|
|
Subscribe / Log in / New account

One method- Distributed brute force ssh attacks

One method- Distributed brute force ssh attacks

Posted Oct 22, 2009 17:52 UTC (Thu) by dlapine (guest, #7358)
In reply to: Distributed brute force ssh attacks by mosfet
Parent article: Distributed brute force ssh attacks

Simple enough- setup 1 extra machine that is exposed to the same environment as the machines you'd like to protect, but allow no user logins. Configure the box to track all attempts to log in. Voila- all ip's you capture are bogus (save for the occasional user typo) and can be blocked on your other nodes. Yes, with a large enough botnet pool, every attempt on separate nodes in your network could be done with unique bot, but I don't think the hack has advanced that far as of yet.

Even better, combine this with mosfet's suggestion, and move all the "real" nodes to port other than the standard ssh ones.


to post comments


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds