Groups | Search | Server Info | Login | Register
Groups > comp.os.linux.security > #719
| X-Received | by 10.55.47.196 with SMTP id v187mr23291972qkh.35.1507168645749; Wed, 04 Oct 2017 18:57:25 -0700 (PDT) |
|---|---|
| X-Received | by 10.31.49.200 with SMTP id x191mr1037394vkx.19.1507168645717; Wed, 04 Oct 2017 18:57:25 -0700 (PDT) |
| Path | csiph.com!feeder.erje.net!2.us.feeder.erje.net!feeder.usenetexpress.com!feeder-in1.iad1.usenetexpress.com!border1.nntp.dca1.giganews.com!nntp.giganews.com!6no865478qtw.1!news-out.google.com!p42ni2508qtp.0!nntp.google.com!d13no1046572qta.0!postnews.google.com!glegroupsg2000goo.googlegroups.com!not-for-mail |
| Newsgroups | comp.os.linux.security |
| Date | Wed, 4 Oct 2017 18:57:25 -0700 (PDT) |
| In-Reply-To | <Xns97A1E4DA29EFFdontmailmecom@208.49.80.124> |
| Complaints-To | groups-abuse@google.com |
| Injection-Info | glegroupsg2000goo.googlegroups.com; posting-host=217.118.81.195; posting-account=ClKxPAkAAAB-bwArfbVl2zD7Uy8Itxdo |
| NNTP-Posting-Host | 217.118.81.195 |
| References | <Xns97A1E4DA29EFFdontmailmecom@208.49.80.124> |
| User-Agent | G2/1.0 |
| MIME-Version | 1.0 |
| Message-ID | <473ab69e-71b1-48fe-8738-29046ea5b2c7@googlegroups.com> (permalink) |
| Subject | Re: SSH Exploit: Common Accounts |
| From | alla3002070@gmail.com |
| Injection-Date | Thu, 05 Oct 2017 01:57:25 +0000 |
| Content-Type | text/plain; charset="UTF-8" |
| Content-Transfer-Encoding | quoted-printable |
| Lines | 29 |
| Xref | csiph.com comp.os.linux.security:719 |
Show key headers only | View raw
marți, 11 aprilie 2006, 09:29:49 UTC+4, Mungo a scris: > Think that the shh crackers only go after simple common account names? > Think again. Here is a list of the account names used in 85% of crack tries > we saw over the last two weeks. "root" and "admin" together accounted for > 25%. > > 1 2005 20admin 20info 20jobs 20mail 2qjj4toi > a a2 abramenko academy accept adam adine > admin administrator Administrator aiaetn aleksandrova > alekseeva alex alias andrea andres andrew > andrianov antonov apryatin arapova art > asen author b backup backups c calendar > captain captn compile cross cyrus d > delta directory distributions dmoran e eff > eike ejohns elena elf elfi eliane ervers-mail > executables f fax fluffy ftp g glloyd > guest hacker hacker2k i ibm imation > imbroglio jack james jjmul jmarsden khans > leo logged marvin max mule mvlahos > mysql nobody office olga oracle patrick > pgsql poq postgres providerprof publicidad > qwerty recruit root sales samba scanner > security settings slackware staff stu > student student1 student2 student3 student4 > test tester testing testuser thisisnotyourexploit > tomcat trial upload uploader user webmaster > zeppelin
Back to comp.os.linux.security | Previous | Next — Next in thread | Find similar
Re: SSH Exploit: Common Accounts alla3002070@gmail.com - 2017-10-04 18:57 -0700 Re: SSH Exploit: Common Accounts Joe Beanfish <joebeanfish@nospam.duh> - 2017-10-05 13:39 +0000
csiph-web