Questions tagged [hacking]

Hacking is the violation of server or network security via exploitation of weaknesses in that security.

Hacking is the violation of server or network security via exploitation of weaknesses in that security.

Some of the most common ways security may be compromised include:

  • Social engineering, in which a person is persuaded to give up sensitive information such as passwords
  • Exploiting unpatched or not generally known (0-day) security holes in software
  • Brute force, that is, trying common usernames and passwords repeatedly until something works

Less commonly, hacking refers to the uncommonly creative solution of a software or hardware problem. Some see this original definition as the correct one and wish to preserve it, though they seem to be fighting a losing battle.

Detailed security questions and answers which do not fit at Server Fault may be welcome at IT Security Stack Exchange.

479 questions
-1
votes
1 answer

Hacked website, code is encrypted in hex, unable to identify

my web site hacked and i am getting code in index page, but i am unable to find that where is the code in my web…
dhakad
  • 3
  • 3
-1
votes
1 answer

list of IPs that are source of brute force attacks

I'm getting a lot of attempts to bruteforce into a database. Possibly other attempts too, but this is what I'm focusing on for now. I've compiled a list of IP addresses that are sources of this attack. I'd like to compare them to the list and…
Daniel
  • 81
  • 7
-1
votes
1 answer

Lots of new qmail accounts in Ubuntu 12. Have I been hacked?

I am using Ubuntu 12.04. Recently, lots of new qmail accounts started appearing at the login screen. Excluding my account, 6 new users viz qmaill, qmailr, qmailr, qmails, qmailp and alias are now visible. The last command on each user shows that…
-1
votes
3 answers

Entries in `/etc/inittab` below last line - possible hack?

Possible Duplicate: My server's been hacked EMERGENCY My Linux machine has been hacked lately. There are a few entires in /etc/inittab below the #end of /etc/inittab Something like: #Loading standard ttys 0:2345:once:/usr/sbin/ttyload I also…
Danijel
  • 256
  • 6
  • 19
-1
votes
1 answer

Is it more secure to spoof addresses using the HOSTS file?

If I have a Windows service with a config file that points to web services it needs to call, is it more secure to put a fake DNS name for the server being connected to, then update the HOSTS file to redirect outbound calls to the right IP address?
ck.
  • 162
  • 8
-1
votes
3 answers

How can a website recover from code injection especially the domain name?

My website was recently hacked that apparently it came under code injection vulnerability not SQL injection. At least that's what Google is telling me and even gave me a possible iframe codes. That was a shock to me for it never happened to my…
ThN
  • 99
  • 3
-1
votes
1 answer

Has my server been hacked?

Possible Duplicate: My server's been hacked EMERGENCY I have some problem with my server (running on Centos 5). While checking traffic, I run "$lsof | grep ezbuyinfo" and it show too much connection on smtp port. I tried rkhunter, but nothing…
Tri
  • 11
  • 2
-1
votes
1 answer

.htaccess attack redirect all the sites in the server

Possible Duplicate: My server's been hacked EMERGENCY My site is hacked and I've asked yesterday about this issue. I've changed the FTP password, the server password. I also have change the location of the server where it use to be in the folder…
Ali
  • 310
  • 1
  • 4
  • 13
-1
votes
2 answers

My Wordpress site being hack by modifying the .htaccess

Possible Duplicate: My server's been hacked EMERGENCY I'm going crazy right now and I don't know what to do. I've did a Google search about those hackers where they using .htaccess to redirect my site to their site to gain traffic, and now I'm…
Ali
  • 310
  • 1
  • 4
  • 13
-1
votes
2 answers

How to prevent Brute-Fource server attack on Linux base server?

Lately my server goes down many times and I have to reboot it in order to start up again. I use CentOS for my web server and notice an email send from my server log that Brute-Force Attack detected in service log from IP(s) 195.110.154.68 This is…
Ali
  • 310
  • 1
  • 4
  • 13
-1
votes
1 answer

Old ubuntu password

I know how to set new password of root in ubuntu 10.04 if I don't know root pasword and grub has no password . I want to know that whether I could get the old password which was set before I changed it. Does some file or command can give me access…
user1044137
-1
votes
1 answer

How do I figure out how the "Pharma Hack" hackers are gaining access to my site?

One of my sites has been the continuous target of the "Pharma Hack" - but it's using Drupal instead of Wordpress or Joomla. It is version 6, but it's updated to the latest version, and so are all of the modules that I have installed. I've changed…
Ken
  • 1
-1
votes
2 answers

apache-memory-hacker-linux

We have a linux server with 4Gb of memory. When we start the system it uses only 435Mb. When we start the apache httpd services it take 1000Mb and subsequently automatically it takes all the memory and the server crashes. If we stop Apache it only…
-1
votes
2 answers

how to find who is perform malicious activity in shared hosting server

I am a shared webhosting provider, I got a complain: * COMPLAINT * | *.*(server shared ip) | 2011-09-17 20:02:12 | jakarta.dreamhost.com | 1807770 | oscommerce remote upload from 'categories.php' | | *.*(server shared ip) | 2011-09-17…
cosbeta
  • 37
  • 1
  • 4
-1
votes
3 answers

To what extent can you secure a system?

To what extent can you filter/firewall for suspicious traffic or lock down a system? If you have everything up to date and secure, what can you do to protect against a 0 day? I assume an IDS might help for example by recognizing packets trying to…
Sonny Ordell
  • 145
  • 3
  • 7