Solved

Brute forcing SSH and FTP

Posted on 2004-08-26
5
211 Views
Last Modified: 2010-04-11
What is the best tool to audit accounts on a ssh and ftp box? Hydra? Brutus?
This is being done for work before the HIPPA audits lol
Thanks
0
Comment
Question by:dissolved
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
5 Comments
 
LVL 8

Assisted Solution

by:pjcrooks2000
pjcrooks2000 earned 275 total points
ID: 11918798
I am not sure you will be able to listen in on ssh as it uses Secure shell, basically the messages are encrypted.. I reckon you know that already.  ftp is a different kettle of fish.  If your running an ftp server then there should be logging capabilities included and if not then replace your ftp server so that you do have logging capabilities.

As for the ssh I will be inerested to learn if it is crackable, although I did see a security issue related to it a while back on the cert advisory website.  I think they have patched it by now so... good luck with that!  I would not imagine you can eavesdrop on it though.

:)
0
 
LVL 5

Assisted Solution

by:rsriprac
rsriprac earned 225 total points
ID: 11921065
I would reccomend running Nessus:

http://www.nessus.org/

I think that HIPPA cert does not go that far into bruting for weak login/password.  I'd be more worried with vurnabilities in the software.  However nessus does, I believe, do test of default/weak logins and pass.

-Ram
0
 

Author Comment

by:dissolved
ID: 11921105
Thanks guys!
0
 
LVL 8

Accepted Solution

by:
pjcrooks2000 earned 275 total points
ID: 11921124
Your welcome :)
0

Featured Post

Automating Your MSP Business

The road to profitability.
Delivering superior services is key to ensuring customer satisfaction and the consequent long-term relationships that enable MSPs to lock in predictable, recurring revenue. What's the best way to deliver superior service? One word: automation.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

There's a lot of hype surrounding blockchain technology. Here's how it works and some of the novel ways it' s now being used - including for data protection.
Many old projects have bad code, but the budget doesn't exist to rewrite the codebase. You can update this code to be safer by introducing contemporary input validation, sanitation, and safer database queries.
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

752 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question