M2201</guid>
      <dc:creator>frederick van targero</dc:creator>
      <dc:date>2002-08-16T02:01:23Z</dc:date>
    </item>
    <item>
      <title>Re: Be Hacked:  what is the login-authentication-flowchat</title>
      <link>https://community.hpe.com/t5/operating-system-linux/be-hacked-what-is-the-login-authentication-flowchat/m-p/2784145#M2202</link>
      <description>Hi,&lt;BR /&gt;Have a look at this advisory&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://www.cert.org/advisories/CA-2002-18.html" target="_blank"&gt;http://www.cert.org/advisories/CA-2002-18.html&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;regards,&lt;BR /&gt;U.SivaKumar&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Fri, 16 Aug 2002 03:51:18 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/be-hacked-what-is-the-login-authentication-flowchat/m-p/2784145#M2202</guid>
      <dc:creator>U.SivaKumar_2</dc:creator>
      <dc:date>2002-08-16T03:51:18Z</dc:date>
    </item>
  </channel>
</rss>

