RE: Blackhole

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



I was reading an article where someone set up a "honeypot" to figure out how people were breaking into systems & figure out ways to stop them/track them...  After an initial system install (no firewalls, no updates), the average time for someone to take over the machine was, like, less than 4 hours.  (I'm thinking it was closer to 20 minutes)
 
An idea op how many scripts are running out there...
 
    -Tom

-----Original Message-----
From: redhat-list-bounces@xxxxxxxxxx [mailto:redhat-list-bounces@xxxxxxxxxx]On Behalf Of Chris Kenward
Sent: Monday, April 11, 2005 3:01 PM
To: 'General Red Hat Linux discussion list'
Subject: RE: Blackhole



Hi Mike 

> Do you have chkrootkit 0.45 installed and have you run it lately 
> just as a backup check of things? 

Nope - I downloaded it for the first time today. Also had a look at 
'rkhunter' which looks very impressive. Warned me that SSH allowed root 
access too! ;) Now I'm trying to figure out how to change that. Had a look 
in the SSH_Config file but not apparently in there. 

Strange - some of the packages also come up as have different MD5 algorythms 
than expected and that's sorta thrown me as well. I mean this is a cuppla 
week old install of Redhat.... Unless the hacker has changed something... 

Regards 
Chris 


-- 
redhat-list mailing list 
unsubscribe mailto:redhat-list-request@xxxxxxxxxx?subject=unsubscribe 
https://www.redhat.com/mailman/listinfo/redhat-list 

-- 
redhat-list mailing list
unsubscribe mailto:redhat-list-request@xxxxxxxxxx?subjecthttps://www.redhat.com/mailman/listinfo/redhat-list


[Index of Archives]     [CentOS]     [Kernel Development]     [PAM]     [Fedora Users]     [Red Hat Development]     [Big List of Linux Books]     [Linux Admin]     [Gimp]     [Asterisk PBX]     [Yosemite News]     [Red Hat Crash Utility]


  Powered by Linux