Displaying 20 results from an estimated 4936 matches for "attacker".
2001 Nov 29
4
openssh 2.9p2 release 8.7 security alert!!!
Hi, everyone:
My system was compromised a few days ago.
The cracker attacked the system through openssh 2.9p2 release 8.7.
I attached part of the log file.
Thanks.
Pin Lu (pin at stredo.com)
Nov 25 11:33:05 ns sshd[10627]: Disconnecting: Corrupted check bytes on
input.
Nov 25 11:33:36 ns named[10478]: Lame server on '55.254.58.211.in-addr.arpa'
(in
2002 Nov 08
1
bug on openssh 3.5p1
...at victim's password:
Permission denied, please try again.
root at victim's password:
Permission denied, please try again.
.........
root at victim's password:
Read from remote host 10.12.7.110: Connection reset by peer
Connection to victim closed.
tcpdump session:
12:17:32.650039 attacker.32804 > victim.22: S 1378959426:1378959426(0) win
5840
12:17:32.650538 victim.22 > attacker.32804: S 671772074:671772074(0)
ack 1378959427 win 5792
12:17:32.650627 attacker.32804 > victim.22: . ack 1 win 5840
12:17:32.651741 victim.22 > attacker.32804: P 1:24(23) ack 1 w...
2008 Aug 26
0
Processed: The possibility of attack with the help of symlinks in some Debian
Processing commands for control at bugs.debian.org:
> tags 496359 security
Bug#496359: The possibility of attack with the help of symlinks in some Debian packages
There were no tags set.
Tags added: security
> tags 496360 security
Bug#496360: The possibility of attack with the help of symlinks in some Debian packages
Tags were: confirmed
Tags added: security
> tags 496362 security
2009 Jun 02
3
Dovecot under brute force attack - nice attacker
Hi List,
optimizing the configuration on one of our servers (which was
hit by a brute force attack on dovecot) showed an odd behavior.
The short story:
On one of our servers an attacker did a brute force
attack on dovecot (pop3).
Since the attacker closed and reopened the connection
after every user/password combination the logs showed
many lines like this:
dovecot: pop3-login: Aborted login: user=<test>,......
The problem:
If the attacker wouldn't have closed and r...
2009 Jun 04
3
Dovecot under brute force attack - nice attacker
Hi List,
optimizing the configuration on one of our servers (which was
hit by a brute force attack on dovecot) showed an odd behavior.
Dovecot Version 1.0.7 (CentOS 5.2)
The short story:
On one of our servers an attacker did a brute force
attack on dovecot (pop3).
Since the attacker closed and reopened the connection
after every user/password combination the logs showed
many lines like this:
dovecot: pop3-login: Aborted login: user=<test>,......
The problem:
If the attacker wouldn't have closed and r...
2013 Jan 02
8
Auto ban IP addresses
Greetings all,
I have been seeing a lot of
[Jan 2 16:36:31] NOTICE[7519]: chan_sip.c:23149 handle_request_invite:
Sending fake auth rejection for device
100<sip:100 at 108.161.145.18>;tag=2e921697
in my logs lately. Is there a way to automatically ban IP address from
attackers within asterisk ?
Thank you
2009 Dec 24
11
attack
Hi,
My server is under attack allows the attacker to abuse of a php script of a vhost. How can I find what is the script.
Regards,
maverh
2015 Sep 01
2
llvm cfi
2015-09-01 11:38 GMT+08:00 John Criswell <jtcriswel at gmail.com>:
> On 8/31/15 10:43 PM, 慕冬亮 via llvm-dev wrote:
>
> I want to create an experiment to show the effectiveness of cfi :
> For example ,
> I first need a program with vulnerability so that we can hijack its
> control flow;
>
> then I enforce cfi of llvm and we can't hijack its control flow.
>
>
2013 May 16
5
ddos attack causes high ksoftirqd cpu use
Hello List!
I got a small (50mbits or so) application layer ddos attack against a
few name servers (thousands of IPs sending lots of bogus A record
requests - weird) - one of the name servers was behind a shorewall
firewall. That firewall was running a 2.6.18-194.11.1.el5 kernel and
shorewall-4.4.11.1-1. I noticed that the shorewall host had ksoftirqd
using 100% of the CPU during the
2011 Apr 04
6
sshd: Authentication Failures: 137 Time(s)
...-name SSH --rsource
And this is part of logwatch:
sshd:
Authentication Failures:
unknown (www.telkom.co.ke): 137 Time(s)
unknown (mkongwe.jambo.co.ke): 130 Time(s)
unknown (212.49.70.24): 107 Time(s)
root (195.191.250.101): 8 Time(s)
How is it possible for an attacker to try to logon more then 4 times?
Can the attacker do this with only one TCP/IP connection without
establishing a new one?
Or have the scripts been adapted to this?
Thx
Rainer
1996 Sep 19
0
CERT Advisory CA-96.21 - TCP SYN Flooding and IP Spoofing Attacks
...if it has a source address from your internal
network. In addition, you should filter outgoing packets that have a source
address different from your internal network to prevent a source IP spoofing
attack from originating from your site.
The combination of these two filters would prevent outside attackers from
sending you packets pretending to be from your internal network. It would also
prevent packets originating within your network from pretending to be from
outside your network. These filters will *not* stop all TCP SYN attacks, since
outside attackers can spoof packets from *any* outside netwo...
2005 Oct 29
1
Bug#336265: logrotate detection, possible attack not checked by logcheck
Package: logcheck
Version: 1.2.41
Problem: Logcheck try to detect if log file have been rotate or not by file size way.
Possible attack:
- current log file (sizeA)
- run logcheck, (logcheck/logtail put inode in offsetfile), offset=sizeA
- [attacker run attack 1]
- run logrotate
- [attacker run attack 2]
- run logcheck may don't detect the rotation and don't check the log for attack 1 duration.
attack 1 : The real attack, this attack log will not be checked by logcheck if attack 2 run succesfully.
attack 2 Goal : Growing the log file...
2008 Aug 26
0
Processed (with 58 errors): The possibility of attack with the help of symlinks in some Debian
Processing commands for control at bugs.debian.org:
> tags 496359 secuirity
Unknown tag/s: secuirity.
Recognized are: patch wontfix moreinfo unreproducible fixed potato woody sid help security upstream pending sarge sarge-ignore experimental d-i confirmed ipv6 lfs fixed-in-experimental fixed-upstream l10n etch etch-ignore lenny lenny-ignore.
Bug#496359: The possibility of attack with the help
2017 Feb 15
2
Serious attack vector on pkcheck ignored by Red Hat
Hello Warren,
On Thu, 2017-02-09 at 15:27 -0700, Warren Young wrote:
> So you?ve now sprayed the heap on this system, but you can?t upload
> anything else to it because noexec, so?now what? What has our
> nefarious attacker gained?
So the heap is set with data provided by the (local) attacker who could
initialize it to his liking using either of the two memory leaks in the
options parsing.
The heap, that is entirely under the control of the attacker, now
contains a call to a library with parameters such that it invo...
2012 Jan 10
2
defense-in-depth possible for sshd?
If an attacker finds an exploit to take control of httpd, they're still
blocked in part by the fact that httpd runs as the unprivileged apache
user and hence can't write any root-owned files on the system, unless
the attacker also knows of a second attack that lets apache escalate its
privilege. Basi...
1998 Jul 14
1
Different Forms of attack...
Question,
there are the teardrop, ping of death, DoS and a host of other forms of
attacks. While all of the research that I have been doing concerning
another form of an attack.... I became sorta stumped on an idea...
is there anywhere.... a description on what to expect or what happenes
during any one of these or other attacks listed somewhere? If so, could
someone please direct me in that
2017 Feb 09
4
Serious attack vector on pkcheck ignored by Red Hat
On Thu, 2017-02-02 at 13:40 -0800, Gordon Messmer wrote:
> Escalation *requires* attacking a program in a security context other
> than your own.
Not necessarily. Suppose the adversary is aware of a root
exploit/privilege escalation in a random library. Then the heap spraying
allows this attacker to easily trigger this exploit because he is able
to initialize the entire contents of the heap to his liking and thus
call whatever function he likes, including the one that will cause the
root exploit.
So even though the heap spraying is not an attack in itself it is a
serious "crow bar&quo...
2018 Jun 05
4
Help attack DDOS
Hi.
I have a problem with the icecast. When I activate the service I am having
an exesive consumption in the ip queries. It seems like a DDOS attack. How
can I mitigate this attack?
Thanks.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.xiph.org/pipermail/icecast/attachments/20180605/bd03e5eb/attachment.htm>
2013 Aug 28
2
[LLVMdev] Adding diversity for security (and testing)
...in a compiler.
>>
>
> Security comes from careful threat analysis and establishing
> counter-measures appropriate to the threats, which might or might not
> warrant crypto.
This is a very good point. It may help to clarify your threat model here. Let's think about who the attackers are. Some possibilities:
1. Local attacker who can read the contents of the binary. This defense doesn't really buy you anything given automated attack creation frameworks like Q [1].
2. Local attacker who cannot read the contents of the binary. (This is a pretty strange one, but it's po...
2004 Apr 06
4
SYN attacks
Heya,
FREEBSD 4.9-STABLE
Is there anyway to block SYN attacks and prevent it from bring down
my server?
Its been attacking for sometime.