Penetration Testing mailing list archives
Re: Some new SSH exploit script?
From: Dotzero <dotzero () gmail com>
Date: Fri, 9 Jun 2006 13:59:20 -0400
On 6/9/06, Adam.Chesnutt <icetre () digitalfreezer net> wrote:
You see, rather than do all this, I think it's much much smarter to turn over the logs more, and write a script that outputs the log - without the script kiddies if it really bothers you. You could make the script also write a report and call it 'lame ssh hacktards' or something and contain only ip, username and number of attempts..
Turning over the logs more doesn't reduce the overall volume of logs, it simply reduces the size of any individual log. Outputting the log while removing entries is an absolute no-no in environments (At least all the ones I can think of that I deal with) involving compliance requirements. For example, you are required to keep audit/access logs (including failures) for 3 months online and 12 months offline (15 months total). This would of course include SSH attempts to the PCI covered environment. I see nothing wrong if someone changes the port to a non-standard one if they aren't calling it a "security control". If it is reducing background noise or size of files, etc. then if it works for the individual/company then more power to them. There is always more ways than one to skin a cat. As usual, just my 2 cents. ------------------------------------------------------------------------------ This List Sponsored by: CenzicConcerned about Web Application Security? Why not go with the #1 solution - Cenzic, the only one to win the Analyst's Choice Award from eWeek. As attacks through web applications continue to rise, you need to proactively protect your applications from hackers. Cenzic has the most comprehensive solutions to meet your application security penetration testing and vulnerability management needs. You have an option to go with a managed service (Cenzic ClickToSecure) or an enterprise software (Cenzic Hailstorm). Download FREE whitepaper on how a managed service can help you: http://www.cenzic.com/news_events/wpappsec.php And, now for a limited time we can do a FREE audit for you to confirm your results from other product. Contact us at request () cenzic com for details.
------------------------------------------------------------------------------
Current thread:
- Re: Some new SSH exploit script?, (continued)
- Re: Some new SSH exploit script? litch (Jun 07)
- Unix auditing tools - Windows based. Serge Vondandamo (Jun 08)
- Re: Unix auditing tools - Windows based. Sol Invictus (Jun 08)
- RE: Unix auditing tools - Windows based. Meidinger Chris (Jun 08)
- RE: Unix auditing tools - Windows based. Serge Vondandamo (Jun 08)
- Re: Unix auditing tools - Windows based. Sol Invictus (Jun 09)
- Re: Unix auditing tools - Windows based. Micha Borrmann (Jun 08)
- Re: Some new SSH exploit script? Paul Barrette (Jun 08)
- Re: Some new SSH exploit script? Adam.Chesnutt (Jun 09)
- Re: Some new SSH exploit script? Dotzero (Jun 09)
- Re: Some new SSH exploit script? Christine Kronberg (Jun 10)
- Re: Some new SSH exploit script? Art Cooper (Jun 09)