Jump to content
Sign in to follow this  
CA3LE

Hack attempt

Recommended Posts

:roll: Someone tried to hack me last night :haha:

[code:1]

Failed logins from these:

admin/password from 210.212.161.2: 4 Time(s)

guest/password from 210.212.161.2: 2 Time(s)

root/password from 202.30.198.226: 18 Time(s)

root/password from 210.212.161.2: 6 Time(s)

test/password from 210.212.161.2: 13 Time(s)

user/password from 210.212.161.2: 2 Time(s)

**Unmatched Entries**

Illegal user test from 210.212.161.2

Illegal user test from 210.212.161.2

Illegal user test from 210.212.161.2

Illegal user test from 210.212.161.2

Illegal user test from 210.212.161.2

Illegal user test from 210.212.161.2

Illegal user test from 210.212.161.2

Illegal user test from 210.212.161.2

Illegal user test from 210.212.161.2

Illegal user test from 210.212.161.2

Illegal user test from 210.212.161.2

Illegal user guest from 210.212.161.2

Illegal user guest from 210.212.161.2

Illegal user admin from 210.212.161.2

Illegal user admin from 210.212.161.2

Illegal user admin from 210.212.161.2

Illegal user admin from 210.212.161.2

Illegal user user from 210.212.161.2

Illegal user user from 210.212.161.2

Illegal user test from 210.212.161.2

Illegal user test from 210.212.161.2

--------------------- pam_unix Begin ------------------------

sshd:

Invalid Users:

Unknown Account: 21 Time(s)

Authentication Failures:

root (202.30.198.226 ): 18 Time(s)

root (210.212.161.2 ): 6 Time(s)

unknown (210.212.161.2 ): 21 Time(s)

---------------------- pam_unix End -------------------------

[/code:1]

Stupid ass --- God what an idiot, guess he took me for granted or thought I wasn't smart enough to log the world...

I am really busy right now.. can you guys counter this guy or flood him :321: -- haha no no no I would never condone that kind of behavior... or would I :wink:

:biggun:

Share this post


Link to post
Share on other sites

You know, it doesn't take too much ICMP traffic to totally knock someone down. I tested this in a lab one time, just kept launching command line windows sending packets to a particular hosts as big as I could.

I tried the same thing in a Cisco lab and some of the routers will actually drop big ICMP packets. Could just make a post "Asshole of the day" Ask people to use ICMP to test to see if he's online. The longer the pings are sent and the bigger the packets...the better.

Nothing better than screwing with someones site and then suddenly you start getting popped by about 100 different IP addresses.

Share this post


Link to post
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Sign in to follow this  

×
×
  • Create New...