📔
Notes
  • Notes
  • Starting with (n)vim
  • Bluetooth
  • Hacking boot2root/ OSCP notes
  • Capture the flag(CTF)
    • Commonly Used Tools
    • Web
    • Cryptography
    • Forensics
  • Making a boot2root VM
    • Important rules
    • [General things](VM/Make boot2root VM.md)
    • Setting Systemd services
    • Setting fail2ban
  • BugBounty notes for Android
    • General
    • Adb/drozer commands
    • Intents
    • Permissions
    • Activities
    • Broadcast Receivers
    • Content Providers
    • Services
  • BugBounty notes for WEB
    • Authentication
    • CORS
    • General Web
    • HTTP Parameter poisoning
    • IDOR
    • graphql
  • Age of Empires IV
    • Age Of Empires
    • Build Orders
      • English Civ
    • Sheep scouting
Powered by GitBook
On this page
  1. Making a boot2root VM

Setting fail2ban

To setup fail2ban on ubuntu for the SSH port we do the following:

Installation

  • apt install fail2ban

  • Allow SSH through ufw

    • ufw allow ssh

    • ufw enable

Configuration

  • Move the default config file:

    • cp /etc/fail2ban/fail2ban.conf /etc/fail2ban/fail2ban.local

  • Now we can start editing the local copy we made. You can choose not to edit it since the default config is also pretty solid.

  • Now we can configure the jail setting.

    • cp /etc/fail2ban/jail.conf /etc/fail2ban/jail.local

    • now make changes to the local jail file as desired.

PreviousSetting Systemd servicesNextBugBounty notes for Android

Last updated 3 years ago