<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Dictionary Attacks in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/dictionary-attacks/m-p/928949#M79646</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You *might* (I've never tried) be able to use application inspection capability of the ASA to drop this traffic, although it would be limited and much easier/robust to use the IDS functionality.  You could create a regex based class-map.  In the document link provided by Farrukh, look for this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;hostname(config-cmap)# match [not] username regex [regex_name | &lt;/P&gt;&lt;P&gt;class regex_class_name]&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If someone tries to login as either root or administrator, have them electrocuted...wait, I guess that's not one of the options.  either drop,reset, or rate limit the connection (I haven't tested but it might be fun to see if you can "tar pit" them using rate limiting).&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 26 Jun 2008 20:54:08 GMT</pubDate>
    <dc:creator>mhellman</dc:creator>
    <dc:date>2008-06-26T20:54:08Z</dc:date>
    <item>
      <title>Dictionary Attacks</title>
      <link>https://community.cisco.com/t5/network-security/dictionary-attacks/m-p/928944#M79638</link>
      <description>&lt;P&gt;I want to have our 5510 detect when we are getting a dictionary attack on our FTP server. Do I need the IPS module in order to this or can this be done on the base unit as well?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you. &lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 11:09:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dictionary-attacks/m-p/928944#M79638</guid>
      <dc:creator>robertgile1</dc:creator>
      <dc:date>2019-03-10T11:09:52Z</dc:date>
    </item>
    <item>
      <title>Re: Dictionary Attacks</title>
      <link>https://community.cisco.com/t5/network-security/dictionary-attacks/m-p/928945#M79639</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This is all the ASA can do:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/docs/security/asa/asa72/configuration/guide/inspect.html#wp1234738" target="_blank"&gt;http://www.cisco.com/en/US/docs/security/asa/asa72/configuration/guide/inspect.html#wp1234738&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Anything else would require some other tool (IPS etc.)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Farrukh&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 25 Jun 2008 14:15:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dictionary-attacks/m-p/928945#M79639</guid>
      <dc:creator>Farrukh Haroon</dc:creator>
      <dc:date>2008-06-25T14:15:30Z</dc:date>
    </item>
    <item>
      <title>Re: Dictionary Attacks</title>
      <link>https://community.cisco.com/t5/network-security/dictionary-attacks/m-p/928946#M79641</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Robert,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also see if you can have it lock the account for 1 hour after 3 bad logins attempts&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This will put a road block in the attack the size of a football field.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;~TS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 26 Jun 2008 20:11:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dictionary-attacks/m-p/928946#M79641</guid>
      <dc:creator>TradeSecrets</dc:creator>
      <dc:date>2008-06-26T20:11:21Z</dc:date>
    </item>
    <item>
      <title>Re: Dictionary Attacks</title>
      <link>https://community.cisco.com/t5/network-security/dictionary-attacks/m-p/928947#M79643</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;TS,&lt;/P&gt;&lt;P&gt;   Thats a good idea, but it is for accounts that don't even exist like Administrator and random people's names. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I might just change the default port that FTP uses to something obscure. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 26 Jun 2008 20:25:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dictionary-attacks/m-p/928947#M79643</guid>
      <dc:creator>robertgile1</dc:creator>
      <dc:date>2008-06-26T20:25:22Z</dc:date>
    </item>
    <item>
      <title>Re: Dictionary Attacks</title>
      <link>https://community.cisco.com/t5/network-security/dictionary-attacks/m-p/928948#M79645</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Robert,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also some Cisco appliance's like the IDMS2 only allow logging from certain sub nets.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you aren't on the right sub net. It will block you from even trying a logon attempt. This creates yet another layer of protection and more work for the attacker.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I personally feed all log in activity to our SIM. which is correlated to tell me who is trying to break into what.&lt;/P&gt;&lt;P&gt;~TS&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 26 Jun 2008 20:34:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dictionary-attacks/m-p/928948#M79645</guid>
      <dc:creator>TradeSecrets</dc:creator>
      <dc:date>2008-06-26T20:34:08Z</dc:date>
    </item>
    <item>
      <title>Re: Dictionary Attacks</title>
      <link>https://community.cisco.com/t5/network-security/dictionary-attacks/m-p/928949#M79646</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You *might* (I've never tried) be able to use application inspection capability of the ASA to drop this traffic, although it would be limited and much easier/robust to use the IDS functionality.  You could create a regex based class-map.  In the document link provided by Farrukh, look for this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;hostname(config-cmap)# match [not] username regex [regex_name | &lt;/P&gt;&lt;P&gt;class regex_class_name]&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If someone tries to login as either root or administrator, have them electrocuted...wait, I guess that's not one of the options.  either drop,reset, or rate limit the connection (I haven't tested but it might be fun to see if you can "tar pit" them using rate limiting).&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 26 Jun 2008 20:54:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dictionary-attacks/m-p/928949#M79646</guid>
      <dc:creator>mhellman</dc:creator>
      <dc:date>2008-06-26T20:54:08Z</dc:date>
    </item>
    <item>
      <title>Re: Dictionary Attacks</title>
      <link>https://community.cisco.com/t5/network-security/dictionary-attacks/m-p/928950#M79649</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Oh I like where this is going! If only I could get the 110v to go across the internet &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I also like the tarpit idea. I would rather drop them and add the to a deny rule in the firewall if they attempt X number of logins in a minute. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 26 Jun 2008 21:08:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dictionary-attacks/m-p/928950#M79649</guid>
      <dc:creator>robertgile1</dc:creator>
      <dc:date>2008-06-26T21:08:02Z</dc:date>
    </item>
  </channel>
</rss>

