t***y 发帖数: 741 | 1 I run SSH deamon on tomato firmware on a non-standard port. When using NMap
to scan the router from external, NMap shows all ports are filtered (no open
ports). While when I scan my openSUSE 11.3 box with openSSH, NMap discovers
my SSH server which is run on a non-standard port.
Anybody know how tomato makes SSH port stealthy? | m******9 发帖数: 104 | 2 You can tell when you are using ssh for access from external? | t***y 发帖数: 741 | 3 I am not sure about your question.
When I scan my router which is running dropbear (SSH daemon), NMap did not discover the SSH port. However NMap discovered the openSSH server on the openSUSE box. Both dropbear and openSSH are run on non-default ports.
Basically I am trying to figure out how tomato or dropbear does this, so I can configure openSSH to the same effect.
I assumed tomato does that by drop port scan packets, however I could not find anything in the log.
【在 m******9 的大作中提到】 : You can tell when you are using ssh for access from external?
|
|