INTRODUCTION
During 2005, bute force attacks on the ssh (secure shell) service became pretty popular. These attacks are based on a rather simple idea: use an automated program for trying, one after the other, many combinations of standard or frequently used account names and likewise frequently used password (e.g.: guest/guest).
DEFENCE METHODS
There are a number of methods to defend against such brute force attacks. The following list is intended to give an overview of them, and briefly mention their respective advantages and disadvantages.
Mike Qaissaunee, a Professor of Engineering and Technology at Brookdale Community College in Lincroft, New Jersey, shares his experiences and perspectives on integrating new technologies in and approaches to teaching and learning. ~ Subscribe to this Blog
Wednesday, February 15, 2012
Defending Brute Force SSH Attacks
Rainer Wichmann gives a nice rundown on Defending against brute force ssh attacks:
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment