![]() Thirdly, only allow specific users to authenticate into your SSH server, and should always have your services running under different user accounts. This helps cut down on the number of attacks that default to port 22 with the intention of breaking into your SSH server. Secondly, change your SSH port to something other than 22. So setup your authentication keys and disable password authentication in your SSH server. Going through their logs i was literally able to pick out which dictionaries the attackers used and the users never even knew that they were broken into until even weeks or months later. First of all make sure you're not using passwords for your authentication, i can't even count how many times I've seen people get dictionary attacked because they used passwords for their authentication. There's a few things you could do that only takes a few minutes and really helps improve your security.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |