Security+ ยท 4.0 Security Operations
Brute force attack
Trying many passwords (or keys) until one works. Dictionary attacks use common-password lists (e.g., rockyou.txt). Mitigated by rate-limiting (fail2ban), account lockouts, and long/random passwords.
How this shows up at NCAE
SSH brute-force is constant during NCAE. `fail2ban` watches `/var/log/auth.log` for failed attempts and temporarily bans IPs. Whitelisted the scoring-engine IP so it's never banned.