Re: shutting down dictionary attacks

From: Nathan Jackson (c.cured_at_gmail.com)
Date: 07/06/05

  • Next message: apacheroot_at_web.de: "Re: shutting down dictionary attacks"
    Date: Wed, 6 Jul 2005 13:27:15 +0200
    To: secureshell@securityfocus.com, LD <ldbugs@hawaii.rr.com>
    
    

    It would also be useful to run the daemon on a different port than 22.
    This will probably throw 90% of the people scanning for ssh servers
    off the scent.
    You can easily NAPT it at the external firewall and leave internal
    access the same.

    Just my 2 cents.....

    Nathan


  • Next message: apacheroot_at_web.de: "Re: shutting down dictionary attacks"

    Relevant Pages

    • [TOOL] WeBrute - Directory Brute Forcer
      ... Get your security news from a reliable source. ... # Scan 127.0.0.1 port 80, Use wordlist and admin as start path ... # Scan 127.0.0.1 port 80, Use wordlist, and traverse scanning and verbose ... sub catchInterrupt { ...
      (Securiteam)
    • Re: Legal? Road Runner proactive scanning.
      ... Also makes me think that their port scanning is no different than anyone ... > Attend a course taught by an expert instructor with years of ... Attend a course taught by an expert instructor with years of ...
      (Security-Basics)
    • [REVS] Host Fingerprinting and Firewalking With hping
      ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... by sending several packets to the remote machine and reviewing ... good job in scanning and guessing the remote operating system. ... Service port fingerprinting and OS fingerprinting in certain fire walled ...
      (Securiteam)
    • Re: monitoring traffic on a port?
      ... > application or daemon that's listening to the port. ... > You could also start looking at external network monitoring hardware to ...
      (comp.sys.sun.misc)
    • Re: monitoring traffic on a port?
      ... > application or daemon that's listening to the port. ... > You could also start looking at external network monitoring hardware to ...
      (comp.unix.solaris)