<?xml version="1.0" encoding="utf-8"?>
<feed xmlns="http://www.w3.org/2005/Atom">
	<title type="html"><![CDATA[FrontAccounting forum — Weak Brute Force Protection?]]></title>
	<link rel="self" href="https://frontaccounting.com/punbb/extern.php?action=feed&amp;tid=9126&amp;type=atom" />
	<updated>2020-12-27T14:26:22Z</updated>
	<generator>PunBB</generator>
	<id>https://frontaccounting.com/punbb/viewtopic.php?id=9126</id>
		<entry>
			<title type="html"><![CDATA[Re: Weak Brute Force Protection?]]></title>
			<link rel="alternate" href="https://frontaccounting.com/punbb/viewtopic.php?pid=38832#p38832" />
			<content type="html"><![CDATA[<p>I recommend fail2ban on the server side for bruteforce detection and rejection via iptables. It can detect repeated access of the login page and x accesses in n seconds will trigger the ban.</p>]]></content>
			<author>
				<name><![CDATA[cambell]]></name>
				<uri>https://frontaccounting.com/punbb/profile.php?id=19447</uri>
			</author>
			<updated>2020-12-27T14:26:22Z</updated>
			<id>https://frontaccounting.com/punbb/viewtopic.php?pid=38832#p38832</id>
		</entry>
		<entry>
			<title type="html"><![CDATA[Re: Weak Brute Force Protection?]]></title>
			<link rel="alternate" href="https://frontaccounting.com/punbb/viewtopic.php?pid=38815#p38815" />
			<content type="html"><![CDATA[<p>Check this topic, it might help&nbsp; https://frontaccounting.com/punbb/viewtopic.php?pid=19097#p19097</p><p>Check code at function preventHijacking()</p><p>Do not forget to share with us any findings. Thks.</p>]]></content>
			<author>
				<name><![CDATA[albertolima]]></name>
				<uri>https://frontaccounting.com/punbb/profile.php?id=1640</uri>
			</author>
			<updated>2020-12-23T16:16:03Z</updated>
			<id>https://frontaccounting.com/punbb/viewtopic.php?pid=38815#p38815</id>
		</entry>
		<entry>
			<title type="html"><![CDATA[Weak Brute Force Protection?]]></title>
			<link rel="alternate" href="https://frontaccounting.com/punbb/viewtopic.php?pid=38811#p38811" />
			<content type="html"><![CDATA[<p>When I did a test on Brute Force protection, I found that the protection consists of disabling the submit form button in HTML. Is that really all or is there a server-side protection? After all, nobody does the Brute Force attack manually through the browser.</p>]]></content>
			<author>
				<name><![CDATA[Muhammed Ali Kösen]]></name>
				<uri>https://frontaccounting.com/punbb/profile.php?id=45845</uri>
			</author>
			<updated>2020-12-23T06:14:10Z</updated>
			<id>https://frontaccounting.com/punbb/viewtopic.php?pid=38811#p38811</id>
		</entry>
</feed>
