Automated Defence against SSH Bruteforce
In this scenario,
- We will setup our infrastructure, which consists of a VM with SSH password authentication
- We will setup the serverless components required for Automated Defence
- We will perform a bruteforce attack on the SSH service and see how to defend against the attack using serverless and automated defence approach