Skip to main content

SSH Credentials

Description

General

  • Documentation: https://tools.ietf.org/html/rfc4251
  • Summary: The Secure Shell (SSH) Protocol is a protocol for secure remote login, command-line and other secure network services over an insecure network. This detector aims at catching ssh authentication, typically in a command line, using a username separated by a @ from a host, and a password or in the form of variable assignments.
  • IPs allowlist: IP addresses granted with access to the remote host can be restricted by setting iptables rules on the server side.
  • Scopes: Users management can be set on the server side to restrict user rights on the machine.

Revoke the secret

A revocation list can be set on the server side to specify some rsa public key that should not be granted access.

Check for suspicious activity

All activities and connection attempts can be logged on the server.

Details for Ssh password

  • Family: Other

  • Category: Remote access

  • High recall: False

  • Validity check available: True

  • On-premise instances exist: False

  • Only valid secrets raise an alert: False

  • Minimum number of matches: 3

  • Occurrences found for one million commits: 3.17

  • Prefixed: False

  • PreValidators:

- type: FilenameBanlistPreValidator
banlist_extensions: []
banlist_filenames: []
check_binaries: false
include_default_banlist_extensions: true
ban_markup: true
- type: ContentWhitelistPreValidator
patterns:
- sshpass

Examples

- text: |
+cp ../data/aviso.json /home/triagoz/webapp/kbalem/data
+#cp to screen app
+sshpass -p 'ghjdmoo5giedaiwahC' scp /home4/homedir4/perso/kbalem/DIVAA/data/*.js sftp-vaa@lpo-www.univ-leak.fr:data/

password: ghjdmoo5giedaiwahC
username: sftp-vaa
host: lpo-www.univ-leak.fr

- text: |
+cp ../data/aviso.json /home/triagoz/webapp/kbalem/data
+#cp to screen app
+sshpass -p 'ghjdmo.5giedaiwahC' scp /home4/homedir4/perso/kbalem/DIVAA/data/*.js sftp-vaa@lpo-www.univ-leak.fr:data/

password: ghjdmo.5giedaiwahC
username: sftp-vaa
host: lpo-www.univ-leak.fr

Details for Ssh password assignment

  • Family: Other

  • Category: Remote access

  • High recall: False

  • Validity check available: True

  • On-premise instances exist: False

  • Only valid secrets raise an alert: False

  • Minimum number of matches: 3

  • Occurrences found for one million commits: 0.2

  • Prefixed: False

  • PreValidators:

- type: FilenameBanlistPreValidator
banlist_extensions: []
banlist_filenames: []
check_binaries: false
include_default_banlist_extensions: true
ban_markup: true
- type: ContentWhitelistPreValidator
patterns:
- ssh

Examples

- text: |
+ String strSshUser = "cits3003-administrator"; // SSH login username
+ String strSshPassword = "cits3003@@"; // SSH login password
+ String strSshHost = "130.95.123.321"; // hostname or ip or SSH server

username: cits3003-administrator
password: cits3003@@
host: 130.95.123.321

- text: |
- <connection name="ffcstat11" sshUser="nixslo" auth="foobared" port="6379" sshHost="stat.fastfreeleaker.com" sshPassword="Thoo4Ibael4ie" sshPort="221" host="redis_srv"/>

username: nixslo
password: Thoo4Ibael4ie
host: stat.fastfreeleaker.com

How can I help you ?