TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

What SSH brute force attackers do after they get in to your server

3 点作者 dirtyaura超过 9 年前

1 comment

ChuckMcM超过 9 年前
one of the things you can do (and I did) is to mess with brute forcers by sending a malformed response packet to the password attempt. Basically my goal was to crash their ssh client using a buffer overflow exploit. So on my honeypot when I got an SSH attempt I sent back a response packet that I morphed each time in an attempt to genetically engineer a killer packet. In my case the clients always seemed to make 5 requests in a row. So I used the time between the previous request and the current request as a fitness function for my genetic mutations. (longer delays was a better mutation). I eventually got them to stop after one request with a response that was a bit over 9K in length. After that worked I got a giant DDoS attack sent my way so I figured it was 'message recieved' :-). These days I just put ssh on a different port and fail2ban IPs (simpler and doesn't poke the troll :-)
评论 #10217557 未加载