Daklon

joined 1 year ago
[–] Daklon@beehaw.org 6 points 3 days ago

I'm using simplex without problems. I get all notifications and didn't notice an increased battery drain.

[–] Daklon@beehaw.org 3 points 5 months ago (2 children)

Sadly, they are doing it in spain, the judges recently stated that they can do it, and few days later almost all of the spanish newspappers had it.

[–] Daklon@beehaw.org 2 points 8 months ago

Yes, you can only use it if you where using it in the past, sadly the project seems to be abandoned.

[–] Daklon@beehaw.org 1 points 11 months ago

If I'm bruteforcing a server and each time that I try an username/password my IP gets banned but suddenly one combination allows me to do 4-5 test ( any bigger number than previously) you are potentially telling me that this user is different (it exists) than the previous ones. Therefore you are doing the attack easier for me because now I know which users actually exist in the machine. It doesn't matter if you are locking the attacker after the password was given.

As others told you, using public key auth, non standard ports or even port knocking will be much more useful.

[–] Daklon@beehaw.org 11 points 1 year ago (4 children)

I think is better to not use an standard port and using fail2ban at the same time to avoid automated attacks. If you manage to implent what you are looking for, you are potentially telling an stacker which accounts exist and which not, allowing him to do an easier brute force attack. A typical attacker using a botnet will not be stopped by a single IP being baned, and as son as an IP is banned he will know that this account doesn't exists. Another option is enabling port knocking.