BFF

Your first line of defence against brute force attacks.


Project maintained by BruteForceFencer Hosted on GitHub Pages — Theme by mattgraham

BFF is your first line of defence against brute force attacks. It has been designed with a focus on low resource usage and high concurrency. It’s open source and has simple APIs for several common languages.

How It Works

The core of the system is a lightweight application that tracks repeated requests for usernames, passwords and any other type of data that can be tracked in a request (such as the attacker’s IP address). You’re notified anytime you receive a request that appears to be an attack. The actual algorithms used can be found in this paper published in the 8th IEEE International Conference on Privacy, Security and Trust.

It’s important to note that BFF only tells you which requests look like attacks and not what to do about it. For more information on how to deal with brute force attacks, see here.

Installation

BFF is designed to be as flexible as possible by imposing as few requirements as possible. Unless you compile from source, there are no dependencies to run BFF.

Binaries

There are binaries available for download for 64-bit Linux, Mac OS X and Windows on the release page. For other operating systems or architectures, you’ll need to build from source.

From Source

To build BFF from source, you’ll need to have the Go compiler and GCC. Once you have those, simply run:

make DEST_DIR=/usr/local/bff

This will build the system and output the binaries to the /usr/local/bff directory. It's also recommended that you add /usr/local/bff to your PATH variable.

Usage

See the wiki.