Security :: How To Monitor Ssh Connection
Apr 28, 2010
I will be hiring Linux freelancers very soon to do some work on my Linux Centos 5 machine. And I need a way to see what he's doing on my computer over ssh, now I don't mean me reading the logs, I meaning seeing what he's doing in realtime (kind of like vnc, but except the freelancer will only use ssh to do his work and not on the desktop environment.)
View 10 Replies
ADVERTISEMENT
Mar 9, 2011
is there a way to monitor use of rm, cp and mv commands? (other than in history)... i would prefer if it were logged in /var/log directory with time and command (with its arguments).
View 5 Replies
View Related
Jan 21, 2011
My promlem is that i wrote a few simple script to monitor the network connection as follows:
script 1 "netmonitor.sh"
Quote:
#!/bin/bash
# /usr/local/bin/netmonitor.sh
ping -c 1 "$HOST" > /dev/null 2>&1
if [ $? = 0 ]; then
echo "`date` Network is ready!" |
[Code]...
Is it possible, that if system don't use the connection after getting the DHCP lease, it close the connection automaticly? Anyway it works ok, but i don't want to owerwrite my router's flash in every 5 seconds with te new lease, my script probably defeat it soon if i don't do anything
View 5 Replies
View Related
Jan 14, 2010
i start fwbuilder with debug option: # ssh root@localhost sudo -S /etc/fw/firewall.fw and iptables rules are setup without any errors.
What exactly is the fwbuilder firewall? Simply this iptables set of rules? Or the running fwbuilder script (firewall.fw)? Both?
What now? How do I see what's going on?
When i scan with nmap, it doesn't seem to matter if i have a firewall running or not. I have used firestarter till now.
View 4 Replies
View Related
Jan 22, 2011
My promlem is that I wrote a few simple script to monitor the network connection as follows:
script 1 "netmonitor.sh"
#!/bin/bash
# /usr/local/bin/netmonitor.sh
HOST=www.google.hu
ping -c 1 "$HOST" > /dev/null 2>&1 .....
So it's run every 5 minutes, and it works well, when it sees host is down, it restart the connection, BUT as the log shows below, about a half an hour after using the connection (for example the ssh through the internet or the vpn clients disconnected) , br0 (probably) goes down or something and the script needs always restarting the connection...
The log:
Fri Jan 21 14:45:01 CET 2011 Network is ready! .....
Fri Jan 21 15:55:41 CET 2011 Network seems down, rechecking...
Fri Jan 21 15:56:21 CET 2011 Network is down, restarting interface br0!
Fri Jan 21 15:56:48 CET 2011 Network is ready after interface br0 restart! .....
Then if I use again, its ready... Is it possible, that if system don't use the connection after getting the DHCP lease, it close the connection automaticly? Anyway it works ok, but I don't want to owerwrite my router's flash in every 5 seconds with te new lease, my script probably defeat it soon if I don't do anything.
View 3 Replies
View Related
Apr 14, 2011
I posted this in the Networking section, but should probably be over here. Couldn't move it. I have a transparent proxy in place. I have Webmin installed on the server. Is there an app that can monitor bandwidth in real time? Also run reports? I have SARG installed, but seems to only monitor HTTP traffic, I need to monitor all traffic. I have a bridged connection, but monitoring the outside interface is fine too.
View 5 Replies
View Related
Apr 22, 2010
i need a way to monitor a certain partition / folder to see if any changes has made is there anyway of doing that ?
View 4 Replies
View Related
Jul 14, 2011
i done desktop config in ubuntu server 11.04 and connected via tightvnc,uvnc and in remote desktop viewer from another ubuntu machine also. I am not able to access(connect) the server in GUI mode(when monitor is removed) but i putty is working fine in cmd line.
View 1 Replies
View Related
Feb 14, 2010
My wife was using cryptkeeper fine, then she right-clicked the keys on the panel and did something, I'm not sure what. Anyway, the keys you click on to open the encrypted folder are gone and I can't figure out how to get them back. System monitor shows cryptkeeper running. I can kill it and re-start it, but the keys don't show on the panel. I'm running ubuntu 9.10.
View 1 Replies
View Related
Mar 2, 2011
I want to do some pen-testing using aircrack-ng on my local network and currently the only wireless adapter I have is the WNA 1100 netgear adapter. I am using the ath9k_htc driver.
View 7 Replies
View Related
Mar 28, 2011
I am looking for a utility that would do the following:1. Be run manually on a list of files whose sizes should not change, to get a control file containing the sizes of each file.2. Subsequent manual runs would report any changes in size of any of the files in the list, and allow option to accept the new sizes.3. Be run as a cron job to check for changes in the file sizes and send an email alert if a change has occurred since the last time it was run.The purpose is to detect possible hacks of key files on a website. It would not include files expected to change, but just those that should not change. It would be run manually a few times to get the control list one wants to monitor.
View 3 Replies
View Related
Feb 10, 2011
Recommend open source tools that can help in figuring out if we are experiencing a network latency due to the newly installed firewall on our server.
View 1 Replies
View Related
Nov 1, 2010
on my linux server i have many websites, before i use this command
netstat -anpl|grep :80|awk {'print $5'}|cut -d":" -f1|sort|uniq -c|sort -n
to see all the ips with many connection but the problem is is show me all the ips from all the websites from the server, can be another way to show me all the ips just from my website ?
View 1 Replies
View Related
Nov 3, 2010
My host is ubuntu 9.04 and the guest is winxp sp3. I need to use QEMU to monitor the network communication for security researches. But I failed to establish the connection between the host and the guest.
To build a TAP connection, I input commands as the following t.
How should I establish the TAP and Bridge connection in the QEMU?
View 1 Replies
View Related
Sep 29, 2009
if u use vnc real and u share the vnc to a guest and u give him the password, and after he ends the look, u want to kill him how can u do that on the xterm i know that vncconfig can do it, but i want to know if there is a way to do it by your self, killing the ip or something.
View 1 Replies
View Related
Jun 14, 2010
I have changed my sshd banner in /etc/motd code...
However, I would also like to change the banner that someone sees if they attempt to use another method of connecting to my ssh server (telnet, for example). Currently, this is what happens code...
Where do I edit the telnet/ssh banner, so it isn't so easy to fingerprint my os/ssh version simply by using something such as telnet?
View 2 Replies
View Related
Aug 20, 2010
Is there a way to use the firewall to essentially lock certain programs like firefox and transmission to my vpn connection-so that in the event that my vpn connection goes down these programs do not use my default ISP Internet connection.
View 1 Replies
View Related
Oct 26, 2010
I was hoping to set up a Kubuntu 10.04 Chroot on a PC with no internet access (I only have dialup anyway, not Broadband). All the information I have been able to find refers to downloading debootstrap in order to do this.I purchased a set of DVDs with all of the Ubuntu packages on them and created a single repository of them on my harddrive.Is there some way that I can create the Chroot using the packages on my hard drive without having to access the internet to download stuff as I do it?
View 6 Replies
View Related
Dec 3, 2010
I'd like to buy some stuff from the Software Center but I don't see how to confirm a valid certificate or see any indication of a secure connection on the screen where I enter my credit card info. Of course, I'm sure the page IS secure because who would design it otherwise (especially considering how our patron made his first fortune), and I could sniff out the network connection, but I don't see any information provided to the end user.
It seems like it could open up Canonical to all sorts of legal issues to not have security info and a privacy policy easily available in the payment section of the USC. Maybe it's there and I've missed it somehow. maybe it is on the next page, but I didn't press the "submit" button.
View 4 Replies
View Related
Jan 6, 2011
Thought about posting in the Networking board, but I believe this is a much more security-oriented thread. So let's say I bring my computer to a public place, say a library with one open, public, shared wireless network. I connect to that network. Let's assume that everyone else who's connected is using Windows. Can they see my computer (through Network Manager or other software) and attack it (SYN flood or something)? Or does it depend on the network settings?
View 9 Replies
View Related
Jul 6, 2011
Is my ssl connection secure if I'm going through a proxy. Is it possible to craft a malicious proxy to steal/crack authentication?
View 2 Replies
View Related
Aug 29, 2010
Basically, this is not the first time it happened, but the third I would say. My trouble and concern is with this massive downloading targeting a test file of mine/client file of mine. Since my server couldn't support that many connections child process spawns, my apache server crashed.
I managed to solve it by closing the client's account, preventing the attack from continuous download. Another way I could solve it was by replacing the file they attempted to attack with 0 byte file.
I'm wondering if there is a possible solution to prevent such issue in future. I'm also not very sure what kind of attack this is. Could it be DDOS? But from what I've asked, some said it wasn't DDOSed, if it was, my whole server would go down, not only apache.
What I was curious was how these attacker found out the files that were stored on the server. These files were not leaked outside, nor there could be a possibility to access that folder because it was protected by .htaccess which deny everyone.
View 4 Replies
View Related
Jun 14, 2010
Is there any setting to connect ssh server using default profile.
for example if I run
ssh user@ssh_server_ip '/bin/bash --norc --noprofile'
it will skip user's login profile(/etc/profile,/etc/bashrc,~/.bashrc,~/.bash_profile)
Can i do some settings in ssh server that deny profile skipping by client.
View 1 Replies
View Related
Jan 24, 2010
i need to do a statefull firewall actually i try the ESTABLISHED state but as we know that some people can play with the TCP header so i want to do a "connection track" state, they told me in mangle but i didn't find can someone paste for me a link about "connection track" or write for me rule for ex: to make connection track for port 80!
View 4 Replies
View Related
Mar 28, 2011
I am wondering if it's possible to log the number of bytes a connection transfered when the connection is complete with iptables. I know I've seen this sort of information in Cisco FWSM logs, where the "Teardown" entry of the logs has the bytes transferred for that connection. Is it possible to have something similar to that with iptables? Where the initial connection attempt is logged (i.e. NEW, which I have logging fine) AND an entry for that connection that includes the bytes transferred?
View 6 Replies
View Related
Mar 15, 2009
SElinux is blocking my internet connection and every time when I connect t the internet (pppoe connection) I ge message.
View 2 Replies
View Related
Aug 6, 2009
well after spending most of the morning getting help with my internet connection hanging when I dial up we discover that SELinux is causing it so when I set it to passive I can connect so how can I get it to allow me to connect while being set to enforcing?
View 5 Replies
View Related
Aug 19, 2009
while tampering with the settings for my wireless connection by right-clicking on the icon on the top menu i was originally asked for my password for authentication. i selected the option to remember the password for future sessions unintentionally.
how do i get it back to the original setting so that it asks for a password before allowing me into the editing screen? i tried preferences > system > authorisations > network-manager-settings, but it didnt work.
View 2 Replies
View Related
Feb 2, 2010
I have several Proxy severs set up at our business. I always do the same basic config, except for my version of Fedora (I always grab the newest).
I put 2 nics in a machine Load Squid, Dansguardian and Firestarter. I use Firestarter to direct the surfing traffic from my LAN out a cable modem that I have for each store. This lessons the bandwidth on the T1.
Easy enough. My problem is Firestarter has always been a little flaky. But as of F11 the gui wont stay up for more than a few minutes at a time. It still functions, but you have to be quick if your going to use it because it will inevitable crash.
So I suppose it's time to start doing this the correct way and using IP Tables. Does anybody have a resource they can point me to that will help me understand how to do this? It looks like this might be as simple as setting it up with the GUI Firewall tool that comes with F12 but I'm still not exactly sure how.
View 6 Replies
View Related
May 6, 2010
Since important information like pass-phrases is sent via a Bluetooth link, I wonder how secure this is. I think it must be quite a weak point.
View 3 Replies
View Related