If this is your first visit, be sure to
check out the FAQ by clicking the
link above. You may have to register
before you can post: click the register link above to proceed. To start viewing messages,
select the forum that you want to visit from the selection below.
I'm on Siren. I'm sure that guy's name is just a randomly generated name.
LOL reason i was asking is cuz I know a Dawnn on my server as well (Quetz) but havent seen him around in a while, not sure if thats the same person and he jumped servers........
Originally posted by Van Wilder
Worrying is like a rocking chair, gives you something to do, but doesnt get you anywhere
Originally posted by Taskmage
No matter how far an ass travels he will never be a horse. Some people are just bad players and no amount of tools you give them will change that.
Hexx of Quetzalcoatl - 78PLD, 90NIN, 90WAR, 90SAM, 90BLU,90THF, 90SCH,90COR I'M BACK BABY!
Holy shit!
I found the people who do Garrison on my server tonight.
Completely by accident too. I flagged up looking for a party on Black Mage expecting the worst and instead I get an invite to the event I've been trying to organize people to come to for weeks.
It was a low man Dynamis SandO'ria with about 10 people, and was quite fun. A friend sent me a /tell asking if I wanted to go, and asked that I go on Blu to be stunner and sleeper, plus DD. I stunned all three of some orc NM's charmga attempts (Fanatic's Dance?) and most of his other TP moves as well, leaving the group rather happy and impressed.
I did like Zaethi asking me if I had stunned those moves on purpose or not And the answer is yes and no. The first charga move I meant to stun, the second I cast because I felt it was about time for the NM to try another TP move, and he did try to use his charmga move right before the spell went off, and the third I meant to stun. However I also added don't expect me to be able to do that consistently, I'm still learning how to stun some TP moves and keep a mob largely stun locked, although it seemed like a decently long delay on that orc's moves.
And I walked out with the Mirage Bazubands, which look quite snazzy, and some coinage and misc items. I like the fingerless look of the Magus Bazubands slightly better, but I like the color scheme on the Mirage Bazubands a whole lot more.
The group I went with was great, very professional and fun to be around. Rdm and Brds actually kept me refreshed!!! People were kept cured, it was great!!
Oh yeah, and I died several times
Dynamis was a hoot, I want to do more!
You have the right to remain silent, anything you say can and will be misqouted and then used against you.
I don't have a big ego, it just has a large mouth.
Squid Sushi
Opo Opo Necklace + 4 sleep potions
3 high potion +1
2 X-potion +1
Icarus Wing
Clear B. Blood
Blink Band
I summoned Lifedrinker Lars, got to 100% tp using the sleep pots + opo opo necklace, eat the Squid Sushi, used the blink band, and 2HR. Had my pet attack Maat then I Rampaged Maat then Snarl my hate. (Maat 2HR on his pet rabbit). I attacked the pet rabbit...then rabbit was kicking my butt! I had to use 1 X potion before the rabbit died. Re-engaged Maat and before I could swing, Lifedrinker Lars made him give up.
PSN ID: Kelshan Completed: F.E.A.R., Bioshock, Turok, The Darkness, Viking: Battle of Asgard, Timeshift, Folklore, Time Crisis 4, Dark Sector, Heavenly Sword, Resistance: Fall of Man, Ninja Gaiden Sigma, The Orange Box, DBZ: Burst Limit, Assassin's Creed, Lair, Overlord, Fracture,Condemned 2, Legendary, BattleField Bad Company 2, Infamous, UT3, Far Cry 2, Resistance 2, Borderlands Currently Playing: MW2 (Stuck in broken Phat PS3 ), Call of Juarez sigpic
First, I have to admit to a major lapse of security on my part; I have an account on my server named 'dummy'. This account has existed for many years through many system rebuilds. This account is almost always locked/disabled and can only be accessed via su from root. It's been configured to ensure that it has no significant privileges normally granted to authorized system users. Once upon a time I used this for rare occasions where I needed to run a proprietary binary to deal with some kind of file, e.g. rar or sit (stuffit expander), in order to keep it reasonably isolated from the rest of the system.
Recently a user who was concerned a system of hers was infected provided files to me that I scanned for viruses. In order to avoid potentially leaking her password, I temporarily opened the dummy account with a simple password and gave it to her. She uploaded the files and I scanned them. I thought I locked the account when I was done, but it seems that this step was missed. My logs show that the password to the account was discovered three times since then by outside hosts (all of which have now been blacklisted by the firewall). At least one made a serious attempt to use this account, changing the password and downloading a number of cracking kits both to the dummy account homedir and /var/tmp.
Here's the one neat part of this, though: Some years back I replaced my server's hardware with an Athlon X2 system. Because I now had an amd64 proc, I decided to make the newer OS reinstalls use x86_64 as the architecture, using the Cross-LFS book as a base. Since Kuri runs no proprietary software or prepackaged binaries that might rely on 32-bit system libraries, I built a pure64 system. And since I knew no legitimate binary for the system would thus ever be 32-bit, I disabled support for 32-bit instructions in the kernel.
After a bit of panicked attempt to assess damage, it quickly became clear that there were no signs of damage or infiltration beyond the files created/downloaded by the dummy user. There were no running processes under the user, or any unaccounted-for processes at all. The shell history showed attempts to use various parts of several tools, but the tools themselves were useless: every single one was a 32-bit binary that could not execute on my system.
On the one hand, this was a case of my getting lucky: my attacker was not sophisticated enough to find or build 64-bit versions of the required tools. Had they been, they could have proceeded to add my server to their botnet and use it until I caught on to the fact that 'dummy' was running stuff and shouldn't be. Perhaps they might even have been able to look for a privilege escalation exploit to try to root the box. On the other hand, this is also an example of layered security and my own bizarre form of paranoia paying off. A classic security rule is that if you don't need a feature, you get rid of it. In this case, support for the very instruction set most exploits and cracking tools are written in was the unneeded feature.
Comment