Got an nmap scan from my server cause someone was trying to brute force the SSH password

Got an nmap scan from my server cause someone was trying to brute force the SSH password.

Browsed to their IP and it's a QNAP NAS box with default admin password.

Seems to be some Russian family in Massachusetts, but there is a lot of random stuff on here.

What should I do?

Other urls found in this thread:

96.230.105.224:8080/cgi-bin/
twitter.com/NSFWRedditImage

Create an inconspicuous read only user accout and share it here along with IP

Dont be fagget op let us see the Russian pussy

delete everything. literally overwrite the entire hard drive including the OS/bootloader

fill the whole harddrive with cp

This. But don't forget to share some goodies with us first

open OHSHIT

trips of truth

this

dump some cheese pizza on there

Fucking do this. Right now.
Serves them right.

write a program that takes control of the fans and shuts them off then overheat the CPU

It probably wasn't them, they likely got some malware and now they're in a botnet. Don't be a dick.

I'm trying to be stealthy. Hasn't stopped about 20 other people connecting via SSH...

then do and still delete the malware

well then make a copy of / and upload it somewhere

Delete everything.

search for some pictures, photoshop nicolas cage in them then place them back

find out if there is a microphone attached to it if it is then turn it on and listen

Pls do this

What's the meaning of this computer jargon?
Stupidfag here

open home

Soon. 5 mins...

?

96.230.105.224:8080/cgi-bin/
user: privet
pass:privet

- turn on the speakers at maximum volume
- fart in a Russian manner, way loudly
- wait milliseconds until the entire fart audio data goes wrecking their speakers
- ...
- profit !!

anyone tried this?

404

remove the cgi-bin bit

>96.230.105.224:8080/cgi-bin/
works well
all the files are there, but it's only bullshit, at least I didn't see anything interesting

I already erased the "interesting" ones.

What os is that bro

some storage box you keeps files on

it's the NAS interface

Like what?

Anyone horny?

Post wins fgt.

which fgt is from Barmundu, Queensland?

You know that IP is probably a redirect spoof right?

what is that? go back to Sup Forums

please give me the set

It means you probably "broke" into someones' NAS that had zero to do with those brute force attempts.

FYI those QNAS's run a 3.1X kernel with a full GNU Utilities and busybox toolkit. You should be able to SSH into it.

My IP shows that location

Kek, Russian woman

>Got an nmap scan from my server cause someone was trying to brute force the SSH password.

>Browsed to their IP and it's a QNAP NAS box with default admin password.

ah

No, definitely the right IP. Like I said, there were a huge amount of SSH connections as admin. File system is probably littered with connections to botnets.

If you know the admin password you can gain root access to it (they're the same if I recall). So go do it fgt.

Let's see what he's doing in there, if it actually is him doing it. Sounds like he's just a zombie NAS though.

if you get into it can you put this picture on it for me.

how can i see webcam on this???