LinuxQuestions.org
Help answer threads with 0 replies.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 02-21-2009, 07:46 AM   #31
aq_mishu
Member
 
Registered: Sep 2005
Location: Bangladesh
Distribution: RH 7.2, 8, 9, Fedora
Posts: 217

Original Poster
Rep: Reputation: 30

great... and how to be invisible in nmap??

And the firewall is now ok with dns... so i dont need to remove anything from the chains right?? all i will do later is add... well, i will add in

iptables -A BADIPS -s A.B.C.D -j DROP

And no need if
#insert new chain into INPUT
iptables -I INPUT 2 -j BADIPS

Right?
Above all, Thank you very much Sir... for your kind patience in solving the problem. I can see the guy is trying to get access but the connection goes to sleep.... Thanks...

Last edited by aq_mishu; 02-21-2009 at 07:49 AM.
 
Old 02-21-2009, 07:58 AM   #32
JulianTosh
Member
 
Registered: Sep 2007
Location: Las Vegas, NV
Distribution: Fedora / CentOS
Posts: 674
Blog Entries: 3

Rep: Reputation: 90
as long as you have ports open, you'll never be completely invisible to nmap.

yes, append to the end of BADIPS chain to block other IPs and leave INPUT alone unless you need to open up more ports.

no problem, glad I could help. dont forget to click the thumbs up icon!

Yes, I'm a stat whore.

78^D
 
Old 02-21-2009, 08:14 AM   #33
aq_mishu
Member
 
Registered: Sep 2005
Location: Bangladesh
Distribution: RH 7.2, 8, 9, Fedora
Posts: 217

Original Poster
Rep: Reputation: 30
a few days ago, i made a check to a server for open ports. that server was hosting dns/www/mail or all (i'm sure) but nmap gave nothing. I liked that... i could not find out any open port... but dafinitely a port is listening there....
 
Old 02-21-2009, 08:21 AM   #34
JulianTosh
Member
 
Registered: Sep 2007
Location: Las Vegas, NV
Distribution: Fedora / CentOS
Posts: 674
Blog Entries: 3

Rep: Reputation: 90
there are different ways to run nmap, some are more sneaky or ignorant than the other. For instance, some scans dont do a port scan if the host doesnt respond to icmp first. 'man nmap' to see every type of host discovery and scan techniques that are available. it's a large list.
 
Old 02-21-2009, 09:40 AM   #35
unixfool
Member
 
Registered: May 2005
Location: Northern VA
Distribution: Slackware, Ubuntu, FreeBSD, OpenBSD, OS X
Posts: 782
Blog Entries: 8

Rep: Reputation: 158Reputation: 158
IMO, his SSH port could've stayed on port 30. While this is considered security by obscurity, using more than that one method alone is the better approach. And even if he has SSH key authentication enabled and the service listening on port 22, he's still going to have HUGE logs documenting all the brute forcing. He could've kept the service on port 30, enabled SSH key auth and had less of an issue with brute force AND less logs to deal with, even if all log entries are denials.
 
Old 02-21-2009, 01:43 PM   #36
aq_mishu
Member
 
Registered: Sep 2005
Location: Bangladesh
Distribution: RH 7.2, 8, 9, Fedora
Posts: 217

Original Poster
Rep: Reputation: 30
Quote:
Originally Posted by unixfool View Post
IMO, his SSH port could've stayed on port 30. While this is considered security by obscurity, using more than that one method alone is the better approach. And even if he has SSH key authentication enabled and the service listening on port 22, he's still going to have HUGE logs documenting all the brute forcing. He could've kept the service on port 30, enabled SSH key auth and had less of an issue with brute force AND less logs to deal with, even if all log entries are denials.
Liked this approach...
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
C/C++ Bruteforce, Dictionary Creation... Need a method Micah Programming 12 06-07-2006 10:28 AM
Compromised by SSH bruteforce MBH Linux - Security 3 09-16-2005 10:10 PM
Successful bruteforce attack? nixinbarrie Linux - Security 3 05-07-2005 02:07 PM
ssh bruteforce DoS branden_burger Linux - Security 10 03-29-2005 02:53 AM
bruteforce nautilus_1987 Linux - Software 6 09-02-2002 11:37 AM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 12:42 AM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration