<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>SSH on System Overlord</title><link>https://systemoverlord.com/tags/ssh.html</link><description>Recent content in SSH on System Overlord</description><generator>Hugo</generator><language>en-us</language><managingEditor>david@systemoverlord.com (David Tomaschik)</managingEditor><webMaster>david@systemoverlord.com (David Tomaschik)</webMaster><lastBuildDate>Fri, 04 Sep 2020 00:00:00 +0000</lastBuildDate><atom:link href="https://systemoverlord.com/tags/ssh/index.xml" rel="self" type="application/rss+xml"/><item><title>Lessons Learned from SSH Credential Honeypots</title><link>https://systemoverlord.com/2020/09/04/lessons-learned-from-ssh-credential-honeypots.html</link><pubDate>Fri, 04 Sep 2020 00:00:00 +0000</pubDate><author>david@systemoverlord.com (David Tomaschik)</author><guid>https://systemoverlord.com/2020/09/04/lessons-learned-from-ssh-credential-honeypots.html</guid><description>&lt;p&gt;For the past few months, I&amp;rsquo;ve been running a handful of SSH Honeypots on some
cloud providers, including &lt;a href="https://cloud.google.com"&gt;Google Cloud&lt;/a&gt;,
&lt;a href="https://m.do.co/c/b2cffefc9c81"&gt;DigitalOcean&lt;/a&gt;, and
&lt;a href="https://shareasale.com/r.cfm?b=1380239&amp;amp;u=2497236&amp;amp;m=46483&amp;amp;urllink=&amp;amp;afftrack="&gt;NameCheap&lt;/a&gt;.
As opposed to more complicated honeypots looking at attacker behavior, I decided
to do something simple and was only interested in where they were coming from,
what tools might be in use, and what credentials they are attempting to use to
authenticate. My dataset includes 929,554 attempted logins over a period of a
little more than 3 months.&lt;/p&gt;
&lt;p&gt;If you&amp;rsquo;re looking for a big surprise, I&amp;rsquo;ll go ahead and let you down easy: my
analysis hasn&amp;rsquo;t located any new botnets or clusters of attackers. But it&amp;rsquo;s been
a fascinating project nonetheless.&lt;/p&gt;</description></item><item><title>New Tool: sshdog</title><link>https://systemoverlord.com/2017/01/04/new-tool-sshdog.html</link><pubDate>Wed, 04 Jan 2017 00:00:00 +0000</pubDate><author>david@systemoverlord.com (David Tomaschik)</author><guid>https://systemoverlord.com/2017/01/04/new-tool-sshdog.html</guid><description>&lt;p&gt;I recently needed an &lt;em&gt;encrypted&lt;/em&gt;, &lt;em&gt;authenticated&lt;/em&gt; remote &lt;em&gt;bind&lt;/em&gt; shell due to a
situation where, believe it or not, the egress policies were stricter than
ingress! Ideally I could forward traffic and copy files over the link.&lt;br&gt;
I was looking for a good tool and casually asked my coworkers if they had any
ideas when one said &amp;ldquo;sounds like SSH.&amp;rdquo;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Well, shit.&lt;/em&gt; That does sound like SSH and I didn&amp;rsquo;t even realize it. (Tunnel
vision, and the value of bouncing ideas off of others.) But I had a few more
requirements in total:&lt;/p&gt;</description></item><item><title>Using an SSH Connection to Provide Remote Support (Part I)</title><link>https://systemoverlord.com/2011/09/20/using-an-ssh-connection-to-provide-remote-support-part-i/</link><pubDate>Tue, 20 Sep 2011 15:37:46 +0000</pubDate><author>david@systemoverlord.com (David Tomaschik)</author><guid>https://systemoverlord.com/2011/09/20/using-an-ssh-connection-to-provide-remote-support-part-i/</guid><description>&lt;p&gt;
	Last week, at the ALE meeting, a question came up about using SSH to provide remote support for someone who is not especially Linux-literate.  I suggested using an SSH reverse tunnel so the end-user wouldn't need to worry about firewalls, NAT, etc.&lt;/p&gt;
&lt;p&gt;
	Thinking about the problem, I realize that it's a little more complicated than that.  So in part 1, I'm going to discuss the general solution and the approach to the problem.  In Part II, I'll present a more comprehensive solution that will (I think) scale better.&lt;/p&gt;</description></item><item><title>SSH across a Layer 7 Filter</title><link>https://systemoverlord.com/2011/02/19/ssh-across-a-layer-7-filter/</link><pubDate>Sat, 19 Feb 2011 03:14:50 +0000</pubDate><author>david@systemoverlord.com (David Tomaschik)</author><guid>https://systemoverlord.com/2011/02/19/ssh-across-a-layer-7-filter/</guid><description>&lt;p&gt;Every once in a while, I find myself in a situation behind some sort of device that filters a lot of traffic.  Most often, it's on my laptop at some facility (e.g., coffee shop) that only allows HTTP/HTTPS out.  For a while, I just listened for SSH traffic on port 443 (HTTPS) to connect through port-based firewalls.  However, a few times now I've seen a connection reset immediately after the SSH handshake started (during the protocol&amp;amp;cipher negotation).  Looking at them through WireShark made it obvious it wasn't a server or client problem, but some intermediate device sending a RST.&lt;/p&gt;</description></item></channel></rss>