Network Security Internet Technology Development Database Servers Mobile Phone Android Software Apple Software Computer Software News IT Information

In addition to Weibo, there is also WeChat

Please pay attention

WeChat public account

Shulou

Linux-Centos7 system boot, login control and weak password

2025-02-25 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Servers >

Share

Shulou(Shulou.com)06/03 Report--

I. grub menu login control

In the Internet environment, most servers are managed by remote login, while the local boot and terminal login process are easy to be ignored, leaving security risks. Especially when the environment of the computer room where the server is located is lack of strict and safe control system, how to prevent the unauthorized intervention of other users has become a problem that must be paid attention to.

It is not safe for us to press ESC to go directly to the grub menu to change, so we have to set a user and password that can only be changed if we know these.

1. Back up first to prevent us from failing.

two。 To set the user and password in the configuration file

3. Rebuild the grub menu

4. Check to see if it works.

two。 Weak password detection

In an Internet environment, an overly simple password is the biggest risk to the server. Even though everyone knows the setting.

A longer and more complex password will be more secure, but there will always be some users who want convenience and adopt something simple and easy to remember.

Password string. For any administrator who is responsible for security, it is necessary to find out these weak password accounts in time.

This facilitates further security measures (such as reminding the user to reset a more secure password).

John the Ripper is an open source password cracking tool that can quickly analyze and identify known ciphertext.

The password string of the text, which supports DES, MD5 and other encryption algorithms, and allows the use of password dictionaries (including various password groups

List file) to carry out brute force cracking. By using John the Ripper, you can detect Linux/UNIX systems

The password strength of the user account.

1. Download and install John the Ripper

two。 We make it into a script file.

3. Compile

4. Analyze our users' accounts and passwords through dictionaries

Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.

Views: 0

*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.

Share To

Servers

Wechat

© 2024 shulou.com SLNews company. All rights reserved.

12
Report