Skip to main content

Posts

Featured

Detecting Brute Force Attack - Wireshark

  There are a variety of network attacks that are visible over the network.  From DOS, MiTM, Network Scans, Spoofing and then to what we are discussing today, Brute Force Attacks. Brute Froce(BF) can also be referred to as a dictionary attack.  How a BF attack works is that a piece of software, perhaps hydra, cycles through a wordlist containing thousands of potential user/passwords.  For each attempt to login a connection is established and authentication is attempted.  If the authentication fails then the software will keep going till it finds the correct combination. BF attacks are noisy and create a lot of network traffic.  As far as network attacks go they are the equivalent of bashing a baseball bat against a door until the door gives way.  If that were happening at your house, you would likely notice.  These are my steps to discovering BF attack in your network. 1. "Drive-By" I always start here.  I have never heard anyone else do it.  But it is so useful because there

Latest posts

Image

What's Happening With RedBlue Labs!

Image

NSE:clock-skew (EXAMPLE)

Image

How to Use linPEAS.sh and linux-exploit-suggester.pl

Image

Are Professional Certs a Waste of Time?

Image

Spam on Blogger (Anatomy of SPAM comments)

Image

Capture Filter VS. Display Filter

Image

Enumerating and Exploiting SAMBA