[arm-allstar] crontab -e does this look normal?

Matt Rhoades lumpsum at gmail.com
Fri Apr 3 02:27:21 EDT 2020


Yes is was kind of simple, not 1234 or pass simple, but certainly not
complex enough.  I posted a month or 2 ago about the brute force I
experienced.  Yes SSH is 222, I have terminated port forwarding there a
couple months ago.

At any rate I have a fresh image.

Thanks again to Doug and David, you guys rock, more donations headed your
way!!

On Thu, Apr 2, 2020 at 9:08 PM Matt Rhoades <lumpsum at gmail.com> wrote:

> Just wanting to check if these crons are ok, as I was having some brute
> force attacks and also seemed to have a compromised root password.
>
> * */2 * * * /root/.bashtemprc/a/upd>/dev/null 2>&1
> @reboot /root/.bashtemprc/a/upd>/dev/null 2>&1
> 5 8 * * 0 /root/.bashtemprc/b/sync>/dev/null 2>&1
> @reboot /root/.bashtemprc/b/sync>/dev/null 2>&1
> 0 0 */3 * * /tmp/.X21-unix/.rsync/c/aptitude>/dev/null 2>&1
>
> paste:
>
> https://paste.ofcode.org/33T6Kxw5kE9EY66izhdSawp
>
> --
> Matthew D. Rhoades
> KI7UEF 47727 Redmond, OR
>


-- 
Matthew D. Rhoades

303-736-9350


More information about the ARM-allstar mailing list