LinuxQuestions.org
Share your knowledge at the LQ Wiki.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 03-13-2010, 08:43 PM   #1
LazerPhreak
Member
 
Registered: Dec 2009
Location: USA
Distribution: Ubuntu Server / Desktop / UNR
Posts: 117

Rep: Reputation: 17
Identifying attackers


Hello all!

So I run an FTP server out of my apartment for private use and of course, I get all kinds of brute force attempts from the world at large. I know I can simply block these attacks and report them, but thats boring. How could I go about getting any information on who the attacker really is? What methods does law enforcement use to figure these things out? Not that I would actually use it to prosecute...more of a boredom thing.
 
Click here to see the post LQ members have rated as the most helpful post in this thread.
Old 03-13-2010, 09:02 PM   #2
irmin
Member
 
Registered: Jan 2010
Location: the universe
Distribution: Slackware (modified), Slackware64 (modified), openSuSE (modified)
Posts: 342

Rep: Reputation: 62
Getting a real name can be hard, except if you ask the internet service provider for it (they won't tell you, but law enforcement can ask for the data).

What you can do is to use the IP address with an "ip locator" to find the approximate region, where the attacker comes from (or wants you to believe so). Another possibility is to do a reverse DNS lookup on the ip address. The names can tell you something. In some cases you can find out from what network the attack cames from (e.g. dailup, university network, country, ...).

You can also use traceroute or nmap to get more information on the attacker. Also try ping with option -t. Using this technique you will eventually find out the country/network the attack originates.

Except in lucky cases you will not get much information with this methods (especially not the address/name). For this you need the help of the isp.
 
Old 03-14-2010, 09:08 AM   #3
Hangdog42
LQ Veteran
 
Registered: Feb 2003
Location: Maryland
Distribution: Slackware
Posts: 7,803
Blog Entries: 1

Rep: Reputation: 422Reputation: 422Reputation: 422Reputation: 422Reputation: 422
Quote:
What you can do is to use the IP address with an "ip locator" to find the approximate region, where the attacker comes from (or wants you to believe so). Another possibility is to do a reverse DNS lookup on the ip address. The names can tell you something. In some cases you can find out from what network the attack cames from (e.g. dailup, university network, country, ...).
And that gets you what? The chances that anybody other than a complete noob skiddie would use their own computer for an attack has got to be close to nil. In most cases, you're just going to find another compromised machine.

In general trying to track the bad guys is pretty much a waste of time. Law enforcement can figure it out because they can compel cooperation from the ISPs and the owners of compromised machines.
 
2 members found this post helpful.
Old 03-14-2010, 10:37 AM   #4
spampig
Member
 
Registered: Feb 2010
Location: /Earth/UK/England/Hampshire
Distribution: Debian, Ubuntu, CentOS, Slackware
Posts: 262
Blog Entries: 2

Rep: Reputation: 56
In most cases professional attackers will use at least one, if not a chain of proxies to pass the request through - so chasing the IP is usually fruitless as far as catching the culprit. Abuse reports to the IP owner vary in effectiveness, but for each proxy you shut down, there a billions waiting in the wings. Chasing offenders becomes the task for a 'busy fool' and it's just going to get you hot under the color with how powerless you are.
It makes better sense to spend time on good security practice. Thinks like rate controlling connections, Limiting the number of log-in attempts, strong passwords, ACL's that limit access to certain IP's, firewall hosts from places you don't want to connect (China, Brazil etc) and grow to accept people will always try the door. You just need to make sure you have it locked :-)

From time to time you'll find kiddies who are not using proxies come to you playing with nmap, hydra and metasploit etc. This is where a call/mail to the ISP does reap rewards. In the UK SKY & BT are very effective at terminating such users and I'm sure there are US suppliers who are equally aggressive at dealing with it.
 
1 members found this post helpful.
Old 03-16-2010, 07:10 PM   #5
unixfool
Member
 
Registered: May 2005
Location: Northern VA
Distribution: Slackware, Ubuntu, FreeBSD, OpenBSD, OS X
Posts: 782
Blog Entries: 8

Rep: Reputation: 158Reputation: 158
Quote:
Originally Posted by irmin View Post
You can also use traceroute or nmap to get more information on the attacker.
Be careful here. Some ISPs are savvy enough to know when an nmap scan is being conducted and many ISP have such tools/activity listed as 'do not use'. Better to check your AUP/ToS for your particular ISP first than find yourself shut down because you thought nmap was a benign tool.

Just my 2 cents.
 
2 members found this post helpful.
Old 03-16-2010, 11:55 PM   #6
freelinuxtutorials
Member
 
Registered: Oct 2009
Posts: 70

Rep: Reputation: 21
just log all the IPs and report to the ISP abuse@ department, and maybe they will take care of it.
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
What did Google's attackers do? resetreset Linux - Security 20 04-21-2010 03:51 AM
Striking Back At Attackers snowman81 Linux - Security 5 02-13-2008 10:18 AM
LXer: Fail2ban - Put brute force attackers away from your Linux Box LXer Syndicated Linux News 0 10-13-2007 11:20 AM
LXer: How To Secure Your CentOS Server Against Attackers LXer Syndicated Linux News 0 08-23-2006 02:54 PM
LXer: Linux on Mac Could Spike Attackers' Interest LXer Syndicated Linux News 0 04-23-2006 11:54 PM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 02:32 PM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration