Ubuntu Server / Overtake / DoS Attack
Posted: 2011-12-27 17:56
Hello everyone,
I am new to this forum, but I'll jump right into my problem to prevent boring you about my history.
My virtual Server recently got shutdown with the hint of the provider, that there has been noticed a DoS-Attack outgoing from my Server to another.
Now. The situation is, that this server has rly no presence in the web. It is just unknown, except to a few of my fellows.
I'm rly wondering how this server even can be a victim of an overtake, because this would need some affort.
There is no software, which could possibly harmful.
So sb. needed to take advantage out of nowhere.
(1)I'd like to hear if you, experts, can imagine somebody just fall over the server, which is completly unknown and uninteresting, and hack it.
(2)My second interest is, how to chase the method the Attacker took.
I'm assuming the attacker just got a ssh login to a user i created, with a password, which was indeed rly weak. If the server is up again, i hope the ssh log is activated, so i can check the logins.
Btw, the Attacks have had the following format:
17:13:51.792097 IP XXX.XXX.XXX.XXX:53769 > XXX.XXX.XXX.XXX:113: UDP, length 1
(3)Next question would be, which rights an attacker needs to perform such an attack. The user, I created, had no write and execute permissions.
So at the very end I want to ask, if you have any advice for me, that i rly need to take care of.
It is a base ubuntu system with the following software running:
Apache
MySql
Git
Gitosis
Sorry for my bad english, i hope you dont suffer too much.
Thanks for your help.
Greetings
algorim
I am new to this forum, but I'll jump right into my problem to prevent boring you about my history.
My virtual Server recently got shutdown with the hint of the provider, that there has been noticed a DoS-Attack outgoing from my Server to another.
Now. The situation is, that this server has rly no presence in the web. It is just unknown, except to a few of my fellows.
I'm rly wondering how this server even can be a victim of an overtake, because this would need some affort.
There is no software, which could possibly harmful.
So sb. needed to take advantage out of nowhere.
(1)I'd like to hear if you, experts, can imagine somebody just fall over the server, which is completly unknown and uninteresting, and hack it.
(2)My second interest is, how to chase the method the Attacker took.
I'm assuming the attacker just got a ssh login to a user i created, with a password, which was indeed rly weak. If the server is up again, i hope the ssh log is activated, so i can check the logins.
Btw, the Attacks have had the following format:
17:13:51.792097 IP XXX.XXX.XXX.XXX:53769 > XXX.XXX.XXX.XXX:113: UDP, length 1
(3)Next question would be, which rights an attacker needs to perform such an attack. The user, I created, had no write and execute permissions.
So at the very end I want to ask, if you have any advice for me, that i rly need to take care of.
It is a base ubuntu system with the following software running:
Apache
MySql
Git
Gitosis
Sorry for my bad english, i hope you dont suffer too much.
Thanks for your help.
Greetings
algorim