Ubuntu Security :: Brute Force Program With Gui?

Nov 8, 2010

im looking for a good brute force program that has i gui. i used to use brutus on windows but now im only running ubuntu so i need to find one.

View 3 Replies


ADVERTISEMENT

Security :: THC Hydra And HTTP Brute-force Cracking?

Mar 29, 2011

I set up an ASUS WL-500gP with original ASUS firmware to my LAN with IP address 192.168.1.1. If I navigate to address [URL] in my Firefox address bar, an Authentication required window opens up asking for "User name: " and "Password: ". Correct "User name: " is "admin" and correct "Password: " is "pA55w0Rd". They work fine if I type them in manually to the Authentication required window, but for some reason I can't get in using the hydra with words.txt password file, which contains "pA55w0Rd":

Code:

[root@ ~]# cat words.txt
password
user
pA55w0Rd

[code]....

View 2 Replies View Related

Security :: John The Ripper Brute-force Attack And Multi-core Processors?

Feb 19, 2010

In my Open-Suse server I have a script, where makepasswd output(by default it generates similar passwords: cGyTbqpr, tpJ1LA, 33EXdo) is redirected to mkpasswd(which uses DES by default) in order to generate salted hash of this previously generated password. I would like to test the strength of this system. I have a quad core CPU, and if I start John The Ripper like this(I want to use -incremental:all flag):

john -incremental:all passwd

..only one core is utilized at 100%. Is there a possibility to make all four cores to crack this password? Or is this possible only after reprogramming John The Ripper? Or what is the algorithm for generating passwords with with -incremental:all flag? I mean if John generates passwords randomly in brute-force mode, then it's smart to start four different John processes simultaneously because then one of those four will find the password firs

View 2 Replies View Related

Security :: My Server - Deb5 And Plesk10 - Is Involved - Causing - In Brute Force Attacks

May 6, 2011

I am ashamed that I am causing other people troubles, but apparantly my server is involved in attacking the servers of other people.

I have to admit that I am not too familiar with using a CLI, or Linux for that matter, but I have a Debian server running under Plesk 10, which is colocated.

Now I have received messages from the datacenterm which state that my server is involved in brute force attacks.

The messages show a lot of lines like this:

Code:

The only I get from my hoster is to back up all domains and re-install the machine.

I want to resolve this asap, but do not agree with that action for two reasons: the machine just had a fresh re-install 2 months ago, so if it is a flaw in the OS, I will get the same flaw back, and if it is not OS related but due to a domain, I will get the problem back by putting back the backed-up domains.

But now I'm stuck: what steps should I follow to try and find the cause of this evil and make sure that my machine will not bother other machines anymore?

I realize that this probably will be a steep learning-curve, but please bare with me and help me to resolve this.

What have I done so far?

1) There are a number of live sites on this server, either running WordPress or Joomla, I have made sure they are all updated to the latest release.

2) I have manually looked at the source code of the index-files of those sites, haven't seen anything strange, like redirects.

3) I have used online scanners to check all sites for malware, all have been reported back to be clean.

4) I have run the Plesk-version of RKhunter, and that gives me certain warnings which I cannot (or do not) understand:

Code:

Code:

Code:

I received the first report of these attempts about a week ago and immediately changed the Plesk/SSH password to a 200bit password generated with KeePass, hoping that would keep out any evildoers.

View 14 Replies View Related

General :: How To Stop Pop3 Brute Force Attacks

Mar 31, 2011

I have a mail server running RHEL, with postfix, dovecot, etc. I installed Fail2ban and this works wonders against SSH brute force attacks. It'll ban an IP address for a period of time if it unsuccessfully attempts to log on 3 times within, say a minute. I was wondering if it can be as effective with pop3 attacks. If it is, how can I get it done?

View 1 Replies View Related

Ubuntu Servers :: Iptables To Rate-limit Brute Force Attacks On SSH Server?

Sep 30, 2010

I have a SSH server set up at home listening on port 22. I have hardened the server so it is pretty secure but I want to make it even safer by editing my iptables to rate-limit incoming connections and DROP false login attempts. I have tried these tutorials but I just cant get it to work:[URL]I want the debian-administration.org tutorial to work but when I try to add the first rule in terminal:sudo iptables -I INPUT -p tcp --dport 22 -i eth0 -m state --state NEW -m recent --setI get the following:Bad argument --set'I am new to iptables and I'm not sure if I'm doing something wrong when I try to set it up. I'm using Ubuntu 10.04.1 LTS with iptables v1.4.4.

View 6 Replies View Related

Ubuntu Servers :: Force Java Program To Use More CPU

Mar 23, 2011

I have ubunto 10_4 X86-64 (I use putty to connect)
installed apps
screen
mysql server-client
my java program
open jdk* 64bit
apanche2 (the web server stuff)
and its aVPS machine
Xeon 2.0 64bit 4 GB ram

How can I make (or force) my java program to use more then 1 core? I would like it to be using just 5 of the 6 that I have. I use a .sh to run it this is the code for it.
Code:
#!/bin/bash
cd "${0%/*}"; java -Xshare:auto -Xmx2662M -jar craft.jar

View 5 Replies View Related

Ubuntu :: What The Shortcut Keys Are To Force Quit A Program

May 15, 2010

what the shortcut keys are to force quit a program that has frozen up in Ubuntu 10.04? I use to know it, but can't remember

View 4 Replies View Related

General :: Can't Force Reboot From Program?

Jul 7, 2011

running Linux release 2.4.19-uc0, build #511 embedded on a device. It is stripped down to a very minimal configuration and so many of the normal commands are not present.I'm trying to force a reboot from an application I've got running. I've tried the following:

system("shutdown -r");
or
sync();

[code]....

View 4 Replies View Related

Software :: How To Force Program To Uninstall

Mar 9, 2010

Code:
johnh@tux:~$ sudo -i
root@tux:~# apt-get purge webmin-bind
Reading package lists... Done
Building dependency tree
Reading state information... Done

The following packages were automatically installed and are no longer required:
linux-headers-2.6.31-14 linux-headers-2.6.31-14-generic
Use 'apt-get autoremove' to remove them.

The following packages will be removed:
webmin-bind*
0 upgraded, 0 newly installed, 1 to remove and 0 not upgraded.
3 not fully installed or removed.
After this operation, 1,339kB disk space will be freed.
Do you want to continue [Y/n]? y
(Reading database ... 180904 files and directories currently installed.)
Removing webmin-bind ...
/var/lib/dpkg/info/webmin-bind.prerm: 6: /usr/sbin/update-webmin: not found
dpkg: error processing webmin-bind (--purge):
subprocess installed pre-removal script returned error exit status 127

Errors were encountered while processing:
webmin-bind
E: Sub-process /usr/bin/dpkg returned an error code (1)
root@tux:~#

View 3 Replies View Related

Software :: Force Program To Run Totally From RAM/swap

Feb 4, 2011

At the moment im using a live linux distribution and running a program to test the security of my website. Unfortunatly this program is running from, and seems to fill up rootfs, at which point the program crashes and dissapears.

Is there any way to force a program to run totally from RAM, which i would presume would automatically use a swap file because of the in built memory management in linux, of which is a 30GB partiton.

I know i could just install the distribution to the partition instead, however it has peaqued my interest in just how much control linux has over the programs running on it.

So the question is - Is it possible to run a program totally from RAM, forcing all inputs/outputs to be re-directed to/from RAM to keep the rootfs clear whilst the application does what it needs to?

View 9 Replies View Related

Debian :: Force A Program To Use A Specific Version Of GTK When Compiling

Jul 15, 2010

I decided I was going to compile XChat from source today for "fun." What I ended up doing was spending a few hours getting it to compile, then find out everything didn't work the way I thought it did. I was under the impression that after I ran "sudo make install" I was "upgrading", when in reality I'm just installing a seperate version alongside the old one. Apparently I have to keep the old version so every program that was compiled with it will continue to work, so how do I:

1) Force a program to use a specific version of GTK when compiling.
2) Find where my version of GTK installed to.

I've asked some people and I've just been told to "learn LD_PRELOAD". I've googled and can't figure how I could even apply that to my current problem

View 3 Replies View Related

Security :: Way To Force The DNS Settings

Oct 18, 2009

I am using openDNS on my current Linux box and I was wondering if their is a way to force the DNS settings to stay the same even if ROOT tries to change it (since my dad wants content filtering password protected and I still want my computers root access...)

View 2 Replies View Related

Security :: Force To Use Default Profile Into Ssh Connection?

Jun 14, 2010

Is there any setting to connect ssh server using default profile.

for example if I run

ssh user@ssh_server_ip '/bin/bash --norc --noprofile'
it will skip user's login profile(/etc/profile,/etc/bashrc,~/.bashrc,~/.bash_profile)

Can i do some settings in ssh server that deny profile skipping by client.

View 1 Replies View Related

Security :: Force Squid To Log Urls Allowed As An Exception?

Aug 10, 2010

Squid acl rules can be configured to allow specific ip's to get full access, or rather skips the blocked site list.

acl <tag> src x.x.x.x
http_access allow <tag>
http_access deny blocksites

From all the ways i tried, squid does not log these urls. Is there a way to have squid log the urls requested from allowed ip's?

Specs:
squid ver : (squid/2.6.STABLE21)
OS : CentOS 5.5

View 1 Replies View Related

Security :: Force Password To 15 Characters On A Selected Accounts?

Apr 5, 2010

I would like to restrict a few selected accounts to minimum of 15 characters passwords. Other accounts,however, should still be able to login with 8 character passwords. This is in RHEL 5. Does anyone know how to go about it? I have checked PAM documentation and pam_cracklib.so has an option minlen. As per its documentation, minlen can force users to use 15 characters, but it forces every account on the system. I might be wrong too.

View 5 Replies View Related

Security :: REDHAT Missing Functionality - Force User To Change Password On Login?

Mar 16, 2011

I have now been trying to find an answer for the following for a while and can't seem to get anything.On previous linux distros we had the option available "passwd -e" which allowed us to force the user to change their passwords upon the next login.s functionality however seems to be excluded from latest linux distros (currently using RHEL 5.4)...Does anybody know how the same effect can be achieved and perhaps any idea on why this option was removed as it was great for securing passwords

View 5 Replies View Related

Ubuntu :: The Program "Force Quit" Is Frozen

Mar 11, 2011

I have added to my Panel the "Force Quit" program to click and use so I don't have to type it in on the rare occasions that I need it. I accidentally clicked it today not needing it. Not knowing this would be an issue, I clicked on it thinking it would force itself to quit and just close itself. I know I should have just hit esc to close it.

The problem I have now is that it is now frozen on my screen and for the life of me I cant figure out how to get rid of it. Yes I tried esc. I tried opening System Monitor and looking for it to end the prog and couldn't find it. I know I could fix this by just restarting the x server, but at the moment I happen to have several things open that I either cannot save right now or are actively running.

View 7 Replies View Related

Ubuntu Security :: Allow Program To Be Run As Administrator Without Sudo?

Jun 7, 2010

Certain commands like:
fdisk -l
nmap -sT 192.168.0.1/24
iftop

require administrator privileges to run. A while ago i read a post(forgot where i read it) about being able to let a user run these commands in a script (that contains the desired command) created by the administrator/root without the user having to do a sudo and entering a password. Does anyone know how i can go about doing this?

View 3 Replies View Related

Ubuntu Security :: Program Is Not Responding When Shut Down?

Jul 3, 2010

last night when i turned off my comp there was this box saying that "Unknown" program is not responding.i included a screenshot. just wondering if i should be suspicious.

View 2 Replies View Related

Ubuntu Security :: Program - Network Traffic Monitoring

Jan 31, 2010

Is there a program that monitors and displays 'who' is on your wireless Internet signal that one may not be aware of? Like, the ability to see when someone that you don't know is accessing your locked wireless?

View 9 Replies View Related

Ubuntu Security :: Downloaded With A Terminal The Program ClamAV?

Feb 14, 2010

I just downloaded with a terminal the program ClamAV. But where it is located? I don't see it in Application - accessories -etc ? neither in "Places", etc where it is? ps: the place where I found about this was here:[URL]...

View 4 Replies View Related

Ubuntu Security :: Easiest Program To Use For Encrypting External HD

Mar 6, 2010

I currently have my home folder encrypted with 128 bit encfs but i have the back up of that 'in the clear' on my back up hard drive. I am not that great with complicated instructions and especially the terminal so what if any is the easiest program to encrypt with?

View 9 Replies View Related

Ubuntu Security :: What Is Good IP Filter / Firewall Program?

Jun 10, 2010

What is a good IP filter/firewall program? Seeing as how I like free softwares, I download a lot of torrents. When I was using Windows, I used PeerBlock (the newer fork of PeerGuardian), however, it's not available for Linux. What would be a good alternative for this in Linux? I tried iplist as it has a GUI, and it was extremely buggy and blocked random web pages even after I put them on the exceptions list. And MoBlock has no GUI from I understand, nor has it been updated in years.

View 9 Replies View Related

Ubuntu Security :: AppArmor Enforce Program Without Logging?

Apr 19, 2011

I have a program that generates large amounts of apparmor log messages. I'm happy to enforce restrictions on the program but I really don't want it to fill my log with messages every time it attempts to read a file.

Is there a way to let it enforce restrictions but not log denials?

View 9 Replies View Related

Ubuntu Security :: Block Outgoing Connection From A Program?

Jun 3, 2011

I open this thread after an unsuccessful long search over the Web. Essentially what I want is to block the outgoing connection of a program. All I know about this program is its name and so I don't have any information regarding the ports it utilizes or the address it may contact.

View 9 Replies View Related

Ubuntu Security :: Decide If A New Program Have Installed Is Malware Or Not?

Aug 5, 2011

In Ubuntu 10.04 LTS, I have downloaded and installed texlive (2011). They have issued the following warnings:

1. "To the best of our knowledge, the core TEX programs themselves are (and always have been) extremely robust. However, the contributed programs in TEX Live may not reach the same level, despite everyone�s best efforts. As always, you should be careful when running programs on untrusted input; for maximum safety, use a new subdirectory."

What does this exactly mean? The installed program has already created own directories and subdirectories (e.g. /usr/local/texlive/2011/bin/i386-linux). Am I supposed to create a new subdirectory in home to write files and run latex program? Exactly how do I know that the downloaded and installed program is not malicious?

2. "Finally, TEX (and its companion programs) are able to write files when processing documents, a feature that can also be abused in a wide variety of ways. Again, processing unknown documents in a new subdirectory is the safest bet."

what is implied by "a feature that can also be abused in a wide variety of ways".

View 6 Replies View Related

Security :: Log Files For A Program Did Not Install?

Jan 25, 2011

If this is not the correct place for this question, let me know Basically, I looked on my system and found 2 log files :

hs_err_pid29717.log
hs_err_pid29774.log

I found that they belong to "HotSpot"? But, I never downloaded/installed HotSpot.I did a "last" and saw that only local machines have logged into the one with logs:IP addrsses of 192.168.1.xxx

View 2 Replies View Related

Ubuntu Security :: A Firewall That Enables Internet Access Only When A Program Is Run?

Jul 25, 2010

I wanted to know if there was a firewall program out there that can open specific ports when a program/process is run and disable the ports again when the program is closed.

View 2 Replies View Related

Ubuntu Security :: Active Connection / Program Access To Internet

Jan 18, 2011

There is this active connection in firestarter: ec2-174-129-193-12.compute-1.amazonaws.com (Port 443 - Service HTTPS - program python)After doing ps aux | grep PID it shows: /usr/bin/python /usr/lib/ubuntuone-client/ubuntuone-syncdaemon...This comes up in the firewall in each login, how do I get rid of it and how did it get there in the first place? Another question is if there is a way to limit a program's access to the internet. For example KCalender.. The things I type up in there may be stored somewhere. How can I disable complete access to the internet for that program and any other program so they can't backup, share, check etc. ?

View 3 Replies View Related







Copyrights 2005-15 www.BigResource.com, All rights reserved