Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. Over at LinkedIn, somebody posted the results of putting a Linux server with sshd exposted to the internet for 30 days recently.

Over at LinkedIn, somebody posted the results of putting a Linux server with sshd exposted to the internet for 30 days recently.

Scheduled Pinned Locked Moved Uncategorized
sshpasswordguessinrootloginweakspaswordspasswordgroping
2 Posts 2 Posters 0 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • pitrh@mastodon.socialP This user is from outside of this forum
    pitrh@mastodon.socialP This user is from outside of this forum
    pitrh@mastodon.social
    wrote last edited by
    #1

    Over at LinkedIn, somebody posted the results of putting a Linux server with sshd exposted to the internet for 30 days recently.

    In that particular area, not much seems to have changed since the early years of this century when the events chronicled here https://nxdomain.no/~peter/hailmary_lessons_learned.html (or if you prefer Big G's trackers, https://bsdly.blogspot.com/2013/10/the-hail-mary-cloud-and-lessons-learned.html) occurred.

    #ssh #passwordguessing #rootlogin #weakspaswords #passwordgroping #cybercrime

    brnrd@bsd.networkB 1 Reply Last reply
    1
    0
    • stefano@mastodon.bsd.cafeS stefano@mastodon.bsd.cafe shared this topic
    • pitrh@mastodon.socialP pitrh@mastodon.social

      Over at LinkedIn, somebody posted the results of putting a Linux server with sshd exposted to the internet for 30 days recently.

      In that particular area, not much seems to have changed since the early years of this century when the events chronicled here https://nxdomain.no/~peter/hailmary_lessons_learned.html (or if you prefer Big G's trackers, https://bsdly.blogspot.com/2013/10/the-hail-mary-cloud-and-lessons-learned.html) occurred.

      #ssh #passwordguessing #rootlogin #weakspaswords #passwordgroping #cybercrime

      brnrd@bsd.networkB This user is from outside of this forum
      brnrd@bsd.networkB This user is from outside of this forum
      brnrd@bsd.network
      wrote last edited by
      #2

      @pitrh
      Trying to do my part, I'm running an endlessh tarpit on port 22, and ssh on a http alternative port.
      Mostly get

      banner exchange: Connection from 192.0.2.123 port 44110: invalid format

      errors in the logs 😄

      1 Reply Last reply
      1
      0
      • R relay@relay.mycrowd.ca shared this topic
      Reply
      • Reply as topic
      Log in to reply
      • Oldest to Newest
      • Newest to Oldest
      • Most Votes


      • Login

      • Login or register to search.
      • First post
        Last post
      0
      • Categories
      • Recent
      • Tags
      • Popular
      • World
      • Users
      • Groups