lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
From: andrewp at IRW.co.uk (Andrew Poodle)
Subject: Counteroffensive help on bruteforce attacks on SSHD

Hullo the list..

I have a box at home, running fedora core 1, behind a router, which I
use for serving some dev webpages, and some other miscelaneous stuff..

I'm seeing lots of ssh login attempts with user=root from two or three
IP addresses, after I blocked access at the firewall based on host.

Can anyone point me at some good resources where I can bone up and learn
more about counter-measures....  I'm not looking to take this guy out
(although would'nt be a bad thing).. But would be interesting to find
out more.

tia

a

This document should only be read by those persons to whom it is addressed and is not intended to be relied upon by any person without subsequent written confirmation of its contents. 
Accordingly  IRW  Solutions Group Ltd  disclaim all responsibility and accept no liability (including in negligence) for the consequences for any person acting, or refraining from acting, on such information prior to the receipt by those persons of subsequent written confirmation. 

If you have received this e-mail message in error, please notify us immediately. 
Please also destroy and delete the message from your computer. 

Any form of reproduction, dissemination, copying, disclosure, modification, distribution and/or publication of this e-mail message is strictly prohibited.


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