Difference between revisions of "Countering SSH bruteforce attacks"

From RHS Wiki
Jump to navigation Jump to search
Line 4: Line 4:
 
sudo nano /usr/bin/brute</nowiki>
 
sudo nano /usr/bin/brute</nowiki>
 
<source lang=bash>#!/bin/bash
 
<source lang=bash>#!/bin/bash
sudo cat /var/log/auth.log | grep -i 'invalid user' | grep -v ']$' | awk '{print $8 " -->" $10}' | grep ubuntu</source>
+
sudo cat /var/log/auth.log | grep -i 'invalid user' | grep -v ']$' | awk '{print $8 " --> " $10}'

Revision as of 21:27, 12 November 2018

Create Parsing command

sudo touch /usr/bin/brute
sudo chmod +x /usr/bin/brute
sudo nano /usr/bin/brute

<source lang=bash>#!/bin/bash sudo cat /var/log/auth.log | grep -i 'invalid user' | grep -v ']$' | awk '{print $8 " --> " $10}'