Войти в систему

Home
    - Создать дневник
    - Написать в дневник
       - Подробный режим

LJ.Rossia.org
    - Новости сайта
    - Общие настройки
    - Sitemap
    - Оплата
    - ljr-fif

Редактировать...
    - Настройки
    - Список друзей
    - Дневник
    - Картинки
    - Пароль
    - Вид дневника

Сообщества

Настроить S2

Помощь
    - Забыли пароль?
    - FAQ
    - Тех. поддержка



Пишет LWN.net ([info]syn_lwnheadline)
@ 2021-03-11 15:03:00


Previous Entry  Add to memories!  Tell a Friend!  Next Entry
[$] Creating an SSH honeypot
Many developers use SSH to access their systems, so it is not surprising
that SSH servers are widely attacked. During the FOSDEM 2021 conference,
Sanja Bonic and Janos Pasztor reported
on their experiment using containers as a way to easily create
SSH honeypots — fake servers that allow administrators to observe the actions of
attackers without risking a production system. The
conversational-style talk walked the audience through the process of
setting up an SSH server to play the role of the honeypot, showed what
SSH attacks look like, and gave a number of suggestions on how to
improve the security of SSH servers.


(Читать комментарии) (Добавить комментарий)