Distributed, Stealthy Brute Force Password Guessing Attempts - Slicing and Dicing Data from Recent Incidents
Authors: Peter N. M. Hansteen

Date: December 2014
Publication: 7th International Conference on Passwords (Passwords14 Trondheim)
Source 1: http://home.nuug.no/~peter/passwords14/Hansteen_distributed_bruteforce_passwords14.pdf

Abstract or Summary:
The Hail Mary Cloud was a widely distributed, low intensity password guessing botnet that targeted Secure Shell (ssh) servers on the public Internet.

The first activity may have been as early as 2005 [Mobin and Paxson (2013)], our first recorded data start in late 2008. Links to full data and extracts are found in this presentation.

We present the basic behavior and algorithms, and point to possible policies for staying safe(r) from similar present or future attacks, as well as some attacks on other services.

PasswordResearch.com Note: Video of presentation: https://video.adm.ntnu.no/pres/54980b2735b6c

Do you have additional information to contribute regarding this research paper? If so, please email siteupdates@passwordresearch.com with the details.

<-- Back to Authentication Research Paper Index

[Home] [About Us] [News] [Research]

Copyright © 2019 PasswordResearch.com