|
Full Disclosure
mailing list archives
Re: targetted SSH bruteforce attacks
From: bugs () fbi dhs org
Date: Sat, 26 Jun 2010 18:59:56 -0400 (EDT)
A Dimarts 22 Juny 2010 04:06:03, bugs () fbi dhs org va escriure:
If you guys are interested I have a list of login/password combos they
use:
http://vapid.dhs.org/ssh-attack-passwd.txt
]$ sort -u ssh-attack-passwd.txt > ssh-attack-passwd.2.txt
]$ wc -l ssh-attack-passwd.*
11701 ssh-attack-passwd.2.txt
16653 ssh-attack-passwd.txt
And clean about 30% of repeated entries.
yea, thats just the raw log from my dummy ssh daemon.
--
Marc Olivé
Grup Blau
www.grupblau.com
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
By Date
By Thread
Current thread:
- Re: targetted SSH bruteforce attacks, (continued)
Re: targetted SSH bruteforce attacks Xin LI (Jun 17)
Re: targetted SSH bruteforce attacks Mr. MailingLists (Jun 17)
Re: targetted SSH bruteforce attacks Mark Byrne (Jun 17)
Re: targetted SSH bruteforce attacks Pavel Kankovsky (Jun 18)
Re: targetted SSH bruteforce attacks Ashish SHUKLA (Jun 18)
Re: targetted SSH bruteforce attacks Ryan Castellucci (Jun 23)
|