Solved

Brute forcing SSH and FTP

Posted on 2004-08-26
5
205 Views
Last Modified: 2010-04-11
What is the best tool to audit accounts on a ssh and ftp box? Hydra? Brutus?
This is being done for work before the HIPPA audits lol
Thanks
0
Comment
Question by:dissolved
  • 2
5 Comments
 
LVL 8

Assisted Solution

by:pjcrooks2000
pjcrooks2000 earned 275 total points
ID: 11918798
I am not sure you will be able to listen in on ssh as it uses Secure shell, basically the messages are encrypted.. I reckon you know that already.  ftp is a different kettle of fish.  If your running an ftp server then there should be logging capabilities included and if not then replace your ftp server so that you do have logging capabilities.

As for the ssh I will be inerested to learn if it is crackable, although I did see a security issue related to it a while back on the cert advisory website.  I think they have patched it by now so... good luck with that!  I would not imagine you can eavesdrop on it though.

:)
0
 
LVL 5

Assisted Solution

by:rsriprac
rsriprac earned 225 total points
ID: 11921065
I would reccomend running Nessus:

http://www.nessus.org/

I think that HIPPA cert does not go that far into bruting for weak login/password.  I'd be more worried with vurnabilities in the software.  However nessus does, I believe, do test of default/weak logins and pass.

-Ram
0
 

Author Comment

by:dissolved
ID: 11921105
Thanks guys!
0
 
LVL 8

Accepted Solution

by:
pjcrooks2000 earned 275 total points
ID: 11921124
Your welcome :)
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Nothing in an HTTP request can be trusted, including HTTP headers and form data.  A form token is a tool that can be used to guard against request forgeries (CSRF).  This article shows an improved approach to form tokens, making it more difficult to…
You may have a outside contractor who comes in once a week or seasonal to do some work in your office but you only want to give him access to the programs and files he needs and keep privet all other documents and programs, can you do this on a loca…
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, just open a new email message. In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…

910 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

19 Experts available now in Live!

Get 1:1 Help Now