Skip to main content

Questions tagged [hacking]

Hacking is the violation of server or network security via exploitation of weaknesses in that security.

634 votes
13 answers
175k views

This is a Canonical Question about Server Security - Responding to Breach Events (Hacking) See Also: Tips for Securing a LAMP Server Reinstall after a Root Compromise? Canonical Version ...
gunwin's user avatar
  • 6,440
75 votes
15 answers
65k views

I run a small internet based business from home and make a living at it to feed my family, but I'm still a one man show and internet security is far from my area of expertise. Yesterday I received two ...
Vincent's user avatar
  • 838
0 votes
1 answer
934 views

I have 1 Wazuh server and 2 Windows 10 agent machines. Wazuh Manager: 10.1.0.3 Agent1: 10.0.2.2 Agent2: 10.1.0.4 All firewall rules are turned off and set to ALLOW ALL Wazuh itself is functioning as ...
daniellooartist's user avatar
0 votes
1 answer
381 views

This is the second time I have gotten an authenticator prompt in the past 3 months unprompted. After the first time, I reset my password on a mobile phone (the mobile phone is patched as far as I know)...
ListsOfArrays's user avatar
1 vote
1 answer
117 views

I was watching a server console for results of my own activity and was bombarded by someone trying to do GET on a long alphabetical list of files/directories. I checked lastb and found some entries ...
Sinc's user avatar
  • 111
77 votes
3 answers
164k views

I am getting bombarded with attempted hacks from China all with similar IPs. How would I block the IP range with something like 116.10.191.* etc. I am running Ubuntu Server 13.10. The current line ...
Stephen Cioffi's user avatar
2 votes
2 answers
6k views

How is it possible to use the method : SSTP_DUPLEX_POST and the url : /sra_{BA195980-CD49-458b-9E23-C84EE0ADCD75}/ to hack a server ? I have this request in my logs from a well known malicious IP ...
Frédérique's user avatar
58 votes
6 answers
7k views

After reading this question on a server compromise, I started to wonder why people continue to seem to believe that they can recover a compromised system using detection/cleanup tools, or by just ...
Zoredache's user avatar
  • 134k
5 votes
3 answers
21k views

The sshd service on my Ubuntu server is under constant attack for various IP and user id. According to /var/log/auth.log file, there are three different types of fails from unknown id and IP address: ...
codechimp's user avatar
  • 153
1 vote
0 answers
69 views

We have a big website on a virtual server that runs fine. We have a few hundred clients. Since a few weeks, we saw that with exactly ONE of these clients there were 404 references to hrefs like www....
Roemer's user avatar
  • 111
-3 votes
2 answers
2k views

So for context I have two virtual machines one is running on kali linux which is the "Hacker's" machine and the other one is running on windows 10 pro which is supposed to be the victim's ...
LuckyCoder3607's user avatar
23 votes
4 answers
22k views

By coincidence I looked at my servers ssh log (/var/log/auth.log) and I noticed that someone is constantly trying to gain access: Sep 7 13:03:45 virt01 sshd[14674]: pam_unix(sshd:auth): ...
Vingtoft's user avatar
  • 1,677
31 votes
4 answers
8k views

I am not sure if I've been hacked or not. I tried to log in through SSH and it wouldn't accept my password. Root login is disabled so I went to rescue and turned root login on and was able to log in ...
PhysiOS's user avatar
  • 442
39 votes
7 answers
19k views

My website gets thousands of hits daily from different IPs trying to access: /php-myadmin/ /myadmin/ /mysql/ ...and thousands of other variations. None of these directories exist, I don't even have ...
amba88's user avatar
  • 513
-1 votes
1 answer
76 views

Can Windows powershell give me fake or altered outputs if I use common commands primarily used in powershell checking hash codes is option but they can be altered too theorically so its not that ...
Mande de su ka 's user avatar

15 30 50 per page
1
2 3 4 5
33