Automated Defence against SSH Bruteforce

In this scenario,

  • We will setup our infrastructure, which consists of a VM with SSH password authentication
  • We will setup the serverless components required for Automated Defence
  • We will perform a bruteforce attack on the SSH service and see how to defend against the attack using serverless and automated defence approach