shinysdr-docker
endlessh
shinysdr-docker | endlessh | |
---|---|---|
1 | 40 | |
7 | 6,883 | |
- | - | |
0.0 | 0.0 | |
about 4 years ago | 10 months ago | |
Dockerfile | C | |
Apache License 2.0 | The Unlicense |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
shinysdr-docker
-
First time actually laying out the whole network since I started 2 years ago
Nooelec NESDR SmartTee (R820T2) behind an HF Upconverter I use with ShinySDR through docker. Performance is ok, Shiny isn't the best to begin with but its the web-based interface I've found. I use this one for random scanning. Eventually I'd like to upgrade the antenna so I can pick up number stations.
endlessh
-
Why so many bots?
You can reduce the noise a lot by moving ssh to a non standard port. Security through obscurity isn't actually security, but it will reduce the number of attempts you receive. Another thing I like to do is put Endlessh on the standard port 22. That way as bots go by they will get stuck or at least slow down on that connection.
-
Is SSH secure enough?
SSH tarpit with Endlessh and for the hidden SSH: auth with both a key files (that need unlocking and is on the computer) AND an One Time Password on my phone.
-
"Failed password for root" SSH login hacking attemp?
If you change the ssh port, install https://github.com/skeeto/endlessh to slow down the attackers
-
ChatGPT doxes itself
Even this requires you to successfully guess the username and password correctly, and if it's just not the default most people won't bother brute forcing further. Sidenote: you can use endlessh on a computer and port forward port 22 to trap scanners that scan the entire internet for open ssh ports to exploit.
-
Ssh brute force attack with fail2ban.
The fun way is moving your ssh port somewhere else and installing endlessh to f the bots.
-
Security for your Homeserver
Such as endlessh
-
Keep it tight everyone! This is a day of sshd logs from a proxy server in China pinging my SSH server and trying every username imaginable. Does anyone have any tips to increase security?
But, as a prank to Chinese hackers, what I did on my system was to run endless ssh. It keeps the ssh client busy as it slowly sends the ssh banner. I modified the code to send strings like:
-
VPN to remotely access dockerized services
For hardening: I use lynis for some guidance, the VPS runs rkhunter, AIDE and other things nightly and mails me the reports, fail2ban manages the SSH port, having SSH on a custom port helps to keep things quiet. If you're into these kind of things, have a look at the Endlessh tarpit to learn about login attempts on port 22 on your machine - I found it eye-opening.
- Any app out there to trap port scanners?
- Mein Server wird für Bruteforce Attacken genutzt, was kann ich tun?
What are some alternatives?
rtl_433 - Program to decode radio transmissions from devices on the ISM bands (and other frequencies)
opencanary - Modular and decentralised honeypot
unpackerr - Extracts downloads for Radarr, Sonarr, Lidarr, Readarr, and/or a Watch folder - Deletes extracted files after import
sshesame - An easy to set up and use SSH honeypot, a fake SSH server that lets anyone in and logs their activity
docker-swag - Nginx webserver and reverse proxy with php support and a built-in Certbot (Let's Encrypt) client. It also contains fail2ban for intrusion prevention.
cowrie - Cowrie SSH/Telnet Honeypot https://cowrie.readthedocs.io
adsb-exchange - ADS-B Exchange Linux Setup Scripts
dump1090 - Dump1090 is a simple Mode S decoder for RTLSDR devices
minerstat-os - msOS - Open Source Mining OS. Repository moved, no longer using github
Portainer - Making Docker and Kubernetes management easy.
geoip-blocking-w-firewalld - Block unwanted countries IPv4 & IPv6 ranges with firewalld using ipdeny.com