Skip to content

nirmeir/Fuzzing-Detection

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

2 Commits
 
 
 
 

Repository files navigation

Fuzzing_SSH

Fuzzing-Detector

d64c474d15cfc591e60c809ad7826101

Detecting Fuzzing Attacks

About The Project

This script detects fuzzing attacks on SSH protocol. A fuzzing attack is an automated process used to find application vulnerabilities. It consists of inserting massive amounts of random data, or fuzz, into source code and observing the outcomes. A successful fuzzing attack brings areas prone to malicious cyber intrusion, code insertion, and data retrieval to light, putting applications in danger of a serious application attack. With this script we would like to avoid this attack.

  • The Secure Shell (SSH) is a protocol for secure remote login and other secure network services over an insecure network. The SSH transport layer is a secure, low level transport protocol.
  • Information about SSH protocol is taken from: https://datatracker.ietf.org/doc/html/rfc4253#section-4.2
  • Informarion about Fuzzing is taken from: https://www.contrastsecurity.com/knowledge-hub/glossary/fuzzing
  • This script is detecting fuzzing attacks on your machine by inspecting log files.
  • after inspecting logs on a Kali Linux machine, I identified that the date format of the logs is: %b %d %H:%M:%S
  • %b - The first 3 letters of the month, the first is uppercase.
  • %d - Numeric day.
  • %H:%M:%S - 00:00:00 Hours:Minutes:Seconds If the date is written differently on the machine you are running the script on, note that you should change the date format so it will compile and run. PLEASE NOTE THAT my whole program depends on correctly reading from log files.

Usage

fuzzingDetected

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages