Re: Some new SSH exploit script?

Morning Wood wrote:

I beg to differ with you -- running a standard service on a non-standard
port is a bid for security through obscurity.

This wasnt implied as a full stop measure, but security through obscurity
coupled with other protections can enhance the overal security posture.
( not to mention stopping 99.9% of unauthorized traffic )

I don't see what the net effect is. You'll still see unauthorized connection
attempts by ankle-biters on port 22. If your implementation is vulnerable,
running a service on a non-standard port offers little-to-no protection.

The number of TCP ports is very small, and the number of potential source
computers for a lazy and quiet scan to determine what service you're
running SSHD on is large. Are you going to change the service port on
a daily basis? Hourly?

This List Sponsored by: Cenzic

Concerned about Web Application Security? Why not go with the #1 solution - Cenzic, the only one to win the Analyst's Choice Award from eWeek. As attacks through web applications continue to rise, you need to proactively protect your applications from hackers. Cenzic has the most comprehensive solutions to meet your application security penetration testing and vulnerability management needs. You have an option to go with a managed service (Cenzic ClickToSecure) or an enterprise software (Cenzic Hailstorm). Download FREE whitepaper on how a managed service can help you: And, now for a limited time we can do a FREE audit for you to confirm your results from other product. Contact us at request@xxxxxxxxxx for details.