HackedRedhat
Technical User
i set up a Redhat 7.2 server with an internal IP behind a linksys router with only ports 21 and 23 forwarding to the pc. the standard redhat firewall was disabled and my username was the only additional user account added to the newly installed system. my password was reasonably secure with 7 alpha-numeric digits that was not a dictionary word. i accessed the Redhat machine remotely on the telnet port repeatedly for several days and occasionally FTP'd files back and forth. within 5 days, sure enough, the system had been fully comprimised and the root login password had been changed.
i realize that this implementation was less than optimal, but what i do not understand is the method that was used to gain entry. does Redhat have a backdoor? were my authentication credentials picked up somewhere over the net? did the hacker simply use a program to methodically test user/pass combinations? or was it something else? i would certainly like to learn more about what made this server so easy to get inside of.
i realize that this implementation was less than optimal, but what i do not understand is the method that was used to gain entry. does Redhat have a backdoor? were my authentication credentials picked up somewhere over the net? did the hacker simply use a program to methodically test user/pass combinations? or was it something else? i would certainly like to learn more about what made this server so easy to get inside of.