<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic FTP Brute Force Attack in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ftp-brute-force-attack/m-p/2144344#M53845</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm getting lots of login attempt attack but why doesnt ips deny them?&lt;/P&gt;&lt;P&gt;One source ip is trying to login with different username/pass combinations. Which signature should be enabled for this?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards.&lt;/P&gt;</description>
    <pubDate>Sun, 10 Mar 2019 12:56:41 GMT</pubDate>
    <dc:creator>blackswans</dc:creator>
    <dc:date>2019-03-10T12:56:41Z</dc:date>
    <item>
      <title>FTP Brute Force Attack</title>
      <link>https://community.cisco.com/t5/network-security/ftp-brute-force-attack/m-p/2144344#M53845</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm getting lots of login attempt attack but why doesnt ips deny them?&lt;/P&gt;&lt;P&gt;One source ip is trying to login with different username/pass combinations. Which signature should be enabled for this?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards.&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 12:56:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftp-brute-force-attack/m-p/2144344#M53845</guid>
      <dc:creator>blackswans</dc:creator>
      <dc:date>2019-03-10T12:56:41Z</dc:date>
    </item>
    <item>
      <title>Re: FTP Brute Force Attack</title>
      <link>https://community.cisco.com/t5/network-security/ftp-brute-force-attack/m-p/2144345#M53847</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We do not have a specific signature for FTP bruteforce. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can use Sig 6009-0 SYN Flood DOS. This sig is generic to all ports, so you can clone sig 6009-0 and change destination port range to 21.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please let me know if this helps. We may release a signature for FTP bruteforce in future.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Pradeep&amp;nbsp; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 16 Apr 2013 19:37:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftp-brute-force-attack/m-p/2144345#M53847</guid>
      <dc:creator>pradnaga</dc:creator>
      <dc:date>2013-04-16T19:37:31Z</dc:date>
    </item>
    <item>
      <title>Re: FTP Brute Force Attack</title>
      <link>https://community.cisco.com/t5/network-security/ftp-brute-force-attack/m-p/2144346#M53848</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ok I cloned the signature and I will let you know the results.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 17 Apr 2013 05:58:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftp-brute-force-attack/m-p/2144346#M53848</guid>
      <dc:creator>blackswans</dc:creator>
      <dc:date>2013-04-17T05:58:40Z</dc:date>
    </item>
    <item>
      <title>FTP Brute Force Attack</title>
      <link>https://community.cisco.com/t5/network-security/ftp-brute-force-attack/m-p/2144347#M53850</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;blackswans, you may also be able to use: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Signature 6250-0 - FTP Authorization Failure&lt;/P&gt;&lt;P&gt;"Triggers when a user has failed to authenticate three times in a row, while trying to establish an FTP session.&lt;/P&gt;&lt;P&gt;This may be indicative of a brute force password guessing attempt, and may be viewed as an attempt to gain unauthorized access to system resources."&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Depending on the type of brute force traffic (or dictionary) you could also use: &lt;/P&gt;&lt;P&gt;Signature 18920-0 - Administrative FTP User Failed To Authenticate&lt;/P&gt;&lt;P&gt;"This signature will generate an alert of the "root or "administrator" ftp users fail to authenticate four or more times. This could be an indicator of brute force attempts to guess passwords. However, this signature will also alert if a user types the incorrect password four times in succession."&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;These signatures will also alert if a user (or automated login/tool) types the incorrect password multiple times in succession. So you will have to be aware of the possible issues with benign failed login attempts and tune the signature(s) accordingly. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you have a Cisco ASA or PIX firewall you can also you the ftp fixup command to assist with the auditing and handling of FTP traffic and anomalous FTP activity. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 17 Apr 2013 16:12:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftp-brute-force-attack/m-p/2144347#M53850</guid>
      <dc:creator>largenb</dc:creator>
      <dc:date>2013-04-17T16:12:11Z</dc:date>
    </item>
  </channel>
</rss>

