SSH Credentials
Description
General
- Documentation: https://tools.ietf.org/html/rfc4251
- Summary: The Secure Shell (SSH) Protocol is a protocol for secure remote login, command-line and other secure network services over an insecure network. This detector aims at catching ssh authentication, typically in a command line, using a username separated by a
@
from a host, and a password or in the form of variable assignments.
Revoke the secret
A revocation list can be set on the server side to specify some rsa public key that should not be granted access.
Details for SSH password
-
Family: identifiers
-
Category: remote_access
-
High recall: False
-
Validity check available: True
-
Analyzer available: False
-
On-premise instances exist: False
-
Only valid secrets raise an alert: False
-
Minimum number of matches: 3
-
Occurrences found for one million commits: 6.8
-
Prefixed: False
Details for SSH password with port
-
Family: identifiers
-
Category: remote_access
-
High recall: False
-
Validity check available: True
-
Analyzer available: False
-
On-premise instances exist: False
-
Only valid secrets raise an alert: False
-
Minimum number of matches: 4
-
Occurrences found for one million commits: 30.0
-
Prefixed: False
Details for SSH Credentials
-
Family: identifiers
-
Category: remote_access
-
High recall: False
-
Validity check available: True
-
Analyzer available: False
-
On-premise instances exist: False
-
Only valid secrets raise an alert: False
-
Minimum number of matches: 3
-
Occurrences found for one million commits: 0.2
-
Prefixed: False