Skip to content

Commit

Permalink
bump version
Browse files Browse the repository at this point in the history
  • Loading branch information
nneeo authored and nneeo committed Feb 10, 2022
1 parent 4b8eaab commit 761c8a0
Show file tree
Hide file tree
Showing 4 changed files with 15 additions and 23 deletions.
Binary file modified Assets/Head.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
7 changes: 7 additions & 0 deletions CHANGELOG.md
Original file line number Diff line number Diff line change
@@ -1,5 +1,12 @@
# Change log

### 1.0.5
- Slightly faster event log search
- Cmdlets write warnings if nothing happened
- Get-Bruteforce now collect usernames
- Add Cmdlet input validation
- Fix false warnings

### 1.0.4

- Protect-FromBruteforce - do nothing if no network logons was found
Expand Down
31 changes: 8 additions & 23 deletions Readme.md
Original file line number Diff line number Diff line change
Expand Up @@ -6,35 +6,20 @@ The **PSStopBruteforce** modules to stop bruteforce attack on SMB, RDP and WinRm

## Installation

### From Source

To manually install the module,
download the source code and unzip the contents to the directory for powershell 5.1:
```
$env:ProgramFiles\WindowsPowerShell\Modules
```

Or for Powershell 7:
```
$env:ProgramFiles\PowerShell\7\Modules
Install-Module -Name StopBruteforce
```


## Requirements

* The minimum Windows Management Framework (PowerShell) version required is 5.1
or higher.
* Target machine must be running Windows Server 2016 or later.

## List of commands and examples
The following is a list of commands which are available for you to use once you follow the steps in Installation
The implementation of the module depends on the Windows event log, so the functionality is different for different versions of Microsoft Windows.

| Command |Description|
|----------------------------------------------------------|-----------|
| [Stop-Bruteforce](https://github.com/nneeoo/PSStopBruteforce/wiki/Stop-Bruteforce) |Read Windows Event Log, search for Audit Failure. Adds ip adresses of attackers to deny firewall rule.|
| [Get-Bruteforce](https://github.com/nneeoo/PSStopBruteforce/wiki/Get-Bruteforce) |Read Windows Event Log, search for Audit Failure and Audit success anonimous logon events. Return array of BruteStatistics.|
| [Protect-FromBruteforce](https://github.com/nneeoo/PSStopBruteforce/wiki/Protect-FromBruteforce) |Read Windows Event Log, search for Audit Seccess. Add ip adresses of non anonimous users to default firewall rules.|
| [Unprotect-FromBruteforce](https://github.com/nneeoo/PSStopBruteforce/wiki/Unprotect-FromBruteforce) |Reset remote scope of default firewall rules for SMB, WinRM or RDP back to ANY.|
| Command | Requirement |
|-------------------------------------------------------------------------------------------------------|----------------------------------|
| [Stop-Bruteforce](https://github.com/nneeoo/PSStopBruteforce/wiki/Stop-Bruteforce) | Windows Server 2016 or later. |
| [Get-Bruteforce](https://github.com/nneeoo/PSStopBruteforce/wiki/Get-Bruteforce) | Windows Server 2016 or later. |
| [Protect-FromBruteforce](https://github.com/nneeoo/PSStopBruteforce/wiki/Protect-FromBruteforce) | Windows Server 2012 R2 or later. |
| [Unprotect-FromBruteforce](https://github.com/nneeoo/PSStopBruteforce/wiki/Unprotect-FromBruteforce) | Windows Server 2012 R2 or later. |

## Change log

Expand Down
Binary file modified StopBruteforce/StopBruteforce.psd1
Binary file not shown.

0 comments on commit 761c8a0

Please sign in to comment.