LinuxQuestions.org
Visit Jeremy's Blog.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 12-11-2022, 06:57 PM   #1
ttd2957
LQ Newbie
 
Registered: Dec 2022
Posts: 1

Rep: Reputation: 0
Pass cracking


root@metasploitable:/etc/ssh# service sshd restart
service sshd restart
The program 'service' can be found in the following packages:
* debian-helper-scripts
* sysvconfig
Try: apt-get install <selected package>
bash: service: command not found



Please help...
 
Old 12-25-2022, 02:26 AM   #2
pan64
LQ Addict
 
Registered: Mar 2012
Location: Hungary
Distribution: debian/ubuntu/suse ...
Posts: 22,041

Rep: Reputation: 7348Reputation: 7348Reputation: 7348Reputation: 7348Reputation: 7348Reputation: 7348Reputation: 7348Reputation: 7348Reputation: 7348Reputation: 7348Reputation: 7348
Hi, and welcome here, at LQ
first of all cracking is not allowed on LQ, so we can't really help you to do that.
Your post contains no usable information about your system and environment, dropping in an error message is not really sufficient to help you. So please read the rules and also this page: https://www.catb.org/esr/faqs/smart-...html#beprecise
 
Old 12-25-2022, 10:03 AM   #3
elgrandeperro
Member
 
Registered: Apr 2021
Posts: 415
Blog Entries: 2

Rep: Reputation: Disabled
service is the old command. Most systems use systemctl, and the verb is first like "systemctl start sshd". Do a "systemctl status sshd" to see the service's status.
 
Old 12-25-2022, 11:27 PM   #4
xlfs-0.2
Member
 
Registered: Oct 2022
Posts: 207

Rep: Reputation: 44
as for pass cracking. no help.

but note SSHD used to install on debian with "signing that appeared to make random keys for security" which infact did NOT protect the debian machine from remote login.

it is up to you to test it / make sure your version of (debian) is actually not a root kit
 
1 members found this post helpful.
Old 01-03-2023, 10:08 AM   #5
sundialsvcs
LQ Guru
 
Registered: Feb 2004
Location: SE Tennessee, USA
Distribution: Gentoo, LFS
Posts: 10,691
Blog Entries: 4

Rep: Reputation: 3947Reputation: 3947Reputation: 3947Reputation: 3947Reputation: 3947Reputation: 3947Reputation: 3947Reputation: 3947Reputation: 3947Reputation: 3947Reputation: 3947
It takes a little work to do this, but you should configure sshd so that digital certificates are required and so that it will not "fall back to 'simple passwords.'"

Although ssh's handling of certificates is still very weak, especially since you can "slip in" a new accepted key without being noticed, it does effectively stop the "brute force attacks" which will otherwise consume a tremendous amount of system resources. Either you have an acceptable key or you don't.

Certificate-based openVPN is far stronger, particularly because an end-user cannot directly specify the set of keys which are allowed. (The keys are not "per-user.") Here you can set things up so that you must first "cross the openVPN moat" before you even get a chance to reach the "ssh portcullis." You can set things up so that the presence of openVPN is hidden: there are no "open ports" to "scan." I wrote an article about this on my own website entitled "Number of Unauthorized Access Attempts: Zero." A key benefit of openVPN is that it runs at the level of the network stack. "It's just there."

Last edited by sundialsvcs; 01-04-2023 at 08:05 PM.
 
Old 02-20-2023, 07:40 PM   #6
dugan
LQ Guru
 
Registered: Nov 2003
Location: Canada
Distribution: distro hopper
Posts: 11,249

Rep: Reputation: 5323Reputation: 5323Reputation: 5323Reputation: 5323Reputation: 5323Reputation: 5323Reputation: 5323Reputation: 5323Reputation: 5323Reputation: 5323Reputation: 5323
Quote:
Originally Posted by xlfs-0.2 View Post
as for pass cracking. no help.

but note SSHD used to install on debian with "signing that appeared to make random keys for security" which infact did NOT protect the debian machine from remote login.

it is up to you to test it / make sure your version of (debian) is actually not a root kit
Could you just stop fabricating nonsense please?
 
2 members found this post helpful.
Old 02-20-2023, 07:49 PM   #7
evo2
LQ Guru
 
Registered: Jan 2009
Location: Japan
Distribution: Mostly Debian and CentOS
Posts: 6,724

Rep: Reputation: 1705Reputation: 1705Reputation: 1705Reputation: 1705Reputation: 1705Reputation: 1705Reputation: 1705Reputation: 1705Reputation: 1705Reputation: 1705Reputation: 1705
Quote:
Originally Posted by dugan View Post
Could you just stop fabricating nonsense please?
Hmm, maybe not fabricating but misunderstanding or misrepresenting. Possibly prompted by
https://www.debian.org/security/2008/dsa-1571.

Last edited by evo2; 02-20-2023 at 07:50 PM.
 
Old 02-21-2023, 12:17 AM   #8
Ser Olmy
Senior Member
 
Registered: Jan 2012
Distribution: Slackware
Posts: 3,347

Rep: Reputation: Disabled
Just wanted to add that "password cracking" is an entirely legitimate activity, if performed as part of a security audit. In fact, it would be a dereliction of duty for a sysadmin not to do this regularly in order to expose users (deliberately or accidentally) circumventing policy.
 
Old 02-21-2023, 01:31 AM   #9
pan64
LQ Addict
 
Registered: Mar 2012
Location: Hungary
Distribution: debian/ubuntu/suse ...
Posts: 22,041

Rep: Reputation: 7348Reputation: 7348Reputation: 7348Reputation: 7348Reputation: 7348Reputation: 7348Reputation: 7348Reputation: 7348Reputation: 7348Reputation: 7348Reputation: 7348
Quote:
Originally Posted by Ser Olmy View Post
Just wanted to add that "password cracking" is an entirely legitimate activity, if performed as part of a security audit. In fact, it would be a dereliction of duty for a sysadmin not to do this regularly in order to expose users (deliberately or accidentally) circumventing policy.
I don't think so. I think the quality of passwords is checked when they are typed. So you can't use something that doesn't fit into the rules. Hacking passwords (and knowing other people's passwords) in my opinion (at my company) is not allowed for anyone for any reason.
If you change the rules you can force the people to change their passwords.
 
Old 02-21-2023, 03:10 AM   #10
Ser Olmy
Senior Member
 
Registered: Jan 2012
Distribution: Slackware
Posts: 3,347

Rep: Reputation: Disabled
Quote:
Originally Posted by pan64 View Post
I don't think so. I think the quality of passwords is checked when they are typed.
The word lists are constantly updated, and the methodologies of password guessing change over time as well.

Besides, it's not practically possible to implement a realtime password validator that goes through thousands of permutations of every phrase in a reasonably-sized list.
 
Old 02-21-2023, 04:54 AM   #11
hazel
LQ Guru
 
Registered: Mar 2016
Location: Harrow, UK
Distribution: LFS, AntiX, Slackware
Posts: 7,682
Blog Entries: 19

Rep: Reputation: 4492Reputation: 4492Reputation: 4492Reputation: 4492Reputation: 4492Reputation: 4492Reputation: 4492Reputation: 4492Reputation: 4492Reputation: 4492Reputation: 4492
In BLFS you can build and install a program called CrackLib which monitors entered passwords for quality and rejects those that are easily cracked. But if you install it, you have to rebuild shadow to take advantage of it.
 
2 members found this post helpful.
Old 02-22-2023, 12:37 PM   #12
sundialsvcs
LQ Guru
 
Registered: Feb 2004
Location: SE Tennessee, USA
Distribution: Gentoo, LFS
Posts: 10,691
Blog Entries: 4

Rep: Reputation: 3947Reputation: 3947Reputation: 3947Reputation: 3947Reputation: 3947Reputation: 3947Reputation: 3947Reputation: 3947Reputation: 3947Reputation: 3947Reputation: 3947
But, there are a few "reality checks" that you can apply when someone wants to focus too-much on "password cracking" ...

• Can an outsider actually situate himself into the position where he could actually exploit a "vulnerable" password?

• And, if he did, would he thereby gain sufficient access to be "significant?"

• And, if he did, is it reasonable that he would actually know "what to do next," unless our "intruder" was actually an insider?

• Would our supposedly-ignorant "intruder" actually be able to try "the right" password before tripping other conventional defenses such as "failed password count locks?"

"Portals" that might be accessible to authorized employees, who might actually be in the position to use such passwords, should be stoutly protected by properly-implemented VPNs, not(!) SSH! To enter the front hall of the building, you must first have a unique badge. Once inside that front hall, you will be given the opportunity to present a password. Two layers of defense.

IMHO, "SSH" should never be your first, public-facing, line of defense! Because this will directly(!) present any potential intruder with the following irresistible target:

login:

Instead, let "SSH" be your portcullis, while VPN is your moat. (Ideally, if using "OpenVPN" and tls-auth, with a hidden(!) drawbridge.)

Last edited by sundialsvcs; 02-22-2023 at 12:41 PM.
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
how to pass MySQL user/pass securely in shell script? digity Linux - Newbie 5 01-07-2010 05:48 AM
MDCrack cracks key with pass but not pass with key?... lynx5 Linux - Security 1 02-02-2008 05:49 PM
questions on GCC-3.4.3 - Pass 2 and Binutils-2.15.94.0.2.2 - Pass 2 satimis Linux From Scratch 7 12-26-2005 09:23 PM
Planning to change root pass and oracle system pass sathyguy Red Hat 1 12-20-2005 09:53 PM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 12:54 PM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration