podcast
details
.com
Print
Share
Look for any podcast host, guest or anyone
Search
Showing episodes and shows of
SSH
Shows
CyberSecurity Summary
SSH Mastery: OpenSSH, PuTTY, Tunnels and Keys (IT Mastery)
Focused on mastering the Secure Shell (SSH) protocol, primarily using OpenSSH and the Windows client PuTTY. The book is designed to guide both system administrators and general users beyond basic command-line usage, covering advanced topics such as encryption fundamentals, server and client configuration (including specific files like sshd_config and ssh_config), and the importance of user and host keys over password authentication. Crucially, it dedicates significant attention to practical security measures, including host key verification, setting up port forwarding (local, remote, and dynamic), utilizing SSH agents, and implementing an OpenSSH Certificate Authority (CA) to simplify key management in...
2025-11-01
16 min
SANS Internet Storm Center's Daily Network Security News Podcast
SANS Stormcast Thursday, October 9th, 2025: Polymorphic Python; ssh ProxyCommand Vuln; (#)
SANS Stormcast Thursday, October 9th, 2025: Polymorphic Python; ssh ProxyCommand Vuln; Polymorphic Python Malware Xavier discovered self-modifying Python code on Virustotal. The remote access tool takes advantage of the inspect module to modify code on the fly. https://isc.sans.edu/diary/Polymorphic%20Python%20Malware/32354 SSH ProxyCommand Vulnerability A user cloning a git repository may be tricked into executing arbitrary code via the SSH proxycommand option. https://dgl.cx/2025/10/bash-a-newline-ssh-proxycommand-cve-2025-61984 Framelink Figma MCP Server CVE-2025-53967 Framelink Figma’s MCP server suffers from a remote code execution vulnerability. keywords: polymorphic; python; git; ssh; proxycommand;
2025-10-09
06 min
Technically U
RapperBot Goes Polymorphic in New SSH Credential Attacks
🚨 RapperBot SSH Botnet EXPOSED: Critical Linux Security Threat Analysis | Cybersecurity Dive 2025URGENT CYBERSECURITY ALERT: RapperBot is actively targeting Linux servers, IoT devices, and cloud infrastructure worldwide through sophisticated SSH brute-force attacks. This comprehensive technical analysis reveals everything cybersecurity professionals need to know about this evolving threat.🔥 TRENDING CYBERSECURITY TOPICS COVERED:✅ RapperBot malware analysis - Evolution from Mirai botnet source code✅ SSH brute-force attack techniques - How attackers bypass weak credentials✅ Linux server security vulnerabilities - Critical enterprise infrastructure risks✅ IoT device botnet infections - ARM, MIPS, x86 architecture e...
2025-08-30
06 min
SANS Internet Storm Center's Daily Network Security News Podcast
SANS Stormcast Monday, August 25th, 2025: IP Cleanup; Linux Desktop Attacks; Malicious Go SSH Brute Forcer; Onmicrosoft Domain Restrictions (#)
SANS Stormcast Monday, August 25th, 2025: IP Cleanup; Linux Desktop Attacks; Malicious Go SSH Brute Forcer; Onmicrosoft Domain Restrictions The end of an era: Properly formatted IP addresses in all of our data. When initiall designing DShield, addresses were “zero padded”, an unfortunate choice. As of this week, datafeeds should no longer be “zero padded”. https://isc.sans.edu/diary/The%20end%20of%20an%20era%3A%20Properly%20formated%20IP%20addresses%20in%20all%20of%20our%20data./32228 .desktop files used in an attack against Linux Desktops Pakistani attackers are using .desktop files to target Indian Linux desktops. https://www.cyfirma.com/research/apt36-targets...
2025-08-25
06 min
SANS Internet Storm Center's Daily Network Security News Podcast
SANS Stormcast Tuesday, August 12th, 2025: Erlang OTP SSH Exploits (Palo Alto Networks); Winrar Exploits; Netscaler Exploits; OpenSSH Pushing PQ Crypto; (#)
SANS Stormcast Tuesday, August 12th, 2025: Erlang OTP SSH Exploits (Palo Alto Networks); Winrar Exploits; Netscaler Exploits; OpenSSH Pushing PQ Crypto; Erlang OTP SSH Exploits A recently patched and easily exploited vulnerability in Erlang/OTP SSH is being exploited. Palo Alto collected some of the details about this exploit activity that they observed. https://unit42.paloaltonetworks.com/erlang-otp-cve-2025-32433/ WinRAR Exploited WinRAR vulnerabilities are actively being exploited by a number of threat actors. The vulnerability allows for the creation of arbitrary files as the archive is extracted. https://thehackernews.com/2025/08/winrar-zero-day-under-active.html Citrix Netscaler Exploit Updates The Dutch Center for Cyber...
2025-08-11
06 min
SANS Internet Storm Center's Daily Network Security News Podcast
SANS Stormcast Friday, July 11th, 2025: SSH Tunnel; FortiWeb SQL Injection; Ruckus Unpatched Vuln; Missing Motherboard Patches; (#)
SANS Stormcast Friday, July 11th, 2025: SSH Tunnel; FortiWeb SQL Injection; Ruckus Unpatched Vuln; Missing Motherboard Patches; SSH Tunneling in Action: direct-tcp requests Attackers are compromising ssh servers to abuse them as relays. The attacker will configure port forwarding direct-tcp connections to forward traffic to a victim. In this particular case, the Yandex mail server was the primary victim of these attacks. https://isc.sans.edu/diary/SSH%20Tunneling%20in%20Action%3A%20direct-tcp%20requests%20%5BGuest%20Diary%5D/32094 Fortiguard FortiWeb Unauthenticated SQL injection in GUI (CVE-2025-25257) An improper neutralization of special elements used in an SQL command ('SQL Injection') vulnerability [CWE-89...
2025-07-11
05 min
David Bombal
#501: Brute Force SSH & Build a Honeypot Now (Hydra and Cowrie Demo)
Big thank you to Cisco for sponsoring this video and sponsoring my trip to Cisco Live San Diego. This video features David Bombal and Kyle Winters demonstrating practical cybersecurity techniques. Kyle walks through how to use Hydra to brute force SSH passwords, explaining the process of leveraging wordlists and optimizing the attack. Following the offensive demonstration, Kyle transitions into defensive measures, showing viewers how to quickly and easily set up an SSH honeypot using Cowrie. The honeypot serves as a decoy to attract and monitor malicious actors attempting to access a network. The demonstration includes setting up the honeypot on...
2025-07-02
12 min
David Bombal
#501: Brute Force SSH & Build a Honeypot Now (Hydra and Cowrie Demo)
Big thank you to Cisco for sponsoring this video and sponsoring my trip to Cisco Live San Diego. This video features David Bombal and Kyle Winters demonstrating practicalcybersecurity techniques. Kyle walks through how to use Hydra to brute force SSH passwords, explaining the process of leveraging wordlists and optimizing the attack. Following the offensive demonstration, Kyle transitions into defensive measures, showing viewers how to quickly and easily set up an SSH honeypot using Cowrie. The honeypot serves as a decoy to attract and monitor malicious actors attempting to access a network...
2025-07-02
12 min
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)
SANS Stormcast Tuesday, June 3rd, 2025: Windows SSH C2; Google Removes CAs from trusted list; MSFT issues Emergency Patch to fix Crash issue; Qualcom Adreno GPU 0-day
Simple SSH Backdoor Xavier came across a simple SSH backdoor taking advantage of the ssh client preinstalled on recent Windows systems. The backdoor is implemented via an SSH configuration file that instructs the SSH client to connect to a remote system and forward a shell on a random port. This will make the shell accessible to anybody able to connect to the C2 host. https://isc.sans.edu/diary/Simple%20SSH%20Backdoor/32000 Google Chrome to Distrust CAs Google Chrome will remove the Chunghwa Telecom and Netlock certificate authorities from its list of trusted CAs. Any...
2025-06-03
06 min
SANS Stormcast: Daily Cyber Security News
SANS Stormcast Tuesday, June 3rd, 2025: Windows SSH C2; Google Removes CAs from trusted list; MSFT issues Emergency Patch to fix Crash issue
Simple SSH Backdoor Xavier came across a simple SSH backdoor taking advantage of the ssh client preinstalled on recent Windows systems. The backdoor is implemented via an SSH configuration file that instructs the SSH client to connect to a remote system and forward a shell on a random port. This will make the shell accessible to anybody able to connect to the C2 host. https://isc.sans.edu/diary/Simple%20SSH%20Backdoor/32000 Google Chrome to Distrust CAs Google Chrome will remove the Chunghwa Telecom and Netlock certificate authorities from its list of trusted CAs. Any...
2025-06-03
06 min
SANS Internet Storm Center's Daily Network Security News Podcast
SANS Stormcast Tuesday, June 3rd, 2025: Windows SSH C2; Google Removes CAs from trusted list; MSFT issues Emergency Patch to fix Crash issue; Qualcom Adreno GPU 0-day (#)
SANS Stormcast Tuesday, June 3rd, 2025: Windows SSH C2; Google Removes CAs from trusted list; MSFT issues Emergency Patch to fix Crash issue; Qualcom Adreno GPU 0-day Simple SSH Backdoor Xavier came across a simple SSH backdoor taking advantage of the ssh client preinstalled on recent Windows systems. The backdoor is implemented via an SSH configuration file that instructs the SSH client to connect to a remote system and forward a shell on a random port. This will make the shell accessible to anybody able to connect to the C2 host. https://isc.sans.edu/diary/Simple%20SSH%20Backdoor/32000 Google Chrome...
2025-06-02
06 min
SANS Internet Storm Center's Daily Network Security News Podcast
SANS Stormcast Friday, May 9th: SSH Exfil Tricks; magicINFO still vulnerable; SentinelOne Vulnerability; Commvault insufficient patch (#)
SANS Stormcast Friday, May 9th: SSH Exfil Tricks; magicINFO still vulnerable; SentinelOne Vulnerability; Commvault insufficient patch No Internet Access: SSH to the Rescue If faced with restrictive outbound network access policies, a single inbound SSH connection can quickly be turned into a tunnel or a full-blown VPN https://isc.sans.edu/diary/No%20Internet%20Access%3F%20SSH%20to%20the%20Rescue!/31932 SAMSUNG magicINFO 9 Server Flaw Still exploitable The SAMSUNG magicINFO 9 Server Vulnerability we found being exploited last week is apparently still not completely patched, and current versions are vulnerable to the exploit observed in the wild. https://www.huntress.com/blog...
2025-05-09
04 min
Thinking Elixir Podcast
251: SSH Vulnerability and Cookies are Changing
News includes a critical Unauthenticated Remote Code Execution vulnerability in Erlang/OTP SSH, José Valim teasing a new project, Oban Pro v1.6's impressive new "Cascade Mode" feature, Semaphore CI/CD platform being open-sourced as a primarily Elixir application, new sandboxing options for Elixir code with Dune and Mini Elixir, BeaconCMS development slowing due to DockYard cuts, and a look at the upcoming W3C Device Bound Session Credentials standard that will impact all web applications, and more! Show Notes online - http://podcast.thinkingelixir.com/251 Elixir Community News https://paraxial.io/ – Paraxial.io is...
2025-04-29
41 min
SANS Internet Storm Center's Daily Network Security News Podcast
SANS Stormcast Thursday, April 24th: Honeypot iptables Maintenance; XRPL.js Compromise; Erlang/OTP SSH Vuln affecting Cisco (#)
SANS Stormcast Thursday, April 24th: Honeypot iptables Maintenance; XRPL.js Compromise; Erlang/OTP SSH Vuln affecting Cisco Honeypot Iptables Maintenance and DShield-SIEM Logging In this diary, Jesse is talking about some of the tasks to maintain a honeypot, like keeping filebeats up to date and adjusting configurations in case your dynamic IP address changes https://isc.sans.edu/diary/Honeypot%20Iptables%20Maintenance%20and%20DShield-SIEM%20Logging/31876 XRPL.js Compromised An unknown actor was able to push malicious updates of the XRPL.js library to NPM. The library is officially recommended for writing Riple (RPL) cryptocurrency code. The malicious library exfiltrated secret...
2025-04-23
05 min
SANS Stormcast: Daily Cyber Security News
ANS Stormcast Monday, April 21st: MSFT Entra Lockouts; Erlang/OTP SSH Exploit; Sonicwall Exploit; bubble.io bug
Microsoft Entra User Lockout Multiple organizations reported widespread alerts and account lockouts this weekend from Microsoft Entra. The issue is caused by a new feature Microsoft enabled. This feature will lock accounts if Microsoft believes that the password for the account was compromised.https://www.bleepingcomputer.com/news/microsoft/widespread-microsoft-entra-lockouts-tied-to-new-security-feature-rollout/https://learn.microsoft.com/en-us/entra/identity/authentication/feature-availability Erlang/OTP SSH Exploit An exploit was published for the Erlang/OTP SSH vulnerability. The vulnerability is easy to exploit, and the exploit and a Metasploit module allow for easy remote code execution.https...
2025-04-21
07 min
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)
ANS Stormcast Monday, April 21st: MSFT Entra Lockouts; Erlang/OTP SSH Exploit; Sonicwall Exploit; bubble.io bug
Microsoft Entra User Lockout Multiple organizations reported widespread alerts and account lockouts this weekend from Microsoft Entra. The issue is caused by a new feature Microsoft enabled. This feature will lock accounts if Microsoft believes that the password for the account was compromised. https://www.bleepingcomputer.com/news/microsoft/widespread-microsoft-entra-lockouts-tied-to-new-security-feature-rollout/ https://learn.microsoft.com/en-us/entra/identity/authentication/feature-availability Erlang/OTP SSH Exploit An exploit was published for the Erlang/OTP SSH vulnerability. The vulnerability is easy to exploit, and the exploit and a Metasploit module allow for easy remote code execution. https...
2025-04-21
07 min
SANS Internet Storm Center's Daily Network Security News Podcast
ANS Stormcast Monday, April 21st: MSFT Entra Lockouts; Erlang/OTP SSH Exploit; Sonicwall Exploit; bubble.io bug (#)
ANS Stormcast Monday, April 21st: MSFT Entra Lockouts; Erlang/OTP SSH Exploit; Sonicwall Exploit; bubble.io bug Microsoft Entra User Lockout Multiple organizations reported widespread alerts and account lockouts this weekend from Microsoft Entra. The issue is caused by a new feature Microsoft enabled. This feature will lock accounts if Microsoft believes that the password for the account was compromised. https://www.bleepingcomputer.com/news/microsoft/widespread-microsoft-entra-lockouts-tied-to-new-security-feature-rollout/ https://learn.microsoft.com/en-us/entra/identity/authentication/feature-availability Erlang/OTP SSH Exploit An exploit was published for the Erlang/OTP SSH vulnerability. The vulnerability is easy to exploit, and the exploit and...
2025-04-21
07 min
SANS Internet Storm Center's Daily Network Security News Podcast
SANS Stormcast Friday, April 18th: Remnux Cloud Environment; Erlang/OTP SSH Vuln; Brickstorm Backdoor Analysis; GPT 4.1 Safety Controversy (#)
SANS Stormcast Friday, April 18th: Remnux Cloud Environment; Erlang/OTP SSH Vuln; Brickstorm Backdoor Analysis; GPT 4.1 Safety Controversy RedTail: Remnux and Malware Management A description showing how to set up a malware analysis in the cloud with Remnux and Kasm. RedTail is a sample to illustrate how the environment can be used. https://isc.sans.edu/diary/RedTail%2C%20Remnux%20and%20Malware%20Management%20%5BGuest%20Diary%5D/31868 Critical Erlang/OTP SSH Vulnerability Researchers identified a critical vulnerability in the Erlang/OTP SSH library. Due to this vulnerability, SSH servers written in Erlang/OTP allow arbitrary remote code execution without prior authentication...
2025-04-18
06 min
Laravel Creator Spotlight
Whisp, a Pure PHP SSH server, with Ashley Hindle
WhispPHP is a Pure PHP SSH server created by Ashley Hindle. It is the simplest way to build PHP SSH apps and allows you to run your Laravel Prompts apps through SSH with ridiculous simplicity.Show Links: - Whisp Docs - https://whispphp.com- Whisp Demos - https://whispphp.com/docs/1.0.0/whisp-demos- Ashley’s site - https://ashleyhindle.com- FancyOG - https://fancyog.com- Croft - https://github.com/ashleyhindle/croft- Cursor AI IDE - https://www.cursor.com/- Sam Carre’s ssh-php - htt...
2025-04-15
28 min
Chaos Computer Club - recent events feed (low quality)
SSH-Anmeldung mit GnuPG und SmartCards (clt25)
Die Secure Shell SSH gehört zu den wichtigsten Werkzeugen der Systemadministration. Von der Sicherheit unserer SSH-Accounts hängt demnach eine Menge ab. Wir werden im Vortrag sehen, wie die Public-Key-Authentifizierung funktioniert und warum wir sie gegenüber der Passwortauthentifizