Fedora Security :: Check If There Are Intruders Or Hackers In System?

Apr 17, 2011

I'm using FC14_64

How can I check if there are intruders or hackers in my system and how to boot the hell out of my system?

View 9 Replies


ADVERTISEMENT

Security :: System Subjected To Heavy Fire On The Part Of Would-be Intruders?

Aug 11, 2010

Kernel 2.6.21.5, GNU (Slackware 12.0).

The following are two extracts from /var/log/messages.

Code:
Aug 10 17:29:52 darkstar sshd[11675]: reverse mapping checking getaddrinfo for 116.214.25
-66.del.tulipconnect.com [116.214.25.66] failed - POSSIBLE BREAK-IN ATTEMPT!
Aug 10 17:29:52 darkstar sshd[11675]: Invalid user plcmspip from 116.214.25.66
Aug 10 17:29:52 darkstar sshd[11675]: Failed password for invalid user plcmspip from 116.
214.25.66 port 40032 ssh2

[Code]...

View 3 Replies View Related

Ubuntu Security :: Stop Hackers Accessing Personal Files Which Are NOT Transmitted Over Wi-Fi Connection?

Jan 25, 2010

If I enable Wi-Fi on my laptop and use a public Wi-Fi hotspot at an airport, will a firewall such as UFW be enough to stop hackers accessing my personal files which are NOT transmitted over the Wi-Fi connection?

View 9 Replies View Related

Security :: Some Precaution Should Take To Protect Notebook From Intruders?

Jun 3, 2010

I am planning a trip for a few days and I will be staying at an inn with Wifi access. All the guests are allowed to use it. A friend of mine has been there, he told me there are several other private spots around the house, i.e. lots of other people using Wifi. My friend told me the inn uses WEP, so who knows how many times their access point has been hacked and accessed without permission...

My concern is that I will be there for a few days with my notebook, I will have to work once in a while, connected to the Internet. Is there some precaution I should take to protect my notebook from intruders? Is it advisable to install a firewall in my notebook (iptables?) or am I just overreacting? Is it possible for one of the guests or neighbors to break into my notebook?

View 8 Replies View Related

Security :: Check If The System Has The Available Security Updates Installed?

Aug 25, 2010

Is there a way to to check if the system has the available security updates installed? Specifically, I am looking to do this programmatically.

View 1 Replies View Related

Fedora Security :: Wierd SeLinux Security Alerts \ Got:Code:Summary: System May Be Seriously Compromised?

Apr 13, 2011

this is the allert i got:Code:Summary:Your system may be seriously compromised! /usr/sbin/NetworkManager tried to loada kernel module.Detailed Description:SELinux has prevented NetworkManager from loading a kernel module. All confinedprograms that need to load kernel modules should have already had policy writtenfor them. If a compromised application tries to modify the kernel this AVC willbe generated. This is a serious issue.Your system may very well be compromised.Allowing Access:Contact your security administrator and report this issue.Additional Information:

Source Context system_u:system_r:NetworkManager_t:s0
Target Context system_u:system_r:NetworkManager_t:s0
Target Objects None [ capability ]

[code]....

View 5 Replies View Related

Fedora Security :: How To Check Memory Stick And External Hard Drive From Virus?

Sep 30, 2010

now I'm done full transition from windows 100%.i want ask how can i check my memory stick and External Hard Drive from virus ?

View 9 Replies View Related

Fedora Installation :: Check Where An Application Gets Installed On System

Oct 2, 2010

how to check where an application gets installed on my system!!!

View 14 Replies View Related

Fedora Servers :: Check In Dates Getting Changed / Updated To System Time

Jun 21, 2011

I am using the default CVS available in Fedora 9. I initiated the CVS server by
cvs -d /usr/local/cvsproj init
To check-in and check-out the following exports commands are used
export CVS_RSH=ssh
export CVSROOT=:ext:swathi@SERVER:/usr/local/cvsproj

I shall explain problem by taking an example. A project was checked in long before (for example the checkin date is 25 Feb 2010). And today (i.e. 21 June 2011) I checked out the project from the repository. After checkout, the date of the project in the repository is changed from 25 Feb 2010 to 21 June 2011. This date is set to all the subfolders in that project. But the files in the project retains the checking date i.e. 25 Feb 2010. Why the check-in dates are getting updated/changed to the system time after doing check-out.

View 2 Replies View Related

General :: How To Trace And Remove Intruders

Jan 9, 2010

When I log into Mint8 ,for example, the bottom bar (task bar) shows activity I did not start eg, keyboard amongst others. System logs are suspicious:

an 9 22:23:24 patti-desktop dhclient: DHCPACK of 192.168.0.100 from 192.168.0.1
Jan 9 22:23:24 patti-desktop dhclient: bound to 192.168.0.100 -- renewal in 40777 seconds.
Jan 9 22:23:24 patti-desktop NetworkManager: <info> DHCP: device eth0 state changed preinit -> bound

[code]....

