[vox-tech] Verify Ubuntu files
Gandalf Parker
gandalf at any1can.net
Sat Aug 16 07:08:08 PDT 2008
It might be worth mentioning for the original poster that the conversation
has split levels. Im trying to avoid jumping in on the scarey one but to
avoid a doomed feeling I should point out that this is deep tech people
talking deep tech tactics. They are about as common in the real world as
deep tech burglars deciding to rob your house. If you are the admin of a
corporate computer handling lots of credit cards etc etc then it would be
a concern.
On the other hand, most attacks arent real hackers. Real hackers are rare.
Most attacks are script-kiddies, and some are crackers, but few are
hackers. Hackers are knowledgeable and experimentally minded. They do not
use standard tools and therefore standard tools tend to not work as well
for them. Also a surprising number of hackers are not malicious, just
irritating.
Crackers tend to be knowledgeable thugs. They are definetly interested in
taking or abusing. They tend to use tools they find on the net but they do
at least understand them and are capable of trying many different things
to get a result. Tools that are available to foil them can work but
multiple levels of protection, kept up to date, is a good idea.
Script-kiddies are the vast majority and most likely to hit a home system.
They are clueless. They have found an attack tool online and are playing
with it. The honeypot stories are vastly entertaining (a honeypot is a
system setup to purposely draw attacks for security purposes). Ive seen
skiddies use sophisticated tools to get in, then spend all day doing
commands like dir c:\. Or their attack kit will install a sniffer to
capture logins and passwords to a file; then they immeadiately start
logging into their favorite hacker sites, previous hacked systems, and
even their own home machine giving me a copy of all their addresses logins
and passwords.
Once you start watching the security of your system you might feel panic
at seeing all the attacks you are getting. But dont be concerned. You are
getting them all along. Most of them are brute force such as trying huge
files of possible logins with huge files of common passwords. A standard
system and good password habits will cover you there. Packages such as
ChkRootKit and TripWire will help you sleep at night (of course they can
be bypassed but think of it like having a great door lock which is
adequate even though it wouldnt keep out an expert burglar)
Gandalf Parker
--
Never say "my machine is secure". Im not saying it isnt. Just that
you should never say it. That's like in a horror movie when someone says
"we should be safe here"
More information about the vox-tech
mailing list