Josef Lowder wrote:
> .
> Are Linux boxes vulnerable to be used by botnets?
>
> This article in USA Today is frightening.
>
> http://www.usatoday.com/tech/news/computersecurity/2008-03-16-computer-botnets_N.htm
> ---------------------------------------------------
> PLUG-discuss mailing list - PLUG-discuss@lists.plug.phoenix.az.us
> To subscribe, unsubscribe, or to change your mail settings:
> http://lists.PLUG.phoenix.az.us/mailman/listinfo/plug-discuss
>
Probably at least once a day my Linux box that I have co-located is
probed for a weak password /account through SSH. I'm not sure what they
would do to the system if they got in and I'm not going to find out.
When I see an SSH probe happen I track down who owns the IP and report
it. I also nmap the IP to see what services are running on the system.
Sometimes the attack will be coming from some company's web server
(which also has been compromised) but usually if there is a web server
it will have the default "It works" web page telling me that some
distribution sets up a guest account with no password or an
easily-guessed password. The SSH-probe script will try hundreds of
accounts though.
--
Jon M. Hanson (N7ZVJ)
Homepage: http://the-hansons-az.net
Weblog: http://the-hansons-az.net/wordpress
Jabber IM: jon@the-hansons-az.net
---------------------------------------------------
PLUG-discuss mailing list -
PLUG-discuss@lists.plug.phoenix.az.us
To subscribe, unsubscribe, or to change your mail settings:
http://lists.PLUG.phoenix.az.us/mailman/listinfo/plug-discuss