From: shane@aplv.com
Date: Sat Jun 03 2006 - 05:44:59 EDT
I agree with Morning Wood 100% .... Running sshd on port 22 anymore in
this day
and age is really not a smart decision, as you WILL be subject to these script
kiddies' scanners.
It has become as rampant as netbios, and other very common windows
vulnerability
scans in my opinion.
I was also hit with a very hard brute force attack on several of our
ssh servers
about a year ago, and immediately moved ssh to a bizarre port, and setup an IP
specific allow policy at my firewall. I have not been a victim of
another brute
force yet.
Again, as Morning Wood stated, this will not make the connection 100%
secure, as
someone in your IP allow list can still try and brute force your
sshd, but this
helps immensely..
Good luck to you.
Shane
oc192 security
Quoting Morning Wood <se_cur_ity@hotmail.com>:
>>
>> Hey... just a question - is there some new expoit for SSH, or some new
>> script? My SSHd is getting HAMMERED today, starting about an hour
>> ago.... this is nuts! I currently have 10+ script-kiddieZ banging away
>> at one of my SSHd boxes... (which is up to date, mind you).
>
> <begin suggestion>
> very common, did you just start running a sshd or just now bothered to look
> at the logs?
> suggest employing wide reaching ip deny rules ( or a few explicit allow
> rules ).
> another idea is to just move your sshd off of port 22, this will cut down on
> all but dedicated
> ( read genuine ) attempts to brute your sshd.
>
> </end suggestion>
>
> M.W
>
> ------------------------------------------------------------------------------
> This List Sponsored by: Cenzic
>
> Concerned about Web Application Security?
> Why not go with the #1 solution - Cenzic, the only one to win the Analyst's
> Choice Award from eWeek. As attacks through web applications continue
> to rise,
> you need to proactively protect your applications from hackers.
> Cenzic has the
> most comprehensive solutions to meet your application security penetration
> testing and vulnerability management needs. You have an option to go with a
> managed service (Cenzic ClickToSecure) or an enterprise software
> (Cenzic Hailstorm). Download FREE whitepaper on how a managed service can
> help you: http://www.cenzic.com/news_events/wpappsec.php
> And, now for a limited time we can do a FREE audit for you to confirm your
> results from other product. Contact us at request@cenzic.com for details.
> ------------------------------------------------------------------------------
>
>
> !DSPAM:4481062b252842232925149!
>
>
----------------------------------------------------------------
This message was sent using IMP, the Internet Messaging Program.
------------------------------------------------------------------------------
This List Sponsored by: Cenzic
Concerned about Web Application Security?
Why not go with the #1 solution - Cenzic, the only one to win the Analyst's
Choice Award from eWeek. As attacks through web applications continue to rise,
you need to proactively protect your applications from hackers. Cenzic has the
most comprehensive solutions to meet your application security penetration
testing and vulnerability management needs. You have an option to go with a
managed service (Cenzic ClickToSecure) or an enterprise software
(Cenzic Hailstorm). Download FREE whitepaper on how a managed service can
help you: http://www.cenzic.com/news_events/wpappsec.php
And, now for a limited time we can do a FREE audit for you to confirm your
results from other product. Contact us at request@cenzic.com for details.
------------------------------------------------------------------------------
This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:56:02 EDT