Sunday, June 10, 2018

All Your SSH Are Belong to Me

During a recent network security assessment, a colleague of mine proposed a very simple yet brilliant idea: logging credentials from an SSH server in order to compromise network services. What? Here's the simple part: Grabbing credentials from SSH – a quick Google search turns up a few blog posts...