Linux - ServerThis forum is for the discussion of Linux Software used in a server related context.
Notices
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
HI,
I have a Centos linux box and there is interface connect to internet.
I stop the iptables in this box .
After a few day , I find the linux box have been hacked and install some perl script into the box .
Could anyone tell me how the hacker can login into the centos box without knowing the root passwd ???
How can they do it ?? please advise in detailed step...
Pff, it can range from infected client computer (the one that you used to login into the centos box) to brute-forcing you password... Ofcourse, an exploit is also possible.. What other services run on that box... Or it could be a man-in-the middle..
The only thing for sure from your question is that you made at least one mistake (and I'm telling you this so you can learn, not to critisize): 'root' logins in ssh shouldn't be enabled.. Use a normal account and 'su' or 'sudo' instead (with password)
HI,
Actually, I want to know how Ican hack a linux box without using passwd ......Please advice ....
I think when you tell "I can hack" is in a generic sense, since it is your Linux system that has been allegedly hacked, isn't it? Anyway, no one here can provide detailed step by step description of the process, since it would really be in violation of the aforementioned LQ rules. We can only provide links and citations of such techniques, as Smokey_justme already did, in order to enhance security of Linux systems and implement counteraction. Other members are kindly invited to maintain this course and not derail from the topic.
If you have a founded suspicion that your system has been hacked and you need help to restore your system to a safe configuration, you may consider to move your thread to the Linux - Security forum (please, use the report button to ask for moving).
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.