How wise is it to use a tool for portspoofing at your server to confuse attackers?

I came across this tool recently https://github.com/drk1wi/portspoof

How efficient will it be to use it to confuse hackers doing port scanning? If it’s actually going to be pretty efficient, why hasn’t it caught up so far?… Continue reading How wise is it to use a tool for portspoofing at your server to confuse attackers?

Can I spoof my user agent so that the type of device I’m using doesn’t show up?

I was looking into spoofing a user agent but all that has come up so far is spoofing the browser type. However I can still see what kind of device I am using (tbh I’m not really even sure why someone would want to spoof the b… Continue reading Can I spoof my user agent so that the type of device I’m using doesn’t show up?

Posted in Uncategorized | Tagged

Can a malicious SSH server successfully *pretend* to know a client’s public key?

Yes, I know that after giving an SSH public key to someone else, one should always assume that it might have been swiftly published somewhere. (For instance, give your SSH public key to GitHub, and GitHub will publish it. E.g… Continue reading Can a malicious SSH server successfully *pretend* to know a client’s public key?