<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: FTP Brute Force attack blocked only after 13 seconds in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/ftp-brute-force-attack-blocked-only-after-13-seconds/m-p/23544#M17169</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This is why continous tcpdump is nice to have &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;First I would verify if the srcip is the same for all 302 attempts.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Second I would guess they was sent with 100 or so concurrent connections which I guess could end up with an situation where more attempts has passed through before the srcip was cut off totally.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I mean the attack was not (just guessing):&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;connect&lt;/P&gt;&lt;P&gt;login&lt;/P&gt;&lt;P&gt;connect&lt;/P&gt;&lt;P&gt;login&lt;/P&gt;&lt;P&gt;...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;but rather&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;connect&lt;/P&gt;&lt;P&gt;connect&lt;/P&gt;&lt;P&gt;connect&lt;/P&gt;&lt;P&gt;...&lt;/P&gt;&lt;P&gt;login&lt;/P&gt;&lt;P&gt;login&lt;/P&gt;&lt;P&gt;login&lt;/P&gt;&lt;P&gt;....&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Edit: As a sidenote most FTP servers have such "anti-hammering" as a setting like filezilla among others which I guess might deal with this better than the FW.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 20 Aug 2012 22:40:47 GMT</pubDate>
    <dc:creator>mikand</dc:creator>
    <dc:date>2012-08-20T22:40:47Z</dc:date>
    <item>
      <title>FTP Brute Force attack blocked only after 13 seconds</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ftp-brute-force-attack-blocked-only-after-13-seconds/m-p/23543#M17168</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Two months ago we correctly set up a rule to block Brute Force attacks on our FTP server in DMZ.&lt;/P&gt;&lt;P&gt;The related information can be found here: &lt;A _jive_internal="true" href="https://live.paloaltonetworks.com/message/16977#16977"&gt;https://live.paloaltonetworks.com/message/16977#16977&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We tested it manually by just entering wrong passwords quickly for the FTP server and after 10 attempts we were blocked from our own FTP server.&lt;/P&gt;&lt;P&gt;The config seemed to be working.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Last week had a real brute force attack on our FTP server in DMZ.&lt;/P&gt;&lt;P&gt;A total of 302 attempts were made in 13 seconds before it was blocked.&lt;/P&gt;&lt;P&gt;According to the documentation I've read it should be blocked after 10 attempts.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I can't find out why it was only blocked after 302 attempts and after 13 seconds.&lt;/P&gt;&lt;P&gt;If anyone could tell me why this happens I would very much appriciate it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hans.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 14 Aug 2012 08:21:46 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ftp-brute-force-attack-blocked-only-after-13-seconds/m-p/23543#M17168</guid>
      <dc:creator>hnederstigt</dc:creator>
      <dc:date>2012-08-14T08:21:46Z</dc:date>
    </item>
    <item>
      <title>Re: FTP Brute Force attack blocked only after 13 seconds</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ftp-brute-force-attack-blocked-only-after-13-seconds/m-p/23544#M17169</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This is why continous tcpdump is nice to have &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;First I would verify if the srcip is the same for all 302 attempts.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Second I would guess they was sent with 100 or so concurrent connections which I guess could end up with an situation where more attempts has passed through before the srcip was cut off totally.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I mean the attack was not (just guessing):&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;connect&lt;/P&gt;&lt;P&gt;login&lt;/P&gt;&lt;P&gt;connect&lt;/P&gt;&lt;P&gt;login&lt;/P&gt;&lt;P&gt;...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;but rather&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;connect&lt;/P&gt;&lt;P&gt;connect&lt;/P&gt;&lt;P&gt;connect&lt;/P&gt;&lt;P&gt;...&lt;/P&gt;&lt;P&gt;login&lt;/P&gt;&lt;P&gt;login&lt;/P&gt;&lt;P&gt;login&lt;/P&gt;&lt;P&gt;....&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Edit: As a sidenote most FTP servers have such "anti-hammering" as a setting like filezilla among others which I guess might deal with this better than the FW.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 20 Aug 2012 22:40:47 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ftp-brute-force-attack-blocked-only-after-13-seconds/m-p/23544#M17169</guid>
      <dc:creator>mikand</dc:creator>
      <dc:date>2012-08-20T22:40:47Z</dc:date>
    </item>
  </channel>
</rss>

