endlessh
ipsum
Our great sponsors
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
endlessh
-
Why so many bots?
You can reduce the noise a lot by moving ssh to a non standard port. Security through obscurity isn't actually security, but it will reduce the number of attempts you receive. Another thing I like to do is put Endlessh on the standard port 22. That way as bots go by they will get stuck or at least slow down on that connection.
-
ChatGPT doxes itself
Even this requires you to successfully guess the username and password correctly, and if it's just not the default most people won't bother brute forcing further. Sidenote: you can use endlessh on a computer and port forward port 22 to trap scanners that scan the entire internet for open ssh ports to exploit.
-
Ssh brute force attack with fail2ban.
The fun way is moving your ssh port somewhere else and installing endlessh to f the bots.
-
Security for your Homeserver
Such as endlessh
-
Keep it tight everyone! This is a day of sshd logs from a proxy server in China pinging my SSH server and trying every username imaginable. Does anyone have any tips to increase security?
But, as a prank to Chinese hackers, what I did on my system was to run endless ssh. It keeps the ssh client busy as it slowly sends the ssh banner. I modified the code to send strings like:
Install https://github.com/skeeto/endlessh to run on eg. port 22233 (in /etc/endlessh.conf)
this'll help
- Any app out there to trap port scanners?
- Mein Server wird für Bruteforce Attacken genutzt, was kann ich tun?
-
Just so we're clear - you do all know your passwords, right?
I have port 22 open on my home server, but I have this running on that port: https://github.com/skeeto/endlessh. It's quite wild seeing the amount of connection attempts for this.
ipsum
- Do you use blacklists / IP threat intelligence and are they helpful?
-
So I opened up one port on my network for an SFTP server, and in just the last 7 days there have been 611 attempts to log into it... It's always interesting to see the usernames that try to log in, so I pulled them and sorted them all out.
Do yourself a favor and load up your iptables with the ipsum blacklist.
- Shodan Lifetime $4 USD
What are some alternatives?
blocklist-ipsets - ipsets dynamically updated with firehol's update-ipsets.sh script
sshesame - An easy to set up and use SSH honeypot, a fake SSH server that lets anyone in and logs their activity
opencanary - Modular and decentralised honeypot
cowrie - Cowrie SSH/Telnet Honeypot https://cowrie.readthedocs.io
docker-swag - Nginx webserver and reverse proxy with php support and a built-in Certbot (Let's Encrypt) client. It also contains fail2ban for intrusion prevention.
minerstat-os - msOS - Open Source Mining OS. Repository moved, no longer using github
geoip-blocking-w-firewalld - Block unwanted countries IPv4 & IPv6 ranges with firewalld using ipdeny.com
arch-linux-luks-tpm-boot - A guide for setting up LUKS boot with a key from TPM in Arch Linux
Pritunl - Enterprise VPN server
unpackerr - Extracts downloads for Radarr, Sonarr, Lidarr, Readarr, and/or a Watch folder - Deletes extracted files after import
shinysdr-docker - Docker build of debian, gnuradio and shinysdr with all plugins
Portainer - Making Docker and Kubernetes management easy.