no edit summary
=== Part 1: Deceiving Penetration Testers (Hackers) ===
To help harden (protect a server from attack or "penetration"), system or security administrators have the ability to "trick" or "mislead" a potential hacker in order to prevent system penetration.
part, you will learn to use a combination of '''SSH server configuration''' and''' iptables rules''' to redirect the SSH port to allow secure data traffic via another port (as opposed to the default port: 22), and use iptables to reject ( better log) incoming tcp traffic via the default port. ''' Q:''' What is the result of this? ''' A:'' ' Simple. Permit the SSH service for the organization, and yet trick and confound the potential hacker into thinking that ssh traffic is used on a port that is no longer available (but they may not know this!)... ''' Sneaky! >;)'''