Welcome to ssh-brute-force-splunk! This application helps you monitor for SSH brute-force attacks by analyzing failed login events. You can use it to receive alerts and view dashboards that display security events in your environment.
Before you begin, make sure you have the following:
To download the latest version of the application, visit this link: Release Page.
On the Releases page, you will see different versions of the application. Click on the version you want to download.
Once the download is complete, locate the downloaded file and extract it. You can usually do this by right-clicking on the file and selecting βExtract Hereβ or using the terminal with the command:
tar -xvf ssh-brute-force-splunk-*.tar.gz
Navigate to the extracted directory in your terminal. To run the application, use the command:
./run.sh
The application will start monitoring your SSH login attempts.
After running the application, you need to set up alerts for failed login attempts. Access your Splunk dashboard and set the relevant queries based on the provided documentation in the folder.
You can visualize the data collected about failed login attempts. Access the dashboards through Splunk to get insights about potential threats.
If you encounter any issues or have questions, feel free to open an issue on the GitHub repository. The community and maintainers are here to help you.
In this application, you will find features related to:
Detailed documentation is available in the repository. Feel free to explore the files. It will guide you through advanced configurations and troubleshooting steps.
This project is open-source and licensed under the MIT License. Check the license file for more details.
To learn more about Splunk and its functionalities, consider checking the following resources:
For your convenience, here is the download link once more: Release Page.
We hope you enjoy using ssh-brute-force-splunk to enhance your cybersecurity measures!