Groups | Search | Server Info | Login | Register


Groups > comp.os.linux.security > #719

Re: SSH Exploit: Common Accounts

X-Received by 10.55.47.196 with SMTP id v187mr23291972qkh.35.1507168645749; Wed, 04 Oct 2017 18:57:25 -0700 (PDT)
X-Received by 10.31.49.200 with SMTP id x191mr1037394vkx.19.1507168645717; Wed, 04 Oct 2017 18:57:25 -0700 (PDT)
Path csiph.com!feeder.erje.net!2.us.feeder.erje.net!feeder.usenetexpress.com!feeder-in1.iad1.usenetexpress.com!border1.nntp.dca1.giganews.com!nntp.giganews.com!6no865478qtw.1!news-out.google.com!p42ni2508qtp.0!nntp.google.com!d13no1046572qta.0!postnews.google.com!glegroupsg2000goo.googlegroups.com!not-for-mail
Newsgroups comp.os.linux.security
Date Wed, 4 Oct 2017 18:57:25 -0700 (PDT)
In-Reply-To <Xns97A1E4DA29EFFdontmailmecom@208.49.80.124>
Complaints-To groups-abuse@google.com
Injection-Info glegroupsg2000goo.googlegroups.com; posting-host=217.118.81.195; posting-account=ClKxPAkAAAB-bwArfbVl2zD7Uy8Itxdo
NNTP-Posting-Host 217.118.81.195
References <Xns97A1E4DA29EFFdontmailmecom@208.49.80.124>
User-Agent G2/1.0
MIME-Version 1.0
Message-ID <473ab69e-71b1-48fe-8738-29046ea5b2c7@googlegroups.com> (permalink)
Subject Re: SSH Exploit: Common Accounts
From alla3002070@gmail.com
Injection-Date Thu, 05 Oct 2017 01:57:25 +0000
Content-Type text/plain; charset="UTF-8"
Content-Transfer-Encoding quoted-printable
Lines 29
Xref csiph.com comp.os.linux.security:719

Show key headers only | View raw


marți, 11 aprilie 2006, 09:29:49 UTC+4, Mungo a scris:
> Think that the shh crackers only go after simple common account names? 
> Think again. Here is a list of the account names used in 85% of crack tries 
> we saw over the last two weeks. "root" and "admin" together accounted for 
> 25%.
>   
> 1    	2005    	20admin    	20info    	20jobs    	20mail    	2qjj4toi
> a    	a2    	abramenko    	academy   	accept    	adam    	adine
> admin    	administrator    	Administrator    	aiaetn    aleksandrova
> alekseeva    	alex    	alias    	andrea    	andres    	andrew
> andrianov    	antonov    	apryatin    	arapova    	art
> asen    	author    	b    	backup    	backups    	c    	calendar
> captain    	captn    	compile    	cross    	cyrus    	d
> delta    	directory    	distributions    	dmoran    	e    	eff
> eike    	ejohns    	elena    	elf    	elfi    	eliane    	ervers-mail
> executables    	f    	fax    	fluffy    	ftp    	g    	glloyd
> guest    	hacker    	hacker2k    	i    	ibm    	imation   
> imbroglio    	jack    	james    	jjmul    	jmarsden    	khans
> leo    	logged    	marvin    	max    	mule    	mvlahos
> mysql    	nobody    	office    	olga    	oracle    	patrick
> pgsql    	poq    	postgres    	providerprof    	publicidad
> qwerty    	recruit    	root    	sales    	samba    	scanner
> security    	settings    	slackware    	staff    	stu
> student    	student1    	student2    	student3    	student4
> test    	tester    	testing    	testuser    	thisisnotyourexploit
> tomcat    	trial    	upload    	uploader    	user    	webmaster
> zeppelin

Back to comp.os.linux.security | Previous | NextNext in thread | Find similar


Thread

Re: SSH Exploit: Common Accounts alla3002070@gmail.com - 2017-10-04 18:57 -0700
  Re: SSH Exploit: Common Accounts Joe Beanfish <joebeanfish@nospam.duh> - 2017-10-05 13:39 +0000

csiph-web