Penetration Testing mailing list archives
FW: Some new SSH exploit script?
From: Art Cooper <acooper () innerwall com>
Date: Thu, 08 Jun 2006 16:50:40 -0600
I agree about ³killing² any inbound traffic from the APNIC IP space. For any of you who may not know (newbies) the APNIC is the Asia Pacific Network Information Center and can be reached at: http://www.apnic.net That organization is attempting to keep a ³handle² on the Asia-Pacific IP Space, but unfortunately, time-after-time APNIC space is used to launch attacks. At one time, I was working for Harris Corporation, and I was managing the network of a large US Air Force installation. This was during the early days of ³SNORT². The amount of ³crapola² coming out of the APNIC IP Space was unbelievable. Once I set up a SNORT system and was able to pinpoint it, I received permission from the Base Commander to BLOCK all of the APNIC space at least ³inbound² anyway. At one time, I think APNIC IP Space was responsible for more than 65% of the ³Internet NOISE² out there at any given time. Take a look at the Internet Storm Center over at SANS and you¹ll see what I mean: http://isc.sans.org I hate to ³pick on² the APNIC, but most of the ³government-Sponsored² hacking comes out of that region unfortunately. All we can do in the rest of the world is be aware of it and take appropriate measures. Best Regards, Coop Arthur B. Cooper Jr. ³COOP² Innerwall, Senior Network Engineer Office: (719) 264-2737Email: acooper () innerwall com 2060 Briargate Parkway, Suite 339, Colorado Springs, CO 80920 Website: http://www.innerwall.com From: "Adam.Chesnutt" <icetre () digitalfreezer net> Date: Tue, 06 Jun 2006 20:51:31 -0400 To: Jarrod Frates <jfrates.ml () gmail com> Cc: <pen-test () securityfocus com> Subject: Re: Some new SSH exploit script? All, Similarly, I have a large number of hacktards trying to login as root on my servers. I also have no need for apnic space to talk to my servers, most of my legitimate requests come from the US. As such, I have a script that I wrote that I call killapnic, that goes out to the web, retrieves the apnic space and ipfw's all of it. I have had great success with this. While it doesn't stop the local hackers, it does stop 95% of the cruft that comes my way. I suppose if I could adapt my script to do both this, and nailing out 3 bad attempts from x ip. This seems trivial. Adam
On 4 Jun 2006 00:04:15 -0000, anony () mouse com <anony () mouse com> wrote:I strongly disagree with changing the port sshd listens on to "solve" this attack. It is completely unnecessary.I've found some success with Fail2Ban, which adds in iptables rules after a specified number of bad attempts, and I monitor the reports for repetitive IP addresses or blocks, adding them to a permanent ban list. The number of failures per day decreased from 20K+ to under 50. Jarrod ------------------------------------------------------------------------------ This List Sponsored by: Cenzic Concerned about Web Application Security? Why not go with the #1 solution - Cenzic, the only one to win the Analyst's Choice Award from eWeek. As attacks through web applications continue to rise, you need to proactively protect your applications from hackers. Cenzic has the most comprehensive solutions to meet your application security penetration testing and vulnerability management needs. You have an option to go with a managed service (Cenzic ClickToSecure) or an enterprise software (Cenzic Hailstorm). Download FREE whitepaper on how a managed service can help you: http://www.cenzic.com/news_events/wpappsec.php And, now for a limited time we can do a FREE audit for you to confirm your results from other product. Contact us at request () cenzic com for details. ------------------------------------------------------------------------------
---------------------------------------------------------------------------- -- This List Sponsored by: Cenzic Concerned about Web Application Security? Why not go with the #1 solution - Cenzic, the only one to win the Analyst's Choice Award from eWeek. As attacks through web applications continue to rise, you need to proactively protect your applications from hackers. Cenzic has the most comprehensive solutions to meet your application security penetration testing and vulnerability management needs. You have an option to go with a managed service (Cenzic ClickToSecure) or an enterprise software (Cenzic Hailstorm). Download FREE whitepaper on how a managed service can help you: http://www.cenzic.com/news_events/wpappsec.php And, now for a limited time we can do a FREE audit for you to confirm your results from other product. Contact us at request () cenzic com for details. ---------------------------------------------------------------------------- -- ------ End of Forwarded Message ------------------------------------------------------------------------------ This List Sponsored by: Cenzic Concerned about Web Application Security? Why not go with the #1 solution - Cenzic, the only one to win the Analyst's Choice Award from eWeek. As attacks through web applications continue to rise, you need to proactively protect your applications from hackers. Cenzic has the most comprehensive solutions to meet your application security penetration testing and vulnerability management needs. You have an option to go with a managed service (Cenzic ClickToSecure) or an enterprise software (Cenzic Hailstorm). Download FREE whitepaper on how a managed service can help you: http://www.cenzic.com/news_events/wpappsec.php And, now for a limited time we can do a FREE audit for you to confirm your results from other product. Contact us at request () cenzic com for details. ------------------------------------------------------------------------------
Current thread:
- RE: Unix auditing tools - Windows based., (continued)
- RE: Unix auditing tools - Windows based. Meidinger Chris (Jun 08)
- RE: Unix auditing tools - Windows based. Serge Vondandamo (Jun 08)
- Re: Unix auditing tools - Windows based. Sol Invictus (Jun 09)
- Re: Unix auditing tools - Windows based. Micha Borrmann (Jun 08)
- RE: Some new SSH exploit script? David M. Zendzian (Jun 06)
- Re: Some new SSH exploit script? Paul Barrette (Jun 08)
- Re: Some new SSH exploit script? Adam.Chesnutt (Jun 09)
- Re: Some new SSH exploit script? Dotzero (Jun 09)
- Re: Some new SSH exploit script? Christine Kronberg (Jun 10)
- Re: Some new SSH exploit script? Paul Barrette (Jun 08)
- Re: Some new SSH exploit script? Art Cooper (Jun 09)