[arm-allstar] crontab -e does this look normal?
Matt Rhoades
lumpsum at gmail.com
Fri Apr 3 02:27:21 EDT 2020
Yes is was kind of simple, not 1234 or pass simple, but certainly not
complex enough. I posted a month or 2 ago about the brute force I
experienced. Yes SSH is 222, I have terminated port forwarding there a
couple months ago.
At any rate I have a fresh image.
Thanks again to Doug and David, you guys rock, more donations headed your
way!!
On Thu, Apr 2, 2020 at 9:08 PM Matt Rhoades <lumpsum at gmail.com> wrote:
> Just wanting to check if these crons are ok, as I was having some brute
> force attacks and also seemed to have a compromised root password.
>
> * */2 * * * /root/.bashtemprc/a/upd>/dev/null 2>&1
> @reboot /root/.bashtemprc/a/upd>/dev/null 2>&1
> 5 8 * * 0 /root/.bashtemprc/b/sync>/dev/null 2>&1
> @reboot /root/.bashtemprc/b/sync>/dev/null 2>&1
> 0 0 */3 * * /tmp/.X21-unix/.rsync/c/aptitude>/dev/null 2>&1
>
> paste:
>
> https://paste.ofcode.org/33T6Kxw5kE9EY66izhdSawp
>
> --
> Matthew D. Rhoades
> KI7UEF 47727 Redmond, OR
>
--
Matthew D. Rhoades
303-736-9350
More information about the ARM-allstar
mailing list