Sponsored Content
Full Discussion: Bruteforce attack on my pc
Top Forums UNIX for Dummies Questions & Answers Bruteforce attack on my pc Post 302140601 by cbkihong on Monday 15th of October 2007 12:07:02 AM
Old 10-15-2007
Probably the simplest way is not to block individual IPs but to switch SSH to a higher and obscure port number, switch to an exclusive public key authentication model, and only allow explicit blocks of IP to access if possible. Blocking IPs are usually futile because these IPs most often do not represent the real cracker's IP. They just crack into many vulnerable systems and use those as shields to break in others' systems for one-time only and so the list is essentially infinite, and you will see new IPs emerge every day. They have many of these victim hosts at their disposal so if you block one they simply switch to another.
 

7 More Discussions You Might Find Interesting

1. Cybersecurity

Replay Attack

REPLAY ATTACK. Can some one elobrate on measures to encounter this problem of replay atack on network. (3 Replies)
Discussion started by: Ashvin Gaur
3 Replies

2. Cybersecurity

What I think is a DoS attack

About 3 days ago our Apache logs started filling with the following errors: mod_ssl: SSL handshake failed (server <weberver>:443, client 41.235.234.172) (OpenSSL library error follows) OpenSSL: error:1408A0B7:SSL routines:SSL3_GET_CLIENT_HELLO:no ciphers specified These initially were... (1 Reply)
Discussion started by: ccj4467
1 Replies

3. Cybersecurity

Found attack from

Hi, I have a belkin router installed and a look at the security log has got me worried a little bit. Security log: Fri Jan 29 20:41:46 2010 =>Found attack from 68.147.232.199. Source port is 58591 and destination port is 12426 which use the TCP protocol. Fri Jan 29 20:41:46 2010 ... (1 Reply)
Discussion started by: jld
1 Replies

4. Cybersecurity

Network attack - so what?

In my logs I find entries about attacks on my system. I know IP addresses, I know date and time and I know what they tried to do. So what's the best I can do now? Tell everybody that there are cybercriminals on that network? Write an email to their admin? Anything else? (10 Replies)
Discussion started by: Action
10 Replies

5. Cybersecurity

UUCP attack?

Is this an attack attempt? I got an e-mail from 'uucp Admin' last night and again this morning: What does it mean and what can I do about it? Thanks (4 Replies)
Discussion started by: ctafret
4 Replies

6. UNIX for Dummies Questions & Answers

I need a database and a plan of attack!

Hi everyone, I've got an extensive collection of seismic files that I am trying to turn into workable subsurface data collection. It's all real-time history and it is being loaded onto the main linux computer from a collection of about 1000 CDs. There are about 4000 seismic files on each CD, and... (3 Replies)
Discussion started by: ws6transam
3 Replies

7. Emergency UNIX and Linux Support

DDOS attack please help!

Dear community, my site was recently attacjed by DDOS technique and goes down in a few minutes. My site runs under Debian/Apache2/Mysql. I identified the IPs who attack me and block it through iptable firewall from debian. Something like: iptables -D INPUT -s xxx.xxx.xxx.xxx -j DROP This... (7 Replies)
Discussion started by: Lord Spectre
7 Replies
Paranoid::Network::IPv4(3pm)				User Contributed Perl Documentation			      Paranoid::Network::IPv4(3pm)

NAME
Paranoid::Network::IPv4 - IPv4-related functions VERSION
$Id: IPv4.pm,v 0.1 2012/05/29 21:37:44 acorliss Exp $ SYNOPSIS
use Paranoid::Network::IPv4; @net = ipv4NetConvert($netAddr); $rv = ipv4NetIntersect($net1, $net2); or use Paranoid::Network::IPv4 qw(:all); print "Valid IP address " if $netAddr =~ /^@{[ IPV4REGEX ]}$/; @net = ipv4NetConvert($netAddr); $broadcast = $net[IPV4BRDCST]; DESCRIPTION
This module contains a few convenience functions for working with IPv4 addresses. By default only the subroutines themselves are imported. Requesting :all will also import the constants as well. SUBROUTINES
/METHODS ipv4NetConvert @net = ipv4NetConvert($netAddr); This function takes an IPv4 network address in string format and converts it into an array containing the base network address, the broadcast address, and the netmask, in integer format. The network address can have the netmask in either CIDR format or dotted quads. In the case of a single IP address, the array with only have one element, that of the IP in integer format. Passing any argument to this function that is not a string representation of an IP address (including undef values) will cause this function to return an empty array. ipv4NetIntersect $rv = ipv4NetIntersect($net1, $net2); This function tests whether an IP or subnet intersects with another IP or subnet. The return value is essentially boolean, but the true value can vary to indicate which is a subset of the other: -1: destination range encompasses target range 0: both ranges do not intersect at all 1: target range encompasses destination range The function handles the same string formats as ipv4NetConvert, but will allow you to test single IPs in integer format as well. CONSTANTS
These are only imported if explicity requested or with the :all tag. MAXIPV4CIDR Simply put: 32. This is the largest CIDR notation supported in IPv4. IPV4REGEX Regular expression: qr/(?:d{1,3}.){3}d{1,3}/sm You can use this for validating IP addresses as such: $ip =~ m#^@{[ IPV4REGEX ]}$#; or to extract potential IPs from extraneous text: (@ips) = ( $string =~ m#(@{[ IPV4REGEX ]})#gsm); IPV4CIDRRGX Regular expression: qr#(@{[ IPV4REGEX ]})(?:/(d+|@{[ IPV4REGEX ]}))?#sm By default this will extract an IP or CIDR notation network address: ($net, $mask) = ( $ip =~ m#^@{[ IPV4CIDRRGX ]}$# ); In the case of a simple IP address $mask will be undefined. IPV4BASE This is the ordinal index of the base network address as returned by ipv4NetConvert. IPV4BRDCST This is the ordinal index of the broadcast address as returned by ipv4NetConvert. IPV4MASK This is the ordinal index of the network mask as returned by ipv4NetConvert. DEPENDENCIES
o Paranoid o Paranoid::Network::Socket BUGS AND LIMITATIONS
AUTHOR
Arthur Corliss (corliss@digitalmages.com) LICENSE AND COPYRIGHT
This software is licensed under the same terms as Perl, itself. Please see http://dev.perl.org/licenses/ for more information. (c) 2012, Arthur Corliss (corliss@digitalmages.com) perl v5.14.2 2012-05-29 Paranoid::Network::IPv4(3pm)
All times are GMT -4. The time now is 06:46 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy