In this blog I will go through the steps necessary to set-up an automatic reverse SSH tunnel between a client machine sitting in a restricted environment and a server that you control in your home/office/cloud. The reverse SSH tunnel will be encapsulated within a SSL tunnel over port 443 to evade network security appliances/firewalls.
If you have a DD-WRT powered router then you already know how powerful and feature-full it is, compared to a standard out-of-the-box ISP provided router.
This article will be about making use of the features that DD-WRT provides out of the box, as well as some other ‘hacks’ we can use to boost the wireless signal in your home or office.
The ones I will talk about today are as follows (in order of usefulness and ease):
- Wireless channel selection
- Update firmware and/or drivers!
- Transmit (Tx) Power
- Beacon Interval
This article will serve as a quick tutorial on installing and configuring fail2ban on an Amazon EC2 instance.
I like to think of fail2ban as a ‘second line’ of defence against systematic attempts to break through and access SSH on a server.
First line of defence should always be disabling the root log-in, using strong passwords/using private keys for log-on, etc.
It can do a lot more than protecting against brute-force SSH attacks using regex’s but that is not in the scope of this tutorial.