Solved

Brute forcing SSH and FTP

Posted on 2004-08-26
5
216 Views
Last Modified: 2010-04-11
What is the best tool to audit accounts on a ssh and ftp box? Hydra? Brutus?
This is being done for work before the HIPPA audits lol
Thanks
0
Comment
Question by:dissolved
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
5 Comments
 
LVL 8

Assisted Solution

by:pjcrooks2000
pjcrooks2000 earned 275 total points
ID: 11918798
I am not sure you will be able to listen in on ssh as it uses Secure shell, basically the messages are encrypted.. I reckon you know that already.  ftp is a different kettle of fish.  If your running an ftp server then there should be logging capabilities included and if not then replace your ftp server so that you do have logging capabilities.

As for the ssh I will be inerested to learn if it is crackable, although I did see a security issue related to it a while back on the cert advisory website.  I think they have patched it by now so... good luck with that!  I would not imagine you can eavesdrop on it though.

:)
0
 
LVL 5

Assisted Solution

by:rsriprac
rsriprac earned 225 total points
ID: 11921065
I would reccomend running Nessus:

http://www.nessus.org/

I think that HIPPA cert does not go that far into bruting for weak login/password.  I'd be more worried with vurnabilities in the software.  However nessus does, I believe, do test of default/weak logins and pass.

-Ram
0
 

Author Comment

by:dissolved
ID: 11921105
Thanks guys!
0
 
LVL 8

Accepted Solution

by:
pjcrooks2000 earned 275 total points
ID: 11921124
Your welcome :)
0

Featured Post

[Live Webinar] The Cloud Skills Gap

As Cloud technologies come of age, business leaders grapple with the impact it has on their team's skills and the gap associated with the use of a cloud platform.

Join experts from 451 Research and Concerto Cloud Services on July 27th where we will examine fact and fiction.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Recovering from what the press called "the largest-ever cyber-attack", IT departments worldwide are discussing ways to defend against this in the future. In this process, many people are looking for immediate actions while, instead, they need to tho…
In this blog we highlight approaches to managed security as a service.  We also look into ConnectWise’s value in aiding MSPs’ security management and indicate why critical alerting is a necessary integration.
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
This video Micro Tutorial shows how to password-protect PDF files with free software. Many software products can do this, such as Adobe Acrobat (but not Adobe Reader), Nuance PaperPort, and Nuance Power PDF, but they are not free products. This vide…
Suggested Courses
Course of the Month4 days, 18 hours left to enroll

635 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question