This document should give you some info
http://gentoo-wiki.com/HOWTO_Port_Knocking
Peter
On 8/4/05, Jarry <[EMAIL PROTECTED]> wrote:
Joseph wrote:> I have port knocking installed on firewall, to further protect any SSH> attacks.> So port 22 is closed (in stealth mode) and only opens if it receive
Joseph wrote:
I have port knocking installed on firewall, to further protect any SSH
attacks.
So port 22 is closed (in stealth mode) and only opens if it received the
right knock sequence, moreover it is only opened to an IP address from
which received successful knock sequence; all others see
Willie Wong wrote:
On Wed, Aug 03, 2005 at 10:01:58PM +0200, Nagatoro wrote:
Mind sharing those scripts?
Do not mind of course. But the scripts are really nothing to speak of.
Thanks!
--
Naga
--
gentoo-user@gentoo.org mailing list
On Wed, 2005-08-03 at 23:37 +0200, Ryan Viljoen wrote:
> Joseph could you direct me toward a how to on how to set that up, please.
I use freesco firewall and they have small package (add-on) called
knock, you can install it on a floppy see my howto:
http://forums.freesco.org/support/index.php?show
Joseph could you direct me toward a how to on how to set that up, please.
Raphael have you gone through
http://www.gentoo.org/doc/en/security/index.xml it has some good
points and worth going through and ticking off each one.
Cheers
Rav
On 8/3/05, Joseph <[EMAIL PROTECTED]> wrote:
> On Tue, 2005
On Wed, Aug 03, 2005 at 10:01:58PM +0200, Nagatoro wrote:
> Willie Wong wrote:
> >I just have scripts that parse the server logs and look for trigger
> >conditions, at which time it blocks off the offending site or the
>
> Mind sharing those scripts?
>
Do not mind of course. But the scripts are
Willie Wong wrote:
I just have scripts that parse the server logs and look for trigger
conditions, at which time it blocks off the offending site or the
Mind sharing those scripts?
--
/Naga
--
gentoo-user@gentoo.org mailing list
On Tue, 2005-08-02 at 23:50 +, Raphael Melo de Oliveira Bastos Sales
wrote:
> Hi there,
>
>I was wondering what tools should I use to detect security flaws to
> my server and a few tips on how to use them. What are the most common
> forms of attack and how do I avoid being attacked by one
Raphael Melo de Oliveira Bastos Sales wrote:
He claims that if someone invades my machine, it will have direct
access to all data. That I have to distribute the database, put it in
another machine and have the web application access that database over
the network. I feel this is a bit overkill. N
Colin wrote:
On Aug 2, 2005, at 7:50 PM, Raphael Melo de Oliveira Bastos Sales wrote:
Hi there,
I was wondering what tools should I use to detect security flaws to
my server and a few tips on how to use them. What are the most common
forms of attack and how do I avoid being attacked by one
First of all, thanks everyone for your replies. I really appreciate
the help. I'll be testing snort, since it was the most mentioned one.
I'm also going to test bastille. Had a problem emerging psad, one of
its dependencies. I'll send the error message later.
I made all the tests with nmap to che
On 8/3/05, Raphael Melo de Oliveira Bastos Sales <[EMAIL PROTECTED]> wrote:
Which IDS system do you recommend? I also need to worry about HTTPauth brute force. Know any way to stop it from happening?
Snort, oinkmaster and ACID, there is a decent guide here .
About that http thingy, depends on how c
Colin wrote:
Want to know how secure your server is? Try and hack it!
A good port scanner like nmap should be a basic check of your
firewall. I would also set nmap (if it can do this) to perform a SYN
flood as it scans, to see if your server can withstand that basic DoS
attack. (Adding
Hi,
Raphael Melo de Oliveira Bastos Sales wrote:
>Which IDS system do you recommend? I also need to worry about HTTP
>auth brute force. Know any way to stop it from happening?
>
>I've read about HoneyPots, which I can only assume is a decoy for an
>attacker. Anyone knows how to set one up?
>
>I ha
On Wed, Aug 03, 2005 at 02:25:29AM +, Raphael Melo de Oliveira Bastos Sales
wrote:
> Which IDS system do you recommend? I also need to worry about HTTP
> auth brute force. Know any way to stop it from happening?
>
> I've read about HoneyPots, which I can only assume is a decoy for an
> attack
Which IDS system do you recommend? I also need to worry about HTTP
auth brute force. Know any way to stop it from happening?
I've read about HoneyPots, which I can only assume is a decoy for an
attacker. Anyone knows how to set one up?
I have a feeling that there isn't much I can do if a pro actu
On Tue, Aug 02, 2005 at 09:43:17PM -0400, Colin wrote:
> Neither is what I was thinking of, but they're quite similar.
> LoginGraceTime means if nobody logged in within 10 minutes of the
> connection being opened, then it will be closed. I don't know
> exactly what MaxAuthTries does, but I
On Aug 2, 2005, at 9:18 PM, Raphael Melo de Oliveira Bastos Sales wrote:
Hey Colin,
I was looking at the /etc/ssh/sshd_config file and found these:
LoginGraceTime 600
MaxAuthTries 6
Is the first one what you meant?
The second seems like an attempt to avoid brute force login.
Neither is w
Hey Colin,
I was looking at the /etc/ssh/sshd_config file and found these:
LoginGraceTime 600
MaxAuthTries 6
Is the first one what you meant?
The second seems like an attempt to avoid brute force login.
Also, does Grub need any kind of password protection? I don't know if
it was Grub or Lilo
Thanks Peter. I'm just finishing visiting the home page of almost
every package on the net-analyzer category. If I didn't have such a
short dead line, I'd test them all. ;)
2005/8/3, Peter De Zutter <[EMAIL PROTECTED]>:
> Hi,
> 2 tools nmap and nessus for network/port scanning and others.
> For
On Aug 2, 2005, at 7:50 PM, Raphael Melo de Oliveira Bastos Sales wrote:
Hi there,
I was wondering what tools should I use to detect security flaws to
my server and a few tips on how to use them. What are the most common
forms of attack and how do I avoid being attacked by one of them?
Hi,
2 tools nmap and nessus for network/port scanning and others.
For hardering you could use bastille.
Of course all found in portage.
PeterOn 8/3/05, Raphael Melo de Oliveira Bastos Sales <[EMAIL PROTECTED]> wrote:
Hi there, I was wondering what tools should I use to detect security flaws tomy
Hi there,
I was wondering what tools should I use to detect security flaws to
my server and a few tips on how to use them. What are the most common
forms of attack and how do I avoid being attacked by one of them?
The services avaliable are only Apache - SSL and SSH. I've
installed an firew
23 matches
Mail list logo