'patti-desktop' is not the user I'm trying to login to but its was and still exist a group (ops). Also having difficulty using sudo but that might be my error. Is there a program I can use see what is going wrong correct it.

View 12 Replies View Related

General :: Intruders Can Log Into Box Using Run Level 1 Without Using Password

Mar 23, 2010

Well I have been using linux for sometime, and have kept strong passwords for every user account. But recently I noticed when we boot into run level 1, it does not ask for any password.This means that anyone can turn on my computer in my absence, on grub menu press a, then 1 to append 1 to the kernel arguments, which will make my system boot in run level 1.It won't ask for any password. Once in run level 1, the intruder can easily access my files, copy them, change their permissions, change even the root password.

Now how can I make my system more secure? Is there a way to get detailed info of each log in session, like which user, which run level, for how long and things like that?

View 4 Replies View Related

Ubuntu Networking :: Hunting Intruders In Wireless Network?

Oct 1, 2010

Many of us maybe are afraid to by the fact that others are using our wireless connection (without permission of course). What is the command I have to run on the terminal in order to list possible logs of intruders?

View 2 Replies View Related

Fedora Security :: How To Become The Root On System

May 8, 2009

i still can't see quite well the security reason for not allowing one logging in as root on Fedora, but anyway...how to become the root on my system, Fedora 10, please?i did open a terminal and typed s - root then my password, now im the root, but only on the terminal, as CLI, but what if i want to change the munu.lst inside grub i.e.? and some other files or settings that there's no option to just type in the root password, how to overcome that please?

View 9 Replies View Related

General :: Moved File Partitions - File System Check Failed On Fedora, Windows Will Not Boot

Dec 16, 2009

my partitioning layout was as follows

Vista Recovery
Windows 7
GRUB
Extended
-->Fedora 12 (ext4)

so, I shrunk my recovery in Windows 7 successfully, and booted into my Fedora 12 live cd to run Gparted, and move the partitions so that the free space could go towards fedora, I did such, and then I couldn't expand the partition to my dismay. Next, I woke up this morning, tried to boot to fedora to run SSH, grub loaded, but when I tried to boot fedora, I got the "File system check failed" error, and when I tried 7, it just went to a blank screen with a single "_" in the top left-hand corner.

View 7 Replies View Related

Fedora Security :: Encrypt System During The Installation

Jan 17, 2010

Is the encrypt system during the install part of the SE Linux or is a whole other thing and another question maybe a sounding a little conspiracy but SE linux is made by the NSA can I trust SE linux and it not be a backdoor to my stuff

View 4 Replies View Related

Fedora Security :: How To Viruses Infect A System?

May 25, 2010

I am a very new Linux user. My first OS is Fedora 12, which I just recently installed into my laptop. So far, I am thoroughly enjoying it. I do have a question bugging my mind though. Linux systems are known to be very safe from viruses, mainly due to programmers targeting the Windows platform. In Windows, common methods for virus infections are from infected executable files, external drives autorun... ETC.

Now my question is how do viruses spread into a Linux system? And with so few viruses known to exist for Linux systems, do I really need to be aware and take precautions for viruses (For example in Windows, disabling autorun function for external drives)?

View 14 Replies View Related

Fedora Security :: Slow - No System Updates ?

Oct 4, 2010

My system went for three days w/o a software update... Is this normal(anyone experiencing this?)...?

It seems like to me.. Fedora 13 has a longer update interval than Fedora 12.. I remember back in Fedora 12 I get security updates like every other 12 hrs.. (I know as with security patches the less the "better"(in some way))..

But I am still concerned.. security updates has been slow for me.

View 3 Replies View Related

Security :: Fedora System Compromised But No Changes Made?

Jan 25, 2011

The infrastructure of the Fedora Project was compromised over the weekend and an account belonging to a Fedora contributor was taken over by an attacker. However, Fedora officials said they don't believe that the attacker was able to push any changes to the Fedora package system or make any actual changes to the infrastructure.

The attack appears to have targeted one specific user account, which had some high-value privileges. The attacker was able to compromise the account externally, and then had the ability to connect remotely to some Fedora systems. The attacker also changed the account's SSH key, Fedora officials said.

View 2 Replies View Related

Ubuntu Security :: How To Check What The UFW Is Blocking

Mar 26, 2010

I can see what Firestarter is blocking in the Firestarter/Events tab, but after reading all the man pages of UFW, I still don't know how to check what the UFW is blocking.

View 9 Replies View Related

General :: Online Security Check

Jul 5, 2009

I'm trying to do an online security check on my Linux system.I would like to do a Firewall/Antivirus test. What free online sites do you know?For instance, I use ShieldsUp to test some firewall's components.Does someone recommend anything else?I still can't find a site that tests for the presence of virus/malware installed.Are there any?

View 8 Replies View Related

Security :: Check For HTTPS In Firefox?

Mar 27, 2011

Is there a plugin or some other way to check to see if a website has https available, and use that instead? I know some sites, like Wikipedia have a different hostname for SSL support while others have the same hostname, just What I would really like to seesome kind of header in the http reply or the html that saysSecureAvailable= is there any system like this in place? There's too many issues with with unencrypted http to continue having that as the default.

View 3 Replies View Related

Ubuntu Security :: Check Openssh Md5 Checksum

Aug 10, 2010

I have Ubuntu 10.04 and I used my ssh to connect to a webserver. This is the version that I have installed.

Quote:

OpenSSH_5.3p1 Debian-3ubuntu4, OpenSSL 0.9.8k 25 Mar 2009

Apparently the server was hacked using my user and the server admin suggested the my ssh can be tainted.

do a checksum of the ssh, but I cannot find this file on my system.

Code:
md5sum /usr/sbin/sshd

And I will need a md5 hash from a good untainted version and I cannot find that as well on the openssh website.

View 7 Replies View Related

Ubuntu Security :: How To Disable Apt Authentication Check

Apr 3, 2011

having a slow internet connection, I bought the all maverick repository on DVDs, copied the files on a usb drive and modified the apt sources file to consider the local repository only:

Code:

# deb file:/var/www/ubuntu_local/ ./
deb file:/var/www/maverick/dvd1/ maverick main universe restricted multiverse
deb file:/var/www/maverick/dvd2/ maverick main universe restricted multiverse
deb file:/var/www/maverick/dvd3/ maverick main universe restricted multiverse

[code]....

Even though I am reasonably sure it is safe, this local repository is not authenticated and I can only install package through the command line or synaptic, the Ubuntu Software Centre giving an error message "Requires installation of untrusted packages"...I thus would like to disable the apt authentication check for this local repository.

View 2 Replies View Related

General :: Script To Check Password Security

Apr 22, 2010

Im trying to make a script that will test the suitability of a password. I understand that all the features I want are in the /etc/pam.d/common-password file. From here I can change the length of a password, what characters must be in a password, if the words are in the dictionary, etc... but I don't know how to change these values by using a script. I want it in a script because I want to be able to suggest a more suitable password if the original password doesn't meet the criteria.

View 3 Replies View Related

Security :: Check The Listening Url In The Remote Machine?

Jul 8, 2010

I have stuk up in big issue here , I just want to find the remote url in which it listens ?

I know the remote host and remote port number but i just want to which url the web application listen

For example : Host : 1.1.1.1 & port no : 8080

But i remember the url would be http://1.1.1.1/(something):8080

I want to find the complete url in which it listens ?

In nmap whether i can achive this or anyother tool ?

View 5 Replies View Related

Security :: Check RPM Signatures During A Kickstart Install?

Sep 15, 2010

Is there a way to check RPM signatures during a kickstart install? Seems as if the signatures are not checked during an installation.

View 5 Replies View Related

Security :: Where Are Good Places To Check For Backdoors?

Oct 11, 2010

rc.scripts, cron jobs, what else? Can hidden files be executed simply by going to a directory that has that hidden file inside it?

View 5 Replies View Related

Fedora Security :: Make The Root File System Read-only

Jun 23, 2009

I am interested in making the root file system is read-only. I've moved /var and /tmp file systems to another partitions. There are two files in the /etc directory that need to be writable.

These are:

I've moved this files to /var and linked it. I've added command to the /etc/rc.d/rc.local file:

That's it. Are there other solutions to make the root file system is read-only?

View 1 Replies View Related

Fedora Security :: System Is Continuously Hang When Log To Yahoo Webpage?

Dec 6, 2009

i am afraid that some one palying in my fedora 12 system , " hacked " first i got this message when i log to my broadband internet provider

Quote: You have asked Firefox to connect securely to ******, but we can't confirm that your connection is secure. Normally, when you try to connect securely, sites will present trusted identification to prove that you are going to the right place. However, this site's identity can't be verified What Should I Do?

If you usually connect to this site without problems, this error could mean that someone is trying to impersonate the site, and you shouldn't continue.

[Code]...

then when i log to yahoo mail , my system hang for a while then continue. how do i know that my system is secure ? what are the steps i should follow to secure my system ? i am still newbie and i dont have time to spend it in search in google or reading blogs

View 2 Replies View Related

Fedora Security :: Log Files Empty - System Does Not Allow Root To Login ?

Feb 2, 2010

For a month or so now, I have been enabling ssh and opening port 22. I cron'ed the start and stop commands to leave them open only a few hours a day. After a bit, I checked my logs to find that some IP or another was attempting to brute force my root account.

I took little real threat by the offense.

(1) my system does not allow root to login and

(2) it would cut them off sooner than later when my system issued the stop command.

fast forward

Today I log in to find that all of my log files, as viewed from the gnome log file viewer, were empty of entries from about noon yesterday and prior.

Though I haven't noticed anything at all out of the ordinary with my system, I would like to get more opinions on the matter. Would there be any conceivable way that this was an automatic system routine, a clean up action of something? Additionally, if I was indeed the victim of a hack, what can I do to further protect my system (keeping in mind that I do want to access my system via ssh from time to time)?

View 4 Replies View Related







Copyrights 2005-15 www.BigResource.com, All rights reserved