Re: [Full-disclosure] Distributed SSH username/password brute forceattack

2007-10-24 Thread Vincent Archer
On Mon, 2007-10-22 at 22:34 +0200, [EMAIL PROTECTED] wrote: Hi, Oct 22 20:36:13 nms sshd[90657]: Failed password for invalid user gopher from 77.46.152.2 port 55120 ssh2 user/password authentication for SSH? one way of cleaning up your logs and killing this type of attack is to

Re: [Full-disclosure] Distributed SSH username/password brute forceattack

2007-10-23 Thread nocfed
On 10/22/07, Anders B Jansson [EMAIL PROTECTED] wrote: [EMAIL PROTECTED] wrote: Hi, Oct 22 20:36:13 nms sshd[90657]: Failed password for invalid user gopher from 77.46.152.2 port 55120 ssh2 user/password authentication for SSH? one way of cleaning up your logs and killing this type

Re: [Full-disclosure] Distributed SSH username/password brute forceattack

2007-10-22 Thread subs07
@lists.grok.org.uk Subject: [Full-disclosure] Distributed SSH username/password brute forceattack Hello, since this night I experience distributed SSH username/password guessing brute force attacks. Anyone seen something similar? Up until this night always one host tried to guess username

Re: [Full-disclosure] Distributed SSH username/password brute forceattack

2007-10-22 Thread cybergoth
Nothing special, change ssh port. - Original Message - From: Philipp [EMAIL PROTECTED] To: full-disclosure@lists.grok.org.uk Sent: Monday, October 22, 2007 2:36 PM Subject: [Full-disclosure] Distributed SSH username/password brute forceattack Hello, since this night I experience

Re: [Full-disclosure] Distributed SSH username/password brute forceattack

2007-10-22 Thread Valery Marchuk
-disclosure] Distributed SSH username/password brute forceattack Hello, since this night I experience distributed SSH username/password guessing brute force attacks. Anyone seen something similar? Up until this night always one host tried to guess username/password combinations until

Re: [Full-disclosure] Distributed SSH username/password brute forceattack

2007-10-22 Thread A . L . M . Buxey
Hi, Oct 22 20:36:13 nms sshd[90657]: Failed password for invalid user gopher from 77.46.152.2 port 55120 ssh2 user/password authentication for SSH? one way of cleaning up your logs and killing this type of attack is to reconfigure your OpenSSH to only allow key based logins. stopped my 10M+

Re: [Full-disclosure] Distributed SSH username/password brute forceattack

2007-10-22 Thread Anders B Jansson
[EMAIL PROTECTED] wrote: Hi, Oct 22 20:36:13 nms sshd[90657]: Failed password for invalid user gopher from 77.46.152.2 port 55120 ssh2 user/password authentication for SSH? one way of cleaning up your logs and killing this type of attack is to reconfigure your OpenSSH to only allow key