Skip to main content

SSH Credentials

Description

General

  • Documentation: https://tools.ietf.org/html/rfc4251
  • Summary: The Secure Shell (SSH) Protocol is a protocol for secure remote login, command-line and other secure network services over an insecure network. This detector aims at catching ssh authentication, typically in a command line, using a username separated by a @ from a host, and a password or in the form of variable assignments.

Revoke the secret

A revocation list can be set on the server side to specify some rsa public key that should not be granted access.

Details for SSH password

  • Family: identifiers

  • Category: remote_access

  • High recall: False

  • Validity check available: True

  • Analyzer available: False

  • On-premise instances exist: False

  • Only valid secrets raise an alert: False

  • Minimum number of matches: 3

  • Occurrences found for one million commits: 6.8

  • Prefixed: False

Details for SSH password with port

  • Family: identifiers

  • Category: remote_access

  • High recall: False

  • Validity check available: True

  • Analyzer available: False

  • On-premise instances exist: False

  • Only valid secrets raise an alert: False

  • Minimum number of matches: 4

  • Occurrences found for one million commits: 30.0

  • Prefixed: False

Details for SSH Credentials

  • Family: identifiers

  • Category: remote_access

  • High recall: False

  • Validity check available: True

  • Analyzer available: False

  • On-premise instances exist: False

  • Only valid secrets raise an alert: False

  • Minimum number of matches: 3

  • Occurrences found for one million commits: 0.2

  • Prefixed: False