TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

SSH scans - I caught one

162 点作者 mcgin超过 14 年前

13 条评论

mrshoe超过 14 年前
I was the victim of an SSH scan once. I set up an old box as a dev server in my apartment for a project course in college. I was in a group of about 12 students. One of them whose username was robert set his password to robert (a brilliant move).<p>We only realized the machine was compromised because the interloper decided to pick two user accounts at random and delete them (another brilliant move).<p>Upon investigation I found that a keylogger had been installed in order to discover the root password. I inspected the output of the keylogger to trace the attacker's steps. Similar to the SSH scan in the article, the attacker had logged into his own FTP server to download various scripts and crackers. Well, the keylogger had logged his FTP password as well (whoops). Naturally I logged in and deleted absolutely everything in sight. :-P
评论 #1921923 未加载
runjake超过 14 年前
Lots of needless clutter in the discussion, so I thought I'd drop a quick comment with clarifications:<p>1. As far as I can tell, this specific attack is meant to target MIPS-based OpenWRT/DD-WRT devices, like the Linksys WRT series.<p>2. lsof and all that crap isn't available by default. So, use 'ps' and 'netstat -a', and 'ls -la /var/tmp' to poke around your router.<p>3. Go into the web admin interface and disable sshd on the WAN interface, if it isn't already (it's off by default). In DD-WRT, go to Administration-&#62;Management-&#62; and ensure "SSH management" is disabled.
WestCoastJustin超过 14 年前
Interesting idea. Reading through the threads it becomes apparent that the attackers are targeting home wired/wifi routers. The attacker sits on your gateway and passively monitors your traffic with you being none the wiser!
评论 #1921874 未加载
_b8r0超过 14 年前
The correct way to address this is not to rely on fail2ban or start moving ports around (although these will remove noise from your logs, they shouldn't be solely relied upon) but to use public key authentication. It's not hard to set up and once you disable password authentication support on OpenSSH then the scans can try all they like, but they're not getting anywhere.<p><a href="http://wiki.centos.org/HowTos/Network/SecuringSSH" rel="nofollow">http://wiki.centos.org/HowTos/Network/SecuringSSH</a>
评论 #1922100 未加载
评论 #1924059 未加载
udp超过 14 年前
A friend had me look at a server that had been compromised by SSH bruteforce a few months ago. The intruder was using it as an IRC bouncer, and he was a romanian named Alexino.<p>I actually found him on the IRC network, and he tried to get me to pay him to tell me how he got in :)
burgerbrain超过 14 年前
This gentleman is illegally hosting my tools, which are copyrighted and not licensed for redistribution. Just because I try to pwn your box doesn't mean you have the right to violate my copyrights. Expect to hear from my lawyers.
评论 #1922070 未加载
_b8r0超过 14 年前
I've seen similar things come up before on HN and on mailing lists I'm on. Rather than keep repeating myself whenever this crops up, I've posted here: <a href="http://www.minklinks.com/weblog/2010/11/19/practical-guide-securing-openssh/" rel="nofollow">http://www.minklinks.com/weblog/2010/11/19/practical-guide-s...</a>
DanielBMarkham超过 14 年前
Looks like it tracks to a server/VPS place in The Netherlands<p>Wonder if he followed-up with the hosting service by reporting the address as being used in an attack. It would be interesting to turn the tables and listen in on some of his traffic going to that address.
评论 #1921985 未加载
rasur超过 14 年前
That's really quite sad - are the script kidiots hoping to take over a bunch of SGI's?<p>edit: I stand corrected..
akkartik超过 14 年前
book recommendation: <a href="http://www.amazon.com/Cuckoos-Egg-Clifford-Stoll/dp/0671726889" rel="nofollow">http://www.amazon.com/Cuckoos-Egg-Clifford-Stoll/dp/06717268...</a>
adam0101超过 14 年前
I blocked all of China and my logs decreased 65%.
hackermom超过 14 年前
There will always be the usual crowd of "conservatives-just-for-the-sake-of-being-conservative" crying out whenever this advice is given, but here goes: if possible in your environment, and for your users, just run your SSHd on a non-standard port, and the problem of automated scans will be a non-problem.
devmonk超过 14 年前
<i>cd /var/tmp;</i><p>When I see things like this it makes me think that if standard paths weren't used, then it would it at least make things a little more interesting for the hacker. (They'd have to find a location first.)
评论 #1922149 未加载
评论 #1922034 未加载
评论 #1922090 未加载
评论 #1922148 未加载