The Geek Forum

  • May 12, 2024, 05:20:50 PM
  • Welcome, Guest
Please login or register.

Login with username, password and session length
Advanced search  

News:

Due to the prolific nature of these forums, poster aggression is advised.

*

Recent Forum Posts

Shout Box

Members
Stats
  • Total Posts: 129628
  • Total Topics: 7187
  • Online Today: 150
  • Online Ever: 1013
  • (January 12, 2023, 01:18:11 AM)

Author Topic: Hacksering... For a class!  (Read 1466 times)

ho0ber

  • Wannabe Professional Blogger
  • **
  • Coolio Points: +29/-1
  • Offline Offline
  • Gender: Male
  • Posts: 582
    • View Profile
    • SDC-Music.com
Hacksering... For a class!
« on: February 09, 2006, 07:50:22 AM »

So I know it's taboo to ask for this sort of support:

HI CAN U PLZ HLP ME HAX MY GFS HTOMAIL?!!! KTHXBYE!!1


However, I have a computer security class assignment that some of you folks might be able to help with.

So here is what's up:

Teams of two in the class each have control of a box on a little private network. We each picked different distributions of linux to install on them, and got ourselves some little servers up and running. The professor's machine is the sample user's machine, from which he attempts to use the services we provide from our servers. Every four or five days we have to offer another type of service (FTP, HTTP... etc) as he assigns, or sometimes we just have to make changes to those that we already offer.

Now, here is the challenge:

We've had a week of bloodshed free setup time before the chaos begins, but starting today we get to start trying to screw with the other group's boxen. The point is to secure our servers well, but to make sure we can still provide the services we're supposed to. We are supposed to be as evil as possible, but we get points off if another group knows what we did and who we are.


So my questions are the following:

I know some of you here are pretty solid linux users/admins. Do you know of any dirty little tricks or resources I should look into for the offensive side of this exercise? (My job is offense, but I'm of course helping secure our box too)

and

Any suggestions for how I should make sure my box is secure? I've been doing plenty of reading, but if you have any good resources, let me know. (We ended up getting Arch Linux for ours [no two groups could have the same]). Also, what do you suppose would be the best way to track what other people are doing to us (log file interpreters perhaps)?


PS: I know its been a while since I've been back here. Taking six courses a semester really kills the free time. I miss you guys!
Logged
-ho0ber

Demosthenes

  • Evil Ex-HN Moderator
  • Administrator
  • Hacker
  • *
  • Coolio Points: +567/-72
  • Offline Offline
  • Gender: Male
  • Posts: 9904
  • Just try me. See what happens.
    • View Profile
    • Zombo
Hacksering... For a class!
« Reply #1 on: February 09, 2006, 11:19:50 AM »

Well, for starters, if you're running an SSH daemon, there are a few things you can do to make sure it's secure.  For example, disable root logins via SSH, change the default listen port to something else than the default, limit the number of password attempts, change the timeout to something shorter than default, etc.  Most of that can be done in the /etc/ssh/sshd_config file.
Logged

Coolio Points: 89,000,998,776,554,211,222
Detta Puzzle Points: 45

Banning forum idiots since 2001

ho0ber

  • Wannabe Professional Blogger
  • **
  • Coolio Points: +29/-1
  • Offline Offline
  • Gender: Male
  • Posts: 582
    • View Profile
    • SDC-Music.com
Hacksering... For a class!
« Reply #2 on: February 19, 2006, 08:09:09 AM »

Thanks for the advice - pretty sure I had most of that sorted out. I messed with it some more though, and I think I'm in good shape.

I think now it would require some exploit that has yet to be discovered. Brute forcing it is pretty much out of the question.
Logged
-ho0ber