Showing posts with label attacks. Show all posts
Showing posts with label attacks. Show all posts

Wednesday, March 14, 2012

24 Hours of SSH Attacks Against a Single Server

Visualised: 24 hours of SSH attacks against a single server from Kura M on Vimeo.

syslog » Visualised: 24 hours of SSH attacks against a single server:

24 hours of SSH attacks against a single server, visualised on a world map using Python.

When a country stays lit up for more than 1 tick of the clock in the left hand corner it means that multiple attacks are happening from different IP addresses. An attacker is banned after;

  • 1 failed root login,
  • 3 failed user logins (including invalid users) and
  • 3 failed system logins.

 

Wednesday, February 15, 2012

Defending Brute Force SSH Attacks

Rainer Wichmann gives a nice rundown on Defending against brute force ssh attacks:

INTRODUCTION

During 2005, bute force attacks on the ssh (secure shell) service became pretty popular. These attacks are based on a rather simple idea: use an automated program for trying, one after the other, many combinations of standard or frequently used account names and likewise frequently used password (e.g.: guest/guest).

DEFENCE METHODS

There are a number of methods to defend against such brute force attacks. The following list is intended to give an overview of them, and briefly mention their respective advantages and disadvantages.

Wednesday, November 30, 2011

Nice Overview of Network Attacks

From Deb Shinder Network Encroachment Methodologies:

In this article, we will go over several of the more common network encroachment and attack methods that can be used alone, or in conjunction with each other or with additional attacks to compromise a network.

Introduction

There are a number of methods that persons wishing to circumvent your network security can use in order to gain access to information. In order to protect against them, it’s important for you to understand what each is, how they work, and the threats that they present for your network. While not comprehensive, here is a list of some of the more common methods used by intruders and attackers:

  • Snooping
  • Spoofing
  • Password Compromise
  • Denial of Service Attacks
  • Man in the Middle Attacks
  • Application Level Attacks
  • Key Compromise

Monday, December 20, 2010

The 10 Most Destructive Hacker Attacks In The Past 25 Years

With the recent wikileaks-related DoS and DDoS attacks, here a great rundown of hacker attacks from the last 25 years. Alsom, here's a great rundown of the Wikileaks attacks from Sam Bowne.

The 10 Most Destructive Hacker Attacks In The Past 25 Years:

The Daily Beast runs through 10 of the most infamous hacks, worms, and DDoS takedowns in the last 25 years, from an computer virus named for a stripper to the mysterious 102nd caller at Los Angeles’s KIIS-FM.

LinkWithin

Related Posts Plugin for WordPress, Blogger...