Difference between revisions of "Countering SSH bruteforce attacks"

From RHS Wiki
Jump to navigation Jump to search
(Created page with "== Create Parsing command == sudo touch /usr/bin/brute sudo chmod +x /usr/bin/brute sudo nano /usr/bin/brute <source lang=bash>#!/bin/bash sudo cat /var/log/auth.log | grep -i...")
 
Line 1: Line 1:
 
== Create Parsing command ==
 
== Create Parsing command ==
sudo touch /usr/bin/brute
+
<nowiki>sudo touch /usr/bin/brute
 
sudo chmod +x /usr/bin/brute
 
sudo chmod +x /usr/bin/brute
sudo nano /usr/bin/brute
+
sudo nano /usr/bin/brute</nowiki>
 
<source lang=bash>#!/bin/bash
 
<source lang=bash>#!/bin/bash
 
sudo cat /var/log/auth.log | grep -i 'invalid user' | grep -v ']$' | awk '{print $8 " -->" $10}' | grep ubuntu</source>
 
sudo cat /var/log/auth.log | grep -i 'invalid user' | grep -v ']$' | awk '{print $8 " -->" $10}' | grep ubuntu</source>

Revision as of 21:26, 12 November 2018

Create Parsing command

sudo touch /usr/bin/brute
sudo chmod +x /usr/bin/brute
sudo nano /usr/bin/brute
#!/bin/bash
sudo cat /var/log/auth.log | grep -i 'invalid user' | grep -v ']$' | awk '{print $8 " -->" $10}' | grep ubuntu