Hmm... Interesting. What if I try to redirect the output of tcpdump to a file. I am doing this on a f5 BigIP which sort of runs a "FreeBSD-ish" kernel.
I've tried: tcpdump -i exp1 port ssh | grep -v '63.123' | grep -v 'lb01' >/var/ssh.capture But it never rights to the file. The above will capture the next unauthorized ssh and allow me to identify the source machine. -john On Wed, 15 Dec 2004 [EMAIL PROTECTED] wrote: > > Think this might be it? > > http://netgroup-serv.iet.unipi.it/brute/ > > Just searched Google on brute.tar.gz > > Chris > _______________________________________________ [EMAIL PROTECTED] mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-hackers To unsubscribe, send any mail to "[EMAIL PROTECTED]"