Dec. 23, 2022, 4:39 p.m. | /u/Interesting_Waltz966

cybersecurity www.reddit.com

Hi there. Appologies if this is the wrong sub, but I'm curious as to the possible repurcussions of running a counter-attacker on the ever-present SSH brute-force attackers. The general idea is to grab the IP attempting to connect to a bait server, then attempt to brute force an SSH connection to that server. If a connection is established, using a basic UN/PWD list, format the system or run a fork bomb on it depending on permission level acquired.

This operation …

botnets counter counter-hack cybersecurity hack ssh

Information Security Problem Manager

@ Deutsche Bank | Bucharest

Information System Security Officer

@ Booz Allen Hamilton | USA, VA, Chantilly (15009 Conference Ctr Dr)

Senior Account Executive - Cybersecurity

@ OpenText | Virtual, CA

Grants Compliance Senior Specialist

@ Plan International | Bamako, Mali

Sr. Cybersecurity Engineer- Tenable

@ phia, LLC | Arlington, VA

Portfolio Manager- Enterprise Information Security Auditing

@ American Chemical Society | Columbus, OH, US, 43202