Howdy, Stranger!

It looks like you're new here. If you want to get involved, click one of these buttons!


MisterHost.NET claims that i used my KVM VPS from them for attacking.But i'm innocent.Please help me - Page 2
New on LowEndTalk? Please Register and read our Community Rules.

All new Registrations are manually reviewed and approved, so a short delay after registration may occur before your account becomes active.

MisterHost.NET claims that i used my KVM VPS from them for attacking.But i'm innocent.Please help me

2

Comments

  • LeeLee Veteran
    edited April 2015

    rahulks said: My friend in hyderabad

    Sounding more legit with every post.

  • BruceBruce Member

    logged in to the VPS as root

    nice!

    Thanked by 1netomx
  • Several weeks ago I read somewhere that they currently use teamspeak servers for amplification attacks... my info is not 100% sure cause i never install that and do not have such type of customers

  • to me it sounds like you are using premade script or outside help which also have access to your root password, that's a red alarm to me as you mentioned you are not experienced with these stuff. I think getting a TS server from a GSP may save you the headache.

  • JanevskiJanevski Member
    edited April 2015

    @rahulks said:
    linuxthefish according to https://howsecureismypassword.net/
    Image and video hosting by TinyPic

    So do you think my VPS was hacked ?

    "How secure is my password?" naive users paste their reused "public secret" password into an unknown site, in order to get it "evaluated".

    What a great password collecting idea!

    Salut to HowSecureIsMyPassword!

    This is quite inspiring, but, meh, not now.

  • @Bruce said:
    allowing your VPS to be hacked and used as an attack vector is as bad as doing the attack yourself. that will be their position, and probably the law also

    This is utter crap. If you leave your car with its doors unlocked and someone steals your car and plays Carmagedon Live with it, he goes to jail. Not you.

    Thanked by 1rahulks
  • NeoonNeoon Community Contributor, Veteran

    @deadbeef No, you as the owner go to jail because you had your car unlocked.

    But it depends in which country you live in.

  • deadbeefdeadbeef Member
    edited April 2015

    @Infinity580 said:
    deadbeef No, you as the owner go to jail because you had your car unlocked.

    But it depends in which country you live in.

    @Infinity580

    I really really doubt this is true for any Western country. Do you have any source to back it up?

    Edit: By using "Western", I don't mean to imply anything about the rest, just that I don't have any experience living in (say) China.

  • @deadbeef said:
    This is utter crap. If you leave your car with its doors unlocked and someone steals your car and plays Carmagedon Live with it, he goes to jail. Not you.

    Darwin is always ready to jump in if the law can't.

    Thanked by 1netomx
  • BruceBruce Member

    @deadbeef said:

    real world and digital world is different. very different. it is the wild west.

    budget provider response "I don't need the hassle, can't afford the grief, addios customer"

    how the law could be enforced "we don't understand this internet thing, but if XXX said you did YYY, YOU have to PROVE you didn't do it"

    a better real world example. you leave your car unlocked. someone steals it, shoots someone, and parks it back in your drive. police show up, you don't even know car has been stolen, police find smoking gun in car, and you get arrested. police want the crime "solved" so you get the blame.

    in the digital world, guilty until proven innocent. not nice, but it is happening. not so much with DDoS, yet, but that will come as more companies get hit.

    or I watch too much TV :)

  • @Bruce said:
    real world and digital world is different. very different. it is the wild west.

    Not legally. In modern countries, law is the final arbitrator.

    a better real world example. you leave your car unlocked. someone steals it, shoots someone, and parks it back in your drive. police show up, you don't even know car has been stolen, police find smoking gun in car, and you get arrested. police want the crime "solved" so you get the blame.

    Your example is the same as mine in its conclusion. The police may press charges on you, yet it's not their job to decide if you are responsible or not. That's the job of the law, via the judicial system.

  • IshaqIshaq Member

    Damn! 4Mbps? How dare you!?

  • NyrNyr Community Contributor, Veteran

    Ishaq said: Damn! 4Mbps? How dare you!?

    To China. If the DDoS tool was not very efficient, it could be possible :P

  • @rahulks said:
    linuxthefish according to https://howsecureismypassword.net/
    Image and video hosting by TinyPic

    So do you think my VPS was hacked ?

    1. Not smart entering your password there.
    2. Try to use secure password, different ssh port, fail2ban to possibly prevent this in future.

    I don't think the host is lying. More logical thing is you did launch the attack, tried to mask it with a output limit.
    As per how secure your password is, pick something more secure?
    Like here is a variant (not exact) of one of my passwords.

  • SSDBlazeSSDBlaze Member, Host Rep

    To me, it sounds like either:
    1. You launched the attack and tried to mask it. As said above by @KwiceroLTD
    2. Your VPS was hacked into and was abused.

    To add onto 1, what reasons would the host have to lie about that anyways? They lose a customer that way.

  • Lee said: Sounding more legit with every post.

    Whats wrong with that.... Hosts here trust unknown (minor) people from unknown origins to manage and support their nodes. What is wrong with letting a friend access your server if you trust him/her

  • 4n0nx4n0nx Member

    Infinity580 said: No, you as the owner go to jail because you had your car unlocked.

    But it depends in which country you live in.

    WTF :D what a horrible country you must live in

  • @ez2uk said:
    Whats wrong with that.... Hosts here trust unknown (minor) people from unknown origins to manage and support their nodes.

    I am sure no host would trust unknown people. Certainly there is proper recruitment and screening process, like going through their CV and testing them with lower responsibility tasks.

    @ez2uk said:
    What is wrong with letting a friend access your server if you trust him/her

    Nothing wrong of course, but if the friend launches attacks using the VPS then you are the one to answer the provider. You and your friend relationship will be your own business, not the provider's.

  • MisterHost_NET said: I have sent you an email and informed you with all the LOGS.

    I have displayed 100 % of the email i got from you in this thread.In that email it does not mention the

    Image and video hosting by TinyPic

    Thanked by 1KwiceroLTD
  • KwiceroLTD said: Not smart entering your password there.

    I always set a different root password in all of my VPSes.So its no biggie if anyone got the password i entered there :)

  • PremiumN said: you would really trust that website to tell you how secure your password is?

    Well,I got to know about that website from here(LET) :) http://lowendtalk.com/search?Search=howsecureismypassword

  • XFS_DukeXFS_Duke Member
    edited April 2015
  • rahulksrahulks Member
    edited April 2015

    jvnadr said: As of activity on LET, again: LET IS NOT A HELPDESK

    I know but see Image and video hosting by TinyPic

    Even a pre-sales ticket gets answered quicker..... @MisterHost_NET had time to reply to my thread on LET. shouldn't he have answered the ticket before replying in this thread
    Image and video hosting by TinyPic

  • rahulksrahulks Member
    edited April 2015

    @XFS_Duke said:

    was your password aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa Image and video hosting by TinyPic

    :P

  • Lee said: Sounding more legit with every post.

    You dont believe me? I can give you my friend's skype name or phone number.Just Inboxme. :)

  • Bruce said: logged in to the VPS as root

    nice!

    I let him do that because i trust him very much.I was the one who teached him how to use a Linux VPS to manage ts3 voice server and samp game server.So i have full faith in him.

  • tomsfarmtomsfarm Member
    edited April 2015

    The logs you provided is a email that OVHs auto abuse system sends out. the Host can then investigate it. How ever the type of traffic on that list is similar to what we have seen in the past when using OVH for our vps clients. when a OS is insecure bots can break in and run the same type of attack you had.

    So how is the hosting doing anything wrong your VPS was broken into or was used for sending outbound DDoS if intentional or not. It's still the OPs fault for not taking care of his VPS better.

  • All of us here are saying to you that YOU are wrong. Maybe YOU did the DDoSing. Nothing proves that you didn't. Even if you didn't, you should secure your server.
    You just used a password for root. This is a big mistake! You should not give FOR ANY REASON root access to anybody, you SHOULD NOT USE IT YOURSELF.
    You should only use ssh-key, completely disable root login (you gave root access to a third party!!!), install csf/fail2ban etc., use 2 factor auth, scan the software for holes (teamviewer has been compromised a lot of times). And you should MONITOR 24/7 your server, NOT ANSWERING A CLAIM FOR DDOS AFTER 7 DAYS!!!!

    What else should we tell you to understand that it was your mistake? You asked for help here and ten's of people gave it to you, informing you that you are faulty here, not your provider.

Sign In or Register to comment.