![]() |
FlashFXP BETA Area / Password Guessing
9:00 am PST someone from the address 213-140-8-167.fastres.net started running a password guesser against the FlashFXP BETA download area. After roughly 3 hours of continual attacks apache gave out and the server crashed.
2:00 pm PST apache has been restart. Please respect our server |
Seems a static IP, save the logs and if the attack continues contact with his/her ISP about that, just my opinion.
|
FBI
Call the FEDz! Update your UNIX software. Make the password count tries and ban IP for a day or so if failed attempts gets over like 25.
|
25?
More like 5 times... how hard can it be to type a bloody serial and a password? And yes, sounds like apache needs a makeover too. |
We've made some changes to better protect our server and will continue to do so.
We're currently looking into a password protection system that will auto block IP addresses after so many tries. Preferably something free or cheap. |
Quote:
Simple and sweet. I have a modified version which auto bans IP address. |
All times are GMT -5. The time now is 08:40 PM. |
Powered by vBulletin® Version 3.8.11 Alpha 3
Copyright ©2000 - 2025, vBulletin Solutions, Inc.
Parts of this site powered by vBulletin Mods & Addons from DragonByte Technologies Ltd. (Details)