Re: SSH Brute force attacks

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



> How about this:
> 
> 1. You will keep one random high port to accept new connection, say 32456.
> You box wont listen on that port though.
> 2. If there have a request on that port, using recent match, you will
> accpet new connection in different high port for 1 mintute. say port is
> 34521
> 3. You will send new connection request on 34521, again using recent match
> you will open port 22 to accept new connection for 1-3 minutes.
> 4. You will log into your box !!

Port knocking is the same as a plaintext password.
http://software.newsforge.com/software/04/08/02/1954253.shtml



[Index of Archives]     [Linux Netfilter Development]     [Linux Kernel Networking Development]     [Netem]     [Berkeley Packet Filter]     [Linux Kernel Development]     [Advanced Routing & Traffice Control]     [Bugtraq]

  Powered by Linux