Tagged: ssh

DreamBus Linux malware

DreamBus: The Linux-Based Malware Targeting Business Applications

Zscaler’s ThreatLabz research team detected a formidable adversary: DreamBus. A Linux-based malware family, DreamBus has been quietly evolving, honing its capabilities to exploit vulnerabilities in business applications. DreamBus, initially identified in early 2019, has...

Bastion

the-bastion v3.14 releases: securely connect to devices

The Bastion Bastions are a cluster of machines used as the unique entry point by operational teams (such as sysadmins, developers, database admins, …) to securely connect to devices (servers, virtual machines, cloud instances,...

natively ssh windows 10

Windows 10 official natively support SSH

As early as 2015, Microsoft announced that Windows will natively support SSH. Secure Shell (SSH) is a cryptographicnetwork protocol for operating network services securely over an unsecured network on Linux. SSH provides a secure channel over an unsecured network in a client-server architecture,...

sshnotify

Protect SSH login using Google Authenticator 2-Step Verification

Google Authenticator OpenSource The Google Authenticator project includes implementations of one-time passcode generators for several mobile platforms. One-time passcodes are generated using open standards developed by the Initiative for Open Authentication (OATH) (which is unrelated to OAuth)....

wetland: A high interaction SSH honeypot

Wetland Wetland is a high interaction SSH honeypot,designed to log brute force attacks.What’s more, wetland will log shell、scp、sftp、exec-command、direct-forward、reverse-forward interation performded by the attacker. Wetland is based on python ssh module paramiko. And wetland runs as...

How to use FAIL2BAN to protect SSH

Fail2Ban is an intrusion prevention software framework that protects computer servers from brute-force attacks. Written in the Python programming language, it is able to run on POSIX systems that have an interface to a...