Ubuntu Security :: Brute Force Program With Gui?
Nov 8, 2010im looking for a good brute force program that has i gui. i used to use brutus on windows but now im only running ubuntu so i need to find one.
View 3 Repliesim looking for a good brute force program that has i gui. i used to use brutus on windows but now im only running ubuntu so i need to find one.
View 3 RepliesI set up an ASUS WL-500gP with original ASUS firmware to my LAN with IP address 192.168.1.1. If I navigate to address [URL] in my Firefox address bar, an Authentication required window opens up asking for "User name: " and "Password: ". Correct "User name: " is "admin" and correct "Password: " is "pA55w0Rd". They work fine if I type them in manually to the Authentication required window, but for some reason I can't get in using the hydra with words.txt password file, which contains "pA55w0Rd":
Code:
[root@ ~]# cat words.txt
password
user
pA55w0Rd
[code]....
In my Open-Suse server I have a script, where makepasswd output(by default it generates similar passwords: cGyTbqpr, tpJ1LA, 33EXdo) is redirected to mkpasswd(which uses DES by default) in order to generate salted hash of this previously generated password. I would like to test the strength of this system. I have a quad core CPU, and if I start John The Ripper like this(I want to use -incremental:all flag):
john -incremental:all passwd
..only one core is utilized at 100%. Is there a possibility to make all four cores to crack this password? Or is this possible only after reprogramming John The Ripper? Or what is the algorithm for generating passwords with with -incremental:all flag? I mean if John generates passwords randomly in brute-force mode, then it's smart to start four different John processes simultaneously because then one of those four will find the password firs
I am ashamed that I am causing other people troubles, but apparantly my server is involved in attacking the servers of other people.
I have to admit that I am not too familiar with using a CLI, or Linux for that matter, but I have a Debian server running under Plesk 10, which is colocated.
Now I have received messages from the datacenterm which state that my server is involved in brute force attacks.
The messages show a lot of lines like this:
Code:
The only I get from my hoster is to back up all domains and re-install the machine.
I want to resolve this asap, but do not agree with that action for two reasons: the machine just had a fresh re-install 2 months ago, so if it is a flaw in the OS, I will get the same flaw back, and if it is not OS related but due to a domain, I will get the problem back by putting back the backed-up domains.
But now I'm stuck: what steps should I follow to try and find the cause of this evil and make sure that my machine will not bother other machines anymore?
I realize that this probably will be a steep learning-curve, but please bare with me and help me to resolve this.
What have I done so far?
1) There are a number of live sites on this server, either running WordPress or Joomla, I have made sure they are all updated to the latest release.
2) I have manually looked at the source code of the index-files of those sites, haven't seen anything strange, like redirects.
3) I have used online scanners to check all sites for malware, all have been reported back to be clean.
4) I have run the Plesk-version of RKhunter, and that gives me certain warnings which I cannot (or do not) understand:
Code:
Code:
Code:
I received the first report of these attempts about a week ago and immediately changed the Plesk/SSH password to a 200bit password generated with KeePass, hoping that would keep out any evildoers.
I have a mail server running RHEL, with postfix, dovecot, etc. I installed Fail2ban and this works wonders against SSH brute force attacks. It'll ban an IP address for a period of time if it unsuccessfully attempts to log on 3 times within, say a minute. I was wondering if it can be as effective with pop3 attacks. If it is, how can I get it done?
View 1 Replies View RelatedI have a SSH server set up at home listening on port 22. I have hardened the server so it is pretty secure but I want to make it even safer by editing my iptables to rate-limit incoming connections and DROP false login attempts. I have tried these tutorials but I just cant get it to work:[URL]I want the debian-administration.org tutorial to work but when I try to add the first rule in terminal:sudo iptables -I INPUT -p tcp --dport 22 -i eth0 -m state --state NEW -m recent --setI get the following:Bad argument --set'I am new to iptables and I'm not sure if I'm doing something wrong when I try to set it up. I'm using Ubuntu 10.04.1 LTS with iptables v1.4.4.
View 6 Replies View RelatedI have ubunto 10_4 X86-64 (I use putty to connect)
installed apps
screen
mysql server-client
my java program
open jdk* 64bit
apanche2 (the web server stuff)
and its aVPS machine
Xeon 2.0 64bit 4 GB ram
How can I make (or force) my java program to use more then 1 core? I would like it to be using just 5 of the 6 that I have. I use a .sh to run it this is the code for it.
Code:
#!/bin/bash
cd "${0%/*}"; java -Xshare:auto -Xmx2662M -jar craft.jar
what the shortcut keys are to force quit a program that has frozen up in Ubuntu 10.04? I use to know it, but can't remember
View 4 Replies View Relatedrunning Linux release 2.4.19-uc0, build #511 embedded on a device. It is stripped down to a very minimal configuration and so many of the normal commands are not present.I'm trying to force a reboot from an application I've got running. I've tried the following:
system("shutdown -r");
or
sync();
[code]....
Code:
johnh@tux:~$ sudo -i
root@tux:~# apt-get purge webmin-bind
Reading package lists... Done
Building dependency tree
Reading state information... Done
The following packages were automatically installed and are no longer required:
linux-headers-2.6.31-14 linux-headers-2.6.31-14-generic
Use 'apt-get autoremove' to remove them.
The following packages will be removed:
webmin-bind*
0 upgraded, 0 newly installed, 1 to remove and 0 not upgraded.
3 not fully installed or removed.
After this operation, 1,339kB disk space will be freed.
Do you want to continue [Y/n]? y
(Reading database ... 180904 files and directories currently installed.)
Removing webmin-bind ...
/var/lib/dpkg/info/webmin-bind.prerm: 6: /usr/sbin/update-webmin: not found
dpkg: error processing webmin-bind (--purge):
subprocess installed pre-removal script returned error exit status 127
Errors were encountered while processing:
webmin-bind
E: Sub-process /usr/bin/dpkg returned an error code (1)
root@tux:~#
At the moment im using a live linux distribution and running a program to test the security of my website. Unfortunatly this program is running from, and seems to fill up rootfs, at which point the program crashes and dissapears.
Is there any way to force a program to run totally from RAM, which i would presume would automatically use a swap file because of the in built memory management in linux, of which is a 30GB partiton.
I know i could just install the distribution to the partition instead, however it has peaqued my interest in just how much control linux has over the programs running on it.
So the question is - Is it possible to run a program totally from RAM, forcing all inputs/outputs to be re-directed to/from RAM to keep the rootfs clear whilst the application does what it needs to?
I decided I was going to compile XChat from source today for "fun." What I ended up doing was spending a few hours getting it to compile, then find out everything didn't work the way I thought it did. I was under the impression that after I ran "sudo make install" I was "upgrading", when in reality I'm just installing a seperate version alongside the old one. Apparently I have to keep the old version so every program that was compiled with it will continue to work, so how do I:
1) Force a program to use a specific version of GTK when compiling.
2) Find where my version of GTK installed to.
I've asked some people and I've just been told to "learn LD_PRELOAD". I've googled and can't figure how I could even apply that to my current problem
I am using openDNS on my current Linux box and I was wondering if their is a way to force the DNS settings to stay the same even if ROOT tries to change it (since my dad wants content filtering password protected and I still want my computers root access...)
View 2 Replies View RelatedIs there any setting to connect ssh server using default profile.
for example if I run
ssh user@ssh_server_ip '/bin/bash --norc --noprofile'
it will skip user's login profile(/etc/profile,/etc/bashrc,~/.bashrc,~/.bash_profile)
Can i do some settings in ssh server that deny profile skipping by client.
Squid acl rules can be configured to allow specific ip's to get full access, or rather skips the blocked site list.
acl <tag> src x.x.x.x
http_access allow <tag>
http_access deny blocksites
From all the ways i tried, squid does not log these urls. Is there a way to have squid log the urls requested from allowed ip's?
Specs:
squid ver : (squid/2.6.STABLE21)
OS : CentOS 5.5
I would like to restrict a few selected accounts to minimum of 15 characters passwords. Other accounts,however, should still be able to login with 8 character passwords. This is in RHEL 5. Does anyone know how to go about it? I have checked PAM documentation and pam_cracklib.so has an option minlen. As per its documentation, minlen can force users to use 15 characters, but it forces every account on the system. I might be wrong too.
View 5 Replies View RelatedI have now been trying to find an answer for the following for a while and can't seem to get anything.On previous linux distros we had the option available "passwd -e" which allowed us to force the user to change their passwords upon the next login.s functionality however seems to be excluded from latest linux distros (currently using RHEL 5.4)...Does anybody know how the same effect can be achieved and perhaps any idea on why this option was removed as it was great for securing passwords
View 5 Replies View RelatedI have added to my Panel the "Force Quit" program to click and use so I don't have to type it in on the rare occasions that I need it. I accidentally clicked it today not needing it. Not knowing this would be an issue, I clicked on it thinking it would force itself to quit and just close itself. I know I should have just hit esc to close it.
The problem I have now is that it is now frozen on my screen and for the life of me I cant figure out how to get rid of it. Yes I tried esc. I tried opening System Monitor and looking for it to end the prog and couldn't find it. I know I could fix this by just restarting the x server, but at the moment I happen to have several things open that I either cannot save right now or are actively running.
Certain commands like:
fdisk -l
nmap -sT 192.168.0.1/24
iftop
require administrator privileges to run. A while ago i read a post(forgot where i read it) about being able to let a user run these commands in a script (that contains the desired command) created by the administrator/root without the user having to do a sudo and entering a password. Does anyone know how i can go about doing this?
last night when i turned off my comp there was this box saying that "Unknown" program is not responding.i included a screenshot. just wondering if i should be suspicious.
View 2 Replies View RelatedIs there a program that monitors and displays 'who' is on your wireless Internet signal that one may not be aware of? Like, the ability to see when someone that you don't know is accessing your locked wireless?
View 9 Replies View RelatedI just downloaded with a terminal the program ClamAV. But where it is located? I don't see it in Application - accessories -etc ? neither in "Places", etc where it is? ps: the place where I found about this was here:[URL]...
View 4 Replies View RelatedI currently have my home folder encrypted with 128 bit encfs but i have the back up of that 'in the clear' on my back up hard drive. I am not that great with complicated instructions and especially the terminal so what if any is the easiest program to encrypt with?
View 9 Replies View RelatedWhat is a good IP filter/firewall program? Seeing as how I like free softwares, I download a lot of torrents. When I was using Windows, I used PeerBlock (the newer fork of PeerGuardian), however, it's not available for Linux. What would be a good alternative for this in Linux? I tried iplist as it has a GUI, and it was extremely buggy and blocked random web pages even after I put them on the exceptions list. And MoBlock has no GUI from I understand, nor has it been updated in years.
View 9 Replies View RelatedI have a program that generates large amounts of apparmor log messages. I'm happy to enforce restrictions on the program but I really don't want it to fill my log with messages every time it attempts to read a file.
Is there a way to let it enforce restrictions but not log denials?
I open this thread after an unsuccessful long search over the Web. Essentially what I want is to block the outgoing connection of a program. All I know about this program is its name and so I don't have any information regarding the ports it utilizes or the address it may contact.
View 9 Replies View RelatedIn Ubuntu 10.04 LTS, I have downloaded and installed texlive (2011). They have issued the following warnings:
1. "To the best of our knowledge, the core TEX programs themselves are (and always have been) extremely robust. However, the contributed programs in TEX Live may not reach the same level, despite everyone�s best efforts. As always, you should be careful when running programs on untrusted input; for maximum safety, use a new subdirectory."
What does this exactly mean? The installed program has already created own directories and subdirectories (e.g. /usr/local/texlive/2011/bin/i386-linux). Am I supposed to create a new subdirectory in home to write files and run latex program? Exactly how do I know that the downloaded and installed program is not malicious?
2. "Finally, TEX (and its companion programs) are able to write files when processing documents, a feature that can also be abused in a wide variety of ways. Again, processing unknown documents in a new subdirectory is the safest bet."
what is implied by "a feature that can also be abused in a wide variety of ways".
If this is not the correct place for this question, let me know Basically, I looked on my system and found 2 log files :
hs_err_pid29717.log
hs_err_pid29774.log
I found that they belong to "HotSpot"? But, I never downloaded/installed HotSpot.I did a "last" and saw that only local machines have logged into the one with logs:IP addrsses of 192.168.1.xxx
I wanted to know if there was a firewall program out there that can open specific ports when a program/process is run and disable the ports again when the program is closed.
View 2 Replies View RelatedThere is this active connection in firestarter: ec2-174-129-193-12.compute-1.amazonaws.com (Port 443 - Service HTTPS - program python)After doing ps aux | grep PID it shows: /usr/bin/python /usr/lib/ubuntuone-client/ubuntuone-syncdaemon...This comes up in the firewall in each login, how do I get rid of it and how did it get there in the first place? Another question is if there is a way to limit a program's access to the internet. For example KCalender.. The things I type up in there may be stored somewhere. How can I disable complete access to the internet for that program and any other program so they can't backup, share, check etc. ?
View 3 Replies View Related