Should I Stop Caring and Let IP Address Reputation Sort Them Out? https://nxdomain.no/~peter/should_i_stop_caring_and_let_ip_reputation_sort_them_out.html

How long does data on misbehaving hosts on the Internet stay relevant in an IP Address Reputation context?

Link to poll within (on for a week, 4 days left, please *do* vote).

#security #passwordguessing #antispam #sshgropers #pop3gropers #blacklists #blocklists #bruteforcers #spam #cybercrime #ipreputation

(repost for the CET-ish crowd, some still in holiday mode, and with graphics of sorts added)

Should I Stop Caring and Let IP Address Reputation Sort Them Out?

For the Monday morning (CET-ish) set:

I have just updated the article "The Hail Mary Cloud And The Lessons Learned" https://nxdomain.no/~peter/hailmary_lessons_learned.html aka field notes from the forever war against #passwordgropers on #ssh and elsewhere, with loads of more references to newer material and data #slowbrutes #hailmarycloud #bruteforcers #cybercrime

All links to my stuff has (at least) a nontracked option .

The Hail Mary Cloud And The Lessons Learned

The topic of #ipv6 support came up at work (as it does sometimes) and a colleague asked, how popular is that protocol, really?

My best data source is the bruteforcers+webtrash data (twice hourly dump https://nxdomain.no/~peter/bruteforcers.txt, see https://nxdomain.no/~peter/badness_enumerated_by_robots.html for explanation, alternatively prettified and G-tracked https://bsdly.blogspot.com/2018/08/badness-enumerated-by-robots.html) and it looks like roughly seven percent of the source addresses for undesirable activity are IPv6, the rest old fashioned #IPv4. #passwordguessing #bruteforcers

I was wondering if there is already #GPU #accelerated #bruteforcers for hash-to-curve
https://datatracker.ietf.org/doc/rfc9380/ out there?
and going beyond just "simple" h2c, 2hashdh prf H(pwd, H2c(pwd)^k) seems to be popular, might as well also inquire about their support. #opaque is one case where this is being used.

does anyone know?

#hashcat #johntheripper /cc @epixoip

RFC 9380: Hashing to Elliptic Curves

This document specifies a number of algorithms for encoding or hashing an arbitrary string to a point on an elliptic curve. This document is a product of the Crypto Forum Research Group (CFRG) in the IRTF.

IETF Datatracker

@pugmiester @[email protected] Thanks for the mention!

The basics are outlined in (at least) https://home.nuug.no/~peter/pf/en/bruteforce.html with some embellishments in https://nxdomain.no/~peter/forcing_the_password_gropers_through_a_smaller_hole.html and links therein (also with nicer formatting but trackers at https://bsdly.blogspot.com/2017/04/forcing-password-gropers-through.html).

And of course The Book of PF (https://nostarch.com/pf3 or reputable bookshops)

#pf #statetracking #bruteforcers #passwordgropers

Turning away the brutes

I decided to write a Ruby micro-framework for writing bruteforcers. In order to test my code, I would need bruteforce-able servers. So I created this bruteforceable repo of various apps and Dockerfiles. Please feel free to contribute some additional servers/Dockerfiles. Currently have FTP and HTTP Basic-Auth, still need HTTP Login Form, SMTP, POP3, IMAP, and RDP. What else am I missing?
https://github.com/ronin-rb/bruteforceable
#bruteforcers #bruteforcing #infosec #dockerfiles
GitHub - ronin-rb/bruteforceable: A collection of bruteforceable apps

A collection of bruteforceable apps. Contribute to ronin-rb/bruteforceable development by creating an account on GitHub.

GitHub
Badness, Enumerated by Robots https://bsdly.blogspot.com/2018/08/badness-enumerated-by-robots.html - yours truly on badness data generated by my silicon pals almost without human intervention #openbsd #ssh #passwords #bruteforcers #spammers
Badness, Enumerated by Robots

A condensed summary of the blocklist data generated from traffic hitting bsdly.net and cooperating sites. After my runbsd.info entry  (pr...