Howdy, Stranger!

It looks like you're new here. If you want to get involved, click one of these buttons!

Advertise on LowEndTalk.com
installserveros.com
New on LowEndTalk? Please read our 'Community Rules' by clicking on it in the right menu!

installserveros.com

Has anyone tried installing OS via http://installserveros.com/ ?

Thanked by 1agentmishra

Comments

  • agentmishraagentmishra Member, Provider

    seems promissing, only worry is they should not create troubles with your password.

    i did a reinstall just yesterday, will surely try in future

    skype id : agentmishra, gtalk id : agentmishra, email : [email protected]

  • agentmishraagentmishra Member, Provider

    @ultimatehostings said:
    Did it work?

    i mentioned, i did a reinstall just yesterday, will surely try in future

    explainaiton : i didnot install via this link, will try this install in future and will update you.

    skype id : agentmishra, gtalk id : agentmishra, email : [email protected]

  • Sure, keep posted.

  • agentmishraagentmishra Member, Provider

    @ultimatehostings said:
    Sure, keep posted.

    will do that :)

    skype id : agentmishra, gtalk id : agentmishra, email : [email protected]

  • We will find out here shortly, I'm testing it on a spare VPS that I have.

  • I'm testing it now. :)

    I'm Good!

  • Uh hum... Seems like a no go.. The website just timed out.

  • @skybucks100 said:

    Maybe does not work with a VPS I guess, needs to have a active system in rescue mode.

  • Stole your password hahaha, one has to be pretty gullible to enter any details into that site..

    Thanked by 1Mark_R
  • @ATHK said:
    Stole your password hahaha, one has to be pretty gullible to enter any details into that site..

    VPS that has no use and don't plan on keeping? Having the password set to "password"? They sure stole that VPS from me!

  • Why yes i will give SSH access to some random website on the internet that surely will not cause my VPS to be a spam relay or a source for DDoS attacks

    Thanked by 1Mark_R

    Contractually bound by a verbal non-disclosure agreement

  • BrianHarrisonBrianHarrison Member, Provider

    "Please note, this system is in beta and may not always work correctly."

    Haha! Probably not going to trust this service with any OS reloads...

    I have no idea how this service would work... far too many variants between different servers.

    I have a feeling that if something like this were possible, a large company like Cisco would have already deployed a solution. There would be big money in being able to re-provision servers remotely via SSH alone.

    Reprise Hosting (AS62838) Intel Xeon L5520, 1TB SATA, 4GB RAM, 10TB BW, $27/mo with DED10 promo! Cheap dedicated servers.

    VPSHostingDeal.com - Low-cost self-managed OpenVZ + Xen cheap VPS hosting. Plans starting at $12 PER YEAR! Cheap VPS.

  • cool idea

  • Yeah, that is a neat idea.

    Although no way in hell I would trust this.

  • I guess this only works with KVM servers?

  • GunterGunter Member
    edited October 2013

    Do you know what would be cool to see?

    Let's enter in the details of a Kippo honeypot, and log every single action taken within the honeypot. As simple as spinning up a 3 day DigitalOcean and sitting back.

    we can see what they really do.

  • c0yc0y Member

    Looks like shameless self advertising and the OP owning the site...

  • is this how the guy from Silk Road web site got caught ... trying to reinstall his OS? JOKE

  • @skybucks100 said:
    VPS that has no use and don't plan on keeping? Having the password set to "password"? They sure stole that VPS from me!

    Yep either way your a completely smart aren't you!

    Next time at least way up the consciences first...

  • BlazeMuisBlazeMuis Member
    edited October 2013

    This is all it does:

    [kippo.core.honeypot.HoneyPotSSHFactory] New connection: 209.239.114.79:50257 (xx.xxx.xx.xx:22)

    [HoneyPotTransport,2,209.239.114.79] connection lost

    After that i get to see a page saying the following: Login Failed!
    Please verify that the server is reachable in recovery mode and that the root password you've defined is correct.

    Thanked by 1perennate
  • @Frost said:
    Looks like shameless self advertising and the OP owning the site...

    I don't own that site nor I'm shamelessly advertising it. I just found it.

  • @ATHK said:

    Sorry? It was a VPS that I hadn't been using, with no files on it (just bare CentOS), the password was "password", and I had no intentions on keeping it.. What are the consciences exactly?

  • @doughnet said:
    is this how the guy from Silk Road web site got caught ... trying to reinstall his OS? JOKE

    I don't understand this joke.

  • @awson said:

    I think the joke is the owner of the silk road entered his info into the website, and the government got his info therefor busting him.

  • @awson said:

    IDK I just told you about silk road.

  • aye was a dumb joke, my bad ... referencing putting information public.

  • seriesnseriesn Member, Provider

    @BrianHarrison said:
    "Please note, this system is in beta and may not always work correctly."

    Haha! Probably not going to trust this service with any OS reloads...

    I have no idea how this service would work... far too many variants between different servers.

    I have a feeling that if something like this were possible, a large company like Cisco would have already deployed a solution. There would be big money in being able to re-provision servers remotely via SSH alone.

    Noc-Pc pretty much does it.

  • @joodle said:
    This is all it does:

    [kippo.core.honeypot.HoneyPotSSHFactory] New connection: 209.239.114.79:50257 (xx.xxx.xx.xx:22)

    [HoneyPotTransport,2,209.239.114.79] connection lost

    After that i get to see a page saying the following: Login Failed!
    Please verify that the server is reachable in recovery mode and that the root password you've defined is correct.

    Keep it open and see if you get any intruders in the meantime.

  • I'd recommend editing OP and adding a warning so that people don't go blindly charging in and as a result get hacked. I know, you'd have to be pretty stupid to enter your details there. Just an idea.

    This signature wasted 121 bytes of your data allocation.

    https://nixstats.com/report/56b53d6465689e44598b4567

  • I tried out the site on a temporary DigitalOcean droplet. It installs Postfix and then stalls.

    Very fishy.

  • @agentmishra said:
    seems promissing, only worry is they should not create troubles with your password.

    i did a reinstall just yesterday, will surely try in future

    We don't store the password you provide to start the installation. Even if we did, the server MUST be in recovery mode, not production. The password we generate for the new OS, should be changed immediately (obviously).

    The password that the site generates for the new installation is stored. It is stored for troubleshooting should something go wrong (and it can be fixed). As I said above, this password should be changed immediately.

  • This site is far too difficult to make large numbers of comments, so I will just reply here. Not sure if any of you will actually see it (I just joined to chime in).

    As I said in the comment above:
    We don't store the password you provide to start the installation. Even if we did, the server MUST be in recovery mode, not production. The password we generate for the new OS, should be changed immediately (obviously).

    The password that the site generates for the new installation is stored. It is stored for troubleshooting should something go wrong (and it can be fixed). As I said above, this password should be changed immediately.

    If you are sneaky, all of the "code" is easily attainable. Although, it's jusst some scripts similar to what is found here: http://diehoch.net/?p=50
    Some kickstart/preseed files, and the post install scripts that allow for things like ProxMox and Asterisk to be installed, as well as a few security/optimization related items. In fact, some of these installations leave behind logs (because I'm lazy sometimes [yes, we is just me]).

    Anyway, it's there if you want to use it. I just checked, and since about last August the site has run installations on 539 distinct servers, for a total of 2106 installations. Please keep in mind:
    This is a personal project of mine
    This is in beta, and may not always work
    I already have a job taking care of many thousands of server, I don't want anymore

    Like I said, take it or leave it. It does work well if you follow the directions (most people don't). The PHYSICAL server (not vServer/VPS KVM/XEN/ProxMox/Virtuozzo/ESXi/PCS VM/VPS/container/slice) must be booted to recovery mode, the block devices (hard drives) MUST be unmounted, the server must have an actual (no NAT) IPv4 IP address and be running SSH on port 22, with a known root password.

    The installations started by destroying the partition tables and associated metadata, then repartition, download "netinstall" images, dd to HDD, install GRUB with some hints for the network installation to start (IP/Netmask/Gateway/NS/MAC/[kickstart|preseed] location. The installation runs, sometimes there is a no-reboot post-install, sometimes the server reboots then runs the post install; some times both (ProxMox).

    Anyway, hope this clears things up. If you have further questions, please feel free to contact us on reddit.com/r/installserveros.com

    PS It's late and I'm writing for too long, please forgive any mis-spellings/grammatical errors.

  • I wouldn't be suprised if it installs a backdoor right with it.

  • @Mark_R said:
    I wouldn't be suprised if it installs a backdoor right with it.

    Feel free to take a look. My word clearly isn't enough.. :P

    The site exists for those who need some OS their server provider doesn't offer. If you need the OS, try it, run rkhunter, "watch netstat -plant", tcpdump, port mirror+wireshark, etc. If you like it, keep it, if not, install the OS you don't need from your service provider.

    These Ad hominem comments of "It sounds good and even though I've never tried it, it's clearly some sort of trap!" are really kind of ridiculous.

    If you've used the site and found a problem, PLEASE let me know. If you haven't, then your really have nothing to say. To use the site would at worst cause, what? ~30 minutes of nastiness, then your reboot and reinstall from a "trusted" source.

    I've had some VERY picky people install my OSs, spouting the same "ooh, it must be a virus!" BS.. No one has managed to find 1 problem, other than they don't like the partitioning, or too many/not enough packages installed, or what have you.

Sign In or Register to comment.