当前位置:网站首页>6-6 vulnerability exploitation SSH security defense
6-6 vulnerability exploitation SSH security defense
2022-07-07 02:33:00 【Mountain Rabbit 1】
SSH Modify the default port
By default ,SSH Use 22 port . For the sake of safety , Generally, the default port will be modified .
modify 22 For other port numbers , Thus, our listening port is modified
Be careful : You must restart after modification SSH service , Only in this way can our configuration file , In the process of restarting , Reload , Thus effective .
Turn on ubuntu Of ssh service function , stay kali Detect in the middle
nc 192.168.0.104 22
stay ubuntu among , Modify port number
cd /etc/ssh/
ls
sudo gedit sshd_config
2222
service ssh restart
service ssh status
netstat -pantu
nc 192.168.0.104 22
nc 192,168.0.104 2222
Modify the function of the default port , So we can't use it directly 22 Port number connection , Further detection is needed , Detection ssh Listening port , To make the corresponding connection
SSH Set up PGP Sign in
By default ,SSH Use user name and password for remote login , Will cause violent cracking , Keep trying user names and passwords , So as to log in to the system , In order to prevent this process , adopt putty This software , To generate the corresponding private key , Configure the private key , Authentication , So that we can log in without user password , More secure , Prevent violent cracking
Generate SSH Key pair , Use puttygen.
Download link :https://www.chiark.greenend.org/~sgtatham/putty/latest.html
Click on Generate Generate the private key
Click on save private key, It will be generated on the desktop .ppk, This name can also be named by yourself
SSH Set up PGP Sign in
Use ssh-keygen Command in Linux Generate .ssh Catalog , stay .ssh Create a new key storage file authorized_keys, And copy the private key file to .ssh Under the table of contents . Use command puttygen -L “ Copy the private key file ”, Copy content to authorized_keys In file .
ssh-keygen
This time will be in /home/liuxiaoyang/ Generate hidden directory under .ssh, Switch to .ssh, new directory authorized_keys
SSH Set up PGP Sign in
Use Putty The client loads the private key file to connect .
Click on auth
After loading , We are connecting , You don't need to enter the corresponding connection password , Only need Data Enter the user name in
cd ~
pwd
ls -alh
cd .ssh/
ls
puttygen -L private.ppk
gedit authorized_keys
Paste the content here , Preservation , After saving , We have one aythorized_keys file
This is the time , We can do that windows Next , Or installed under other systems ppy, Under the client software , Connect ssh, It uses PGP Connect
SSH Defend against brute force cracking user accounts
Set up pgp To prevent violent cracking , But we can still log in with account and password
stay linux You can configure that you cannot log in with user name and password , Use only SSH PGP How to verify login . Evaded SSH Brute force .
Problems arise : Cannot log in with user password , There are complex operations to a large extent .
for instance , There are many administrators in our current system , Cannot log in with user name and password , Everyone needs PPT file , To log in , It will be a lot of work and operation
cd /etc/ssh/
sudo gedit sshd_config
service ssh restart
service ssh status
below , We are kali Login with user name and password , To verify that
ssh [email protected]
ssh [email protected] -p 2222
Because we can't log in , So brute force software , Is failure
iptables Set threshold to prevent brute force cracking
use iptables Firewall to prevent brute force cracking , We can set the corresponding threshold , After we try to login three times , Just lock the login , Makes it impossible for him to log in
utilize Iptables Error validating multiple connections , Lock the account 120 second .
sudo iptables -l INPUT -p tcp --dport 22 -i eth0 -m state --state NEW -m recent --set
sudo iptables -l INPUT -p tcp --dport 22 -i eth0 -m state --state NEW -m recent --update --seconds 120 --hitcount 3 -j DROP
After setting , Reboot required SSH service .
service ssh restart
We can set a longer time , You can only try three combinations in a day , You can only try 1000 combinations a year , When our password setting is complex , Brute force cracking is also a very slow situation , Brute force cracking cannot take effect , Or say , It takes a lot of energy , several tens of years , It may be tens of thousands of years , Can the current dictionary , Guess and solve
边栏推荐
- 安全巡检的工作
- 【软件测试】最全面试问题和回答,全文背熟不拿下offer算我输
- Web3's need for law
- STM32 project -- Topic sharing (part)
- 本周 火火火火 的开源项目!
- Pioneer of Web3: virtual human
- Collection recommandée!! Quel plug - in de gestion d'état flutter est le plus fort? Regardez le classement des manons de l'île, s'il vous plaît!
- What to do when encountering slow SQL? (next)
- 3--新唐nuc980 kernel支持jffs2, Jffs2文件系统制作, 内核挂载jffs2, uboot网口设置,uboot支持tftp
- B站6月榜单丨飞瓜数据UP主成长排行榜(哔哩哔哩平台)发布!
猜你喜欢
你不可不知道的Selenium 8种元素定位方法,简单且实用
Douban average 9 x. Five God books in the distributed field!
人脸识别应用解析
豆瓣平均 9.x,分布式领域的 5 本神书!
This week's hot open source project!
Summer Challenge database Xueba notes (Part 2)~
6-6漏洞利用-SSH安全防御
【论文阅读|深读】ANRL: Attributed Network Representation Learning via Deep Neural Networks
1 -- Xintang nuc980 nuc980 porting uboot, starting from external mx25l
leetcode:736. Lisp 语法解析【花里胡哨 + 栈 + 状态enumaotu + slots】
随机推荐
[unity] upgraded version · Excel data analysis, automatically create corresponding C classes, automatically create scriptableobject generation classes, and automatically serialize asset files
真实项目,用微信小程序开门编码实现(完结)
[leetcode]Search for a Range
Collection recommandée!! Quel plug - in de gestion d'état flutter est le plus fort? Regardez le classement des manons de l'île, s'il vous plaît!
MySQL
[Mori city] random talk on GIS data (II)
[xlua notes] array of lua to array of C #
差异与阵列和阵列结构和链表的区别
[leetcode] day97 remove linked list elements
Ali yunyili: how does yunyuansheng solve the problem of reducing costs and improving efficiency?
3 -- Xintang nuc980 kernel supports JFFS2, JFFS2 file system production, kernel mount JFFS2, uboot network port settings, and uboot supports TFTP
Difference and the difference between array and array structure and linked list
3D laser slam: time synchronization of livox lidar hardware
安全交付工程师
TiFlash 源码阅读(四)TiFlash DDL 模块设计及实现分析
Metaforce force meta universe development and construction - fossage 2.0 system development
Detailed explanation of line segment tree (including tested code implementation)
#yyds干货盘点# 解决名企真题:最大差值
Lumion 11.0软件安装包下载及安装教程
[server data recovery] data recovery case of a Dell server crash caused by raid damage