Joseph wrote:
I have port knocking installed on firewall, to further protect any SSH
attacks.
So port 22 is closed (in stealth mode) and only opens if it received the
right knock sequence, moreover it is only opened to an IP address from
which received successful knock sequence; all others
This document should give you some info
http://gentoo-wiki.com/HOWTO_Port_Knocking
Peter
On 8/4/05, Jarry [EMAIL PROTECTED] wrote:
Joseph wrote: I have port knocking installed on firewall, to further protect any SSH attacks. So port 22 is closed (in stealth mode) and only opens if it received
Colin wrote:
On Aug 2, 2005, at 7:50 PM, Raphael Melo de Oliveira Bastos Sales wrote:
Hi there,
I was wondering what tools should I use to detect security flaws to
my server and a few tips on how to use them. What are the most common
forms of attack and how do I avoid being attacked by
Raphael Melo de Oliveira Bastos Sales wrote:
He claims that if someone invades my machine, it will have direct
access to all data. That I have to distribute the database, put it in
another machine and have the web application access that database over
the network. I feel this is a bit overkill.
On Tue, 2005-08-02 at 23:50 +, Raphael Melo de Oliveira Bastos Sales
wrote:
Hi there,
I was wondering what tools should I use to detect security flaws to
my server and a few tips on how to use them. What are the most common
forms of attack and how do I avoid being attacked by one of
Joseph could you direct me toward a how to on how to set that up, please.
Raphael have you gone through
http://www.gentoo.org/doc/en/security/index.xml it has some good
points and worth going through and ticking off each one.
Cheers
Rav
On 8/3/05, Joseph [EMAIL PROTECTED] wrote:
On Tue,
On Wed, 2005-08-03 at 23:37 +0200, Ryan Viljoen wrote:
Joseph could you direct me toward a how to on how to set that up, please.
I use freesco firewall and they have small package (add-on) called
knock, you can install it on a floppy see my howto:
Hi there,
I was wondering what tools should I use to detect security flaws to
my server and a few tips on how to use them. What are the most common
forms of attack and how do I avoid being attacked by one of them?
The services avaliable are only Apache - SSL and SSH. I've
installed an
Hi,
2 tools nmap and nessus for network/port scanning and others.
For hardering you could use bastille.
Of course all found in portage.
PeterOn 8/3/05, Raphael Melo de Oliveira Bastos Sales [EMAIL PROTECTED] wrote:
Hi there, I was wondering what tools should I use to detect security flaws tomy
On Aug 2, 2005, at 7:50 PM, Raphael Melo de Oliveira Bastos Sales wrote:
Hi there,
I was wondering what tools should I use to detect security flaws to
my server and a few tips on how to use them. What are the most common
forms of attack and how do I avoid being attacked by one of them?
Thanks Peter. I'm just finishing visiting the home page of almost
every package on the net-analyzer category. If I didn't have such a
short dead line, I'd test them all. ;)
2005/8/3, Peter De Zutter [EMAIL PROTECTED]:
Hi,
2 tools nmap and nessus for network/port scanning and others.
For
Hey Colin,
I was looking at the /etc/ssh/sshd_config file and found these:
LoginGraceTime 600
MaxAuthTries 6
Is the first one what you meant?
The second seems like an attempt to avoid brute force login.
Also, does Grub need any kind of password protection? I don't know if
it was Grub or Lilo
On Aug 2, 2005, at 9:18 PM, Raphael Melo de Oliveira Bastos Sales wrote:
Hey Colin,
I was looking at the /etc/ssh/sshd_config file and found these:
LoginGraceTime 600
MaxAuthTries 6
Is the first one what you meant?
The second seems like an attempt to avoid brute force login.
Neither is
On Tue, Aug 02, 2005 at 09:43:17PM -0400, Colin wrote:
Neither is what I was thinking of, but they're quite similar.
LoginGraceTime means if nobody logged in within 10 minutes of the
connection being opened, then it will be closed. I don't know
exactly what MaxAuthTries does, but I
Which IDS system do you recommend? I also need to worry about HTTP
auth brute force. Know any way to stop it from happening?
I've read about HoneyPots, which I can only assume is a decoy for an
attacker. Anyone knows how to set one up?
I have a feeling that there isn't much I can do if a pro
On Wed, Aug 03, 2005 at 02:25:29AM +, Raphael Melo de Oliveira Bastos Sales
wrote:
Which IDS system do you recommend? I also need to worry about HTTP
auth brute force. Know any way to stop it from happening?
I've read about HoneyPots, which I can only assume is a decoy for an
attacker.
Hi,
Raphael Melo de Oliveira Bastos Sales wrote:
Which IDS system do you recommend? I also need to worry about HTTP
auth brute force. Know any way to stop it from happening?
I've read about HoneyPots, which I can only assume is a decoy for an
attacker. Anyone knows how to set one up?
I have a
Colin wrote:
Want to know how secure your server is? Try and hack it!
A good port scanner like nmap should be a basic check of your
firewall. I would also set nmap (if it can do this) to perform a SYN
flood as it scans, to see if your server can withstand that basic DoS
attack.
18 matches
Mail list logo