[ubuntu-us-ut] Securing a Linux Server

Charles Curley charlescurley at charlescurley.com
Tue Oct 9 00:36:23 BST 2007


On Mon, Oct 08, 2007 at 05:25:47PM -0600, Christer Edwards wrote:
> On Mon Oct 08, 2007 at 04:52:50PM -0600, Daniel wrote:
> > I have just been hacked.  I was vulnerable to an ssh brute force

> Double check to see what services are running using nmap localhost.

Won't "nmap localhost" tell him what services are visible on his
loopback device, which doesn't help here? Shouldn't He run nmap
against his NIC(s)'s IP address(s).

> Make sure this only lists apache and ssh.  If it has more you can ask us
> how to help turn them off if you need...

Uninstall if possible. If not possible, justify it. If it ain't there,
they can't crack it.

-- 

Charles Curley                  /"\    ASCII Ribbon Campaign
Looking for fine software       \ /    Respect for open standards
and/or writing?                  X     No HTML/RTF in email
http://www.charlescurley.com    / \    No M$ Word docs in email

Key fingerprint = CE5C 6645 A45A 64E4 94C0  809C FFF6 4C48 4ECD DFDB
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 189 bytes
Desc: not available
Url : https://lists.ubuntu.com/archives/ubuntu-us-ut/attachments/20071008/8b7ba3f3/attachment.pgp 


More information about the ubuntu-us-ut mailing list