SlideShare a Scribd company logo
SSH DDOS Attack : Avoid By Modern
Lock On AWS.
WHAT IS SSH?
● SSH stands for Secure Shell, an encrypted protocol to provide secure
connections over unsecured networks.
● To send data back and forth between clients and servers.
● Uses encryption, so attackers can’t examine the exchanges to access private
data.
WHAT IS DDOS?
● Denial of Service (DoS) is an attack, carried out by a single attacker, which
attempts to make a website or application unavailable to the end users.
● Distributed Denial of Service (DDoS) is an attack, carried out by multiple
attackers either controlled or compromised by a group of collaborators, which
generates a flood of requests to the application making in unavailable to the
legitimate end users.
Distrubuted Denial Of Service (DDoS) Attack
Without SSH Lock
DDoS Attack
Modern SSH Lock.
★ Change SSH Port :
○ Replace SSH port 22 by any other port which will not reserved.
★ Allow trusted network & make users knock for access :
○ Allow only trusted network into security group and allow only well-
known users for access.
★ Avoid configuration weakness :
○ Use SSH-2 protocol
○ Don’t ever allow users to work without passwords, set
PermitEmptyPasswords no.
○ Set PermitRootLogin no so nobody can log in as root. Users who need
to connect and work as root should log in as common users (that is,
unprivileged and as restricted as possible) and then use sudo.
Tips For SSH Hardening & Prevent
Attack.
Tips For SSH Hardening & Prevent
Attack.
★ Prefer key over passwords
○ Centralized key storage
○ Key rotation
★ Limit password base login
○ Set maximum number of retries MaxAuthTries 3, so after 3 wrong
password attempts, the connection will be broken.
★ Continuous monitoring
○ Add server into daily monitoring checklist.
★ Usage logging
○ Keep watch on ssh auth logging.

More Related Content

PDF
Rootconf2019
PDF
Introducing Cloakcast
PPTX
TLS v1.3
PDF
talk-ta3m-crypto-tools-workshop
ODP
Tls 1.3
PPTX
TLS 1.3: Everything You Need to Know - CheapSSLsecurity
PDF
Let's Encrypt! Wait. Why? How? - WC Pune
PDF
Let's Encrypt! Wait. Why? How?
Rootconf2019
Introducing Cloakcast
TLS v1.3
talk-ta3m-crypto-tools-workshop
Tls 1.3
TLS 1.3: Everything You Need to Know - CheapSSLsecurity
Let's Encrypt! Wait. Why? How? - WC Pune
Let's Encrypt! Wait. Why? How?

What's hot (6)

PDF
Getting started with HTTPS | LumoSpark webinar
PPTX
Concurrenty control
PDF
Microservices Security Landscape
PDF
Defense in Depth: Securing your new Kubernetes cluster from the challenges th...
PPTX
UTD Computer Security Group - Cracking the domain
PDF
BSides Rochester 2018: Chaim Sanders: How the Cookie Crumbles: Modern HTTP St...
Getting started with HTTPS | LumoSpark webinar
Concurrenty control
Microservices Security Landscape
Defense in Depth: Securing your new Kubernetes cluster from the challenges th...
UTD Computer Security Group - Cracking the domain
BSides Rochester 2018: Chaim Sanders: How the Cookie Crumbles: Modern HTTP St...
Ad

Similar to AWS SSH Bastion (20)

PPT
Presentation nix
PPT
Presentation nix
PPTX
A presentation on SSH (Secure Shell or Secure Socket Shell)
PPT
Secure shell ppt
PPTX
Security Concepts - Linux
PDF
Configure and Secure SSH - RHCSA (RH124).pdf
PPT
5. centos security
PPT
Introduction to SSH
PPTX
PPTX
Securing SSH Access by Pavel Shukhman at OWASP Ottawa Meetup, August 2019
PDF
An introduction to SSH
PPTX
SSh_part_1.pptx
PPTX
Ssh (The Secure Shell)
PPTX
SSH Brute Force Attack
PDF
OpenSSH: keep your secrets safe
PPT
SSH.ppt
PPTX
Secure shell
PPT
Secure shell protocol
PDF
SSH.pdf
PPTX
SSH Keys: Security Asset or Liability?
Presentation nix
Presentation nix
A presentation on SSH (Secure Shell or Secure Socket Shell)
Secure shell ppt
Security Concepts - Linux
Configure and Secure SSH - RHCSA (RH124).pdf
5. centos security
Introduction to SSH
Securing SSH Access by Pavel Shukhman at OWASP Ottawa Meetup, August 2019
An introduction to SSH
SSh_part_1.pptx
Ssh (The Secure Shell)
SSH Brute Force Attack
OpenSSH: keep your secrets safe
SSH.ppt
Secure shell
Secure shell protocol
SSH.pdf
SSH Keys: Security Asset or Liability?
Ad

Recently uploaded (20)

PDF
Understanding Forklifts - TECH EHS Solution
PPTX
Essential Infomation Tech presentation.pptx
PDF
Why TechBuilder is the Future of Pickup and Delivery App Development (1).pdf
PDF
Which alternative to Crystal Reports is best for small or large businesses.pdf
PPTX
VVF-Customer-Presentation2025-Ver1.9.pptx
PDF
Internet Downloader Manager (IDM) Crack 6.42 Build 42 Updates Latest 2025
PDF
Navsoft: AI-Powered Business Solutions & Custom Software Development
PDF
Raksha Bandhan Grocery Pricing Trends in India 2025.pdf
PDF
Adobe Premiere Pro 2025 (v24.5.0.057) Crack free
PDF
T3DD25 TYPO3 Content Blocks - Deep Dive by André Kraus
PDF
EN-Survey-Report-SAP-LeanIX-EA-Insights-2025.pdf
PDF
Wondershare Filmora 15 Crack With Activation Key [2025
PDF
PTS Company Brochure 2025 (1).pdf.......
PDF
How to Choose the Right IT Partner for Your Business in Malaysia
PDF
Adobe Illustrator 28.6 Crack My Vision of Vector Design
PDF
top salesforce developer skills in 2025.pdf
PPTX
Odoo POS Development Services by CandidRoot Solutions
PDF
Claude Code: Everyone is a 10x Developer - A Comprehensive AI-Powered CLI Tool
PDF
Internet Downloader Manager (IDM) Crack 6.42 Build 41
PDF
Odoo Companies in India – Driving Business Transformation.pdf
Understanding Forklifts - TECH EHS Solution
Essential Infomation Tech presentation.pptx
Why TechBuilder is the Future of Pickup and Delivery App Development (1).pdf
Which alternative to Crystal Reports is best for small or large businesses.pdf
VVF-Customer-Presentation2025-Ver1.9.pptx
Internet Downloader Manager (IDM) Crack 6.42 Build 42 Updates Latest 2025
Navsoft: AI-Powered Business Solutions & Custom Software Development
Raksha Bandhan Grocery Pricing Trends in India 2025.pdf
Adobe Premiere Pro 2025 (v24.5.0.057) Crack free
T3DD25 TYPO3 Content Blocks - Deep Dive by André Kraus
EN-Survey-Report-SAP-LeanIX-EA-Insights-2025.pdf
Wondershare Filmora 15 Crack With Activation Key [2025
PTS Company Brochure 2025 (1).pdf.......
How to Choose the Right IT Partner for Your Business in Malaysia
Adobe Illustrator 28.6 Crack My Vision of Vector Design
top salesforce developer skills in 2025.pdf
Odoo POS Development Services by CandidRoot Solutions
Claude Code: Everyone is a 10x Developer - A Comprehensive AI-Powered CLI Tool
Internet Downloader Manager (IDM) Crack 6.42 Build 41
Odoo Companies in India – Driving Business Transformation.pdf

AWS SSH Bastion

  • 1. SSH DDOS Attack : Avoid By Modern Lock On AWS.
  • 2. WHAT IS SSH? ● SSH stands for Secure Shell, an encrypted protocol to provide secure connections over unsecured networks. ● To send data back and forth between clients and servers. ● Uses encryption, so attackers can’t examine the exchanges to access private data. WHAT IS DDOS? ● Denial of Service (DoS) is an attack, carried out by a single attacker, which attempts to make a website or application unavailable to the end users. ● Distributed Denial of Service (DDoS) is an attack, carried out by multiple attackers either controlled or compromised by a group of collaborators, which generates a flood of requests to the application making in unavailable to the legitimate end users.
  • 3. Distrubuted Denial Of Service (DDoS) Attack Without SSH Lock DDoS Attack
  • 5. ★ Change SSH Port : ○ Replace SSH port 22 by any other port which will not reserved. ★ Allow trusted network & make users knock for access : ○ Allow only trusted network into security group and allow only well- known users for access. ★ Avoid configuration weakness : ○ Use SSH-2 protocol ○ Don’t ever allow users to work without passwords, set PermitEmptyPasswords no. ○ Set PermitRootLogin no so nobody can log in as root. Users who need to connect and work as root should log in as common users (that is, unprivileged and as restricted as possible) and then use sudo. Tips For SSH Hardening & Prevent Attack.
  • 6. Tips For SSH Hardening & Prevent Attack. ★ Prefer key over passwords ○ Centralized key storage ○ Key rotation ★ Limit password base login ○ Set maximum number of retries MaxAuthTries 3, so after 3 wrong password attempts, the connection will be broken. ★ Continuous monitoring ○ Add server into daily monitoring checklist. ★ Usage logging ○ Keep watch on ssh auth logging.