nrw.social ist einer von vielen unabhängigen Mastodon-Servern, mit dem du dich im Fediverse beteiligen kannst.
Wir sind eine freundliche Mastodon Instanz aus Nordrhein-Westfalen. Ob NRW'ler oder NRW-Sympathifanten, jeder ist hier willkommen.

Serverstatistik:

2,8 Tsd.
aktive Profile

#BruteForce

1 Beitrag1 Beteiligte*r0 Beiträge heute

Millions of VPNs and networking devices are under attack, with hackers using 2.8 million IPs to brute-force passwords on Palo Alto, Ivanti, SonicWall, and other devices. Attackers leverage compromised MikroTik, Huawei, Cisco, Boa, and ZTE routers. Most attacks originate from Brazil, Turkey, Russia, and Argentina. Weak passwords remain the primary risk. #CyberSecurity #VPN #BruteForce

Source: techradar.com/pro/security/hug

Continuing the tour of my @github projects, the #TacticalExploitation toolkit deserves to be mentioned. It's now a bit old, but I believe the concept still applies, and very much so.

github.com/0xdea/tactical-expl

"The Other Way to Pen-Test" -- @hdm & @Valsmith

I've always been a big proponent of a tactical approach to #PenetrationTesting that doesn't focus on exploiting known software #vulnerabilities, but relies on #OldSchool techniques such as #InformationGathering and #BruteForce. While being able to appreciate the occasional usefulness of a well-timed 0day, as a veteran penetration tester I favor an exploit-less approach. Tactical exploitation provides a smoother and more reliable way of compromising targets by leveraging process vulnerabilities, while minimizing attack detection and other undesired side effects.

Since a few years, I've meant to give a talk on this very subject, with the working title of "Empty Phist Style - Hacking Without Tooling" (inspired by @thegrugq). Sooner or later it will happen.

GitHubGitHub - 0xdea/tactical-exploitation: Modern tactical exploitation toolkit.Modern tactical exploitation toolkit. Contribute to 0xdea/tactical-exploitation development by creating an account on GitHub.

Whenever I see the a "How to protect your #SSH server against #bruteforce attacks" post or article centered on some #Linux woodo, I always think to post about how easy it is to deal with those on #OpenBSD and #FreeBSD with #PF add #statetracking options: As in home.nuug.no/~peter/pf/en/brut, supplemented with nxdomain.no/~peter/forcing_the, alternatively the PF tutorial nxdomain.no/~peter/pf_fullday. and of course The Book of PF, nostarch.com/pf3

home.nuug.noTurning away the brutes

The #sshgropers are really throwing everything at the wall these days:

Aug 18 14:36:54 skapet sshd-session[71375]: Failed password for invalid user GNU/Linux from 4.247.176.60 port 39582 ssh2

#ssh #passwordgropers #passwordguessing #bruteforce #passwords #cybercrime

Also see nxdomain.no/~peter/hailmary_le (prettier, G-tracked: bsdly.blogspot.com/2013/10/the) and badness_enumerated_by_robots.html (prettified, G-tracked bsdly.blogspot.com/2018/08/bad)

nxdomain.noThe Hail Mary Cloud And The Lessons Learned

@Verfassungklage

Mal ne Überlegung zu nem guten Passwort.
1. Die Sicherheit gibt maßgeblich die Webseite / Anwendung vor, indem sie die Kriterien bestimmt.
WIe lange und welche Zeichen sind im Passwort erlaubt.

2. Passwörter werden überwiegend durch probieren geknackt.
Dafür werden zuerst bekannte Passwörter probiert. Dann Inhalte von Lexika, Namenslisten und/oder ähnliches.

3. danach werden alle Kombinationen ausprobiert -> #bruteforce