X-Received: by 10.55.47.196 with SMTP id v187mr23291972qkh.35.1507168645749; Wed, 04 Oct 2017 18:57:25 -0700 (PDT) X-Received: by 10.31.49.200 with SMTP id x191mr1037394vkx.19.1507168645717; Wed, 04 Oct 2017 18:57:25 -0700 (PDT) Path: csiph.com!feeder.erje.net!2.us.feeder.erje.net!feeder.usenetexpress.com!feeder-in1.iad1.usenetexpress.com!border1.nntp.dca1.giganews.com!nntp.giganews.com!6no865478qtw.1!news-out.google.com!p42ni2508qtp.0!nntp.google.com!d13no1046572qta.0!postnews.google.com!glegroupsg2000goo.googlegroups.com!not-for-mail Newsgroups: comp.os.linux.security Date: Wed, 4 Oct 2017 18:57:25 -0700 (PDT) In-Reply-To: Complaints-To: groups-abuse@google.com Injection-Info: glegroupsg2000goo.googlegroups.com; posting-host=217.118.81.195; posting-account=ClKxPAkAAAB-bwArfbVl2zD7Uy8Itxdo NNTP-Posting-Host: 217.118.81.195 References: User-Agent: G2/1.0 MIME-Version: 1.0 Message-ID: <473ab69e-71b1-48fe-8738-29046ea5b2c7@googlegroups.com> Subject: Re: SSH Exploit: Common Accounts From: alla3002070@gmail.com Injection-Date: Thu, 05 Oct 2017 01:57:25 +0000 Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable Lines: 29 Xref: csiph.com comp.os.linux.security:719 mar=C8=9Bi, 11 aprilie 2006, 09:29:49 UTC+4, Mungo a scris: > Think that the shh crackers only go after simple common account names?=20 > Think again. Here is a list of the account names used in 85% of crack tri= es=20 > we saw over the last two weeks. "root" and "admin" together accounted for= =20 > 25%. > =20 > 1 2005 20admin 20info 20jobs 20mail 2qjj4toi > a a2 abramenko academy accept adam adine > admin administrator Administrator aiaetn aleksandrova > alekseeva alex alias andrea andres andrew > andrianov antonov apryatin arapova art > asen author b backup backups c calendar > captain captn compile cross cyrus d > delta directory distributions dmoran e eff > eike ejohns elena elf elfi eliane ervers-mail > executables f fax fluffy ftp g glloyd > guest hacker hacker2k i ibm imation =20 > imbroglio jack james jjmul jmarsden khans > leo logged marvin max mule mvlahos > mysql nobody office olga oracle patrick > pgsql poq postgres providerprof publicidad > qwerty recruit root sales samba scanner > security settings slackware staff stu > student student1 student2 student3 student4 > test tester testing testuser thisisnotyourexploit > tomcat trial upload uploader user webmaster > zeppelin