On 02/06/2008, at 9:36 PM, Darryl Barlow wrote:
The compromise occurred over the Christmas/New Year period when I was
interstate. The server had ssh access enabled via password entry
and fell
victim to a brute force password attack. Fortunately I had software
installed which alerted me to
I had the pleasure some years ago of a cracker gaining access to a Linux box
on my work Network running SME Server. I am a lawyer, not a software
professional, though computers have been an enjoyable hobby for me since my
late teens, and I have administered our work network and a number of others
Darryl Barlow [EMAIL PROTECTED] writes:
[...]
The server had ssh access enabled via password entry and fell victim
to a brute force password attack.
[...]
I still do not know how the attacker located the machine. I presume
it was probably through a port scan which may have taken place
Quoting Darryl Barlow [EMAIL PROTECTED]:
I had the pleasure some years ago of a cracker gaining access to a Linux box
on my work Network running SME Server.
I still do
not know how the attacker located the machine. I presume it was probably
through a port scan .
I have seen the same
[EMAIL PROTECTED] writes:
Quoting Darryl Barlow [EMAIL PROTECTED]:
I had the pleasure some years ago of a cracker gaining access to a Linux box
on my work Network running SME Server.
I still do
not know how the attacker located the machine. I presume it was probably
through a port scan
Quoting Daniel Pittman [EMAIL PROTECTED]:
Which release of SME Server was this? Having done some auditing, and
worked with customers who ran SME Server systems for some years without
incident -- but only on older versions -- I am surprised at this claim.
It is some years ago now...
As I
[EMAIL PROTECTED] writes:
Quoting Daniel Pittman [EMAIL PROTECTED]:
Which release of SME Server was this? Having done some auditing, and
worked with customers who ran SME Server systems for some years without
incident -- but only on older versions -- I am surprised at this claim.
It is