Solved

Brute forcing SSH and FTP

Posted on 2004-08-26
5
206 Views
Last Modified: 2010-04-11
What is the best tool to audit accounts on a ssh and ftp box? Hydra? Brutus?
This is being done for work before the HIPPA audits lol
Thanks
0
Comment
Question by:dissolved
  • 2
5 Comments
 
LVL 8

Assisted Solution

by:pjcrooks2000
pjcrooks2000 earned 275 total points
ID: 11918798
I am not sure you will be able to listen in on ssh as it uses Secure shell, basically the messages are encrypted.. I reckon you know that already.  ftp is a different kettle of fish.  If your running an ftp server then there should be logging capabilities included and if not then replace your ftp server so that you do have logging capabilities.

As for the ssh I will be inerested to learn if it is crackable, although I did see a security issue related to it a while back on the cert advisory website.  I think they have patched it by now so... good luck with that!  I would not imagine you can eavesdrop on it though.

:)
0
 
LVL 5

Assisted Solution

by:rsriprac
rsriprac earned 225 total points
ID: 11921065
I would reccomend running Nessus:

http://www.nessus.org/

I think that HIPPA cert does not go that far into bruting for weak login/password.  I'd be more worried with vurnabilities in the software.  However nessus does, I believe, do test of default/weak logins and pass.

-Ram
0
 

Author Comment

by:dissolved
ID: 11921105
Thanks guys!
0
 
LVL 8

Accepted Solution

by:
pjcrooks2000 earned 275 total points
ID: 11921124
Your welcome :)
0

Featured Post

The Eight Noble Truths of Backup and Recovery

How can IT departments tackle the challenges of a Big Data world? This white paper provides a roadmap to success and helps companies ensure that all their data is safe and secure, no matter if it resides on-premise with physical or virtual machines or in the cloud.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

How do we balance the user experience (UX) with reasonable security measures? It can be done, if you keep these fundamentals in mind.
Data breaches are on the rise, and companies are preparing by boosting their cybersecurity budgets. According to the Cybersecurity Market Report (http://www.cybersecurityventures.com/cybersecurity-market-report), worldwide spending on cybersecurity …
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

809 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question