[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[ale] Kali linux
- Subject: [ale] Kali linux
- From: rajaw at c64.us (Raj Wurttemberg)
- Date: Thu, 1 Jan 2015 00:42:16 -0500
- In-reply-to: <CABq+2YQZaOkV71KPVX3-Y0f6UyGZZOPXu0hyFRJcamG2V9Mz1g@mail.gmail.com>
- References: <CABq+2YQZaOkV71KPVX3-Y0f6UyGZZOPXu0hyFRJcamG2V9Mz1g@mail.gmail.com>
Have you tried implementing fail2ban on your web server instead?
http://www.fail2ban.org/wiki/index.php/Main_Page
or maybe the mod_evasive Apache module?
http://www.zdziarski.com/blog/?page_id=442
Kind regards,
Raj
From: ale-bounces at ale.org [mailto:ale-bounces at ale.org] On Behalf Of William Wylde
Sent: Wednesday, December 31, 2014 11:06 PM
To: Atlanta Linux Enthusiasts
Subject: [ale] Kali linux
I run a personal webserver on an isolated connection, and my logs reveal hundreds of failed log- in attempts (particularly from china). Nmap of the various ips reveal suspiciously open ports which make me think that the attacks may be coming from a zombie-box. I intensely hate bot-nets, and have developed a desire to track them and destroy as many as I can find- whomever is running them, thus I have recently installed kali in an openbox VM. Anybody have any experience with using kali in tracking and destroying such nets?
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mail.ale.org/pipermail/ale/attachments/20150101/12874a42/attachment.html>