From: Jurriaans, Marco (M.Jurriaans@imd.nl)
Date: Mon Jun 05 2006 - 14:21:21 EDT
Indeed, fail2ban blocks the scanning ipadress after a specified number.
=
What you could also do is setup something like portknocking. If a =
pre-defined sequence of ports are 'scanned', a script can be called =
which opens port22...
For more info on portknocking, see http://portknocking.sourceforge.net/
=
or http://www.portknocking.org/
rgrds,
Marco Jurriaans
-----Original Message-----
From: Jarrod Frates [mailto:jfrates.ml@gmail.com]
Sent: Mon 5-6-2006 17:56
To: pen-test@securityfocus.com
Subject: Re: Re: Some new SSH exploit script?
On 4 Jun 2006 00:04:15 -0000, anony@mouse.com <anony@mouse.com> wrote:
> I strongly disagree with changing the port sshd listens on to "solve"
this attack. It is completely unnecessary.
I've found some success with Fail2Ban, which adds in iptables rules
after a specified number of bad attempts, and I monitor the reports
for repetitive IP addresses or blocks, adding them to a permanent ban
list. The number of failures per day decreased from 20K+ to under 50.
Jarrod
------------------------------------------------------------------------------
This List Sponsored by: Cenzic
Concerned about Web Application Security?
Why not go with the #1 solution - Cenzic, the only one to win the Analyst's
Choice Award from eWeek. As attacks through web applications continue to rise,
you need to proactively protect your applications from hackers. Cenzic has the
most comprehensive solutions to meet your application security penetration
testing and vulnerability management needs. You have an option to go with a
managed service (Cenzic ClickToSecure) or an enterprise software
(Cenzic Hailstorm). Download FREE whitepaper on how a managed service can
help you: http://www.cenzic.com/news_events/wpappsec.php
And, now for a limited time we can do a FREE audit for you to confirm your
results from other product. Contact us at request@cenzic.com for details.
------------------------------------------------------------------------------
This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:56:02 EDT