Tagged articles
2 articles
Page 1 of 1
MaGe Linux Operations
MaGe Linux Operations
Jul 30, 2025 · Information Security

7 Proven Ways to Harden SSH and Block Brute‑Force Attacks

This guide walks you through seven practical SSH hardening techniques—from changing the default port and disabling password logins to deploying Fail2ban, IP whitelisting, connection limits, two‑factor authentication, and a honeypot—showing why each step matters and how to implement it securely.

Port ObfuscationPublic Key AuthenticationSSH Security
0 likes · 12 min read
7 Proven Ways to Harden SSH and Block Brute‑Force Attacks
ITPUB
ITPUB
May 24, 2018 · Information Security

How Attackers Exploit UPnP to Bypass DDoS Defenses with Obfuscated Source Ports

Recent DDoS campaigns are using UPnP protocol flaws to hide source‑port information, allowing amplification attacks such as DNS spoofing to evade traditional defenses by routing traffic through compromised IoT routers and manipulating port‑forwarding rules via SOAP requests.

Amplification AttackDDoSPort Obfuscation
0 likes · 6 min read
How Attackers Exploit UPnP to Bypass DDoS Defenses with Obfuscated Source Ports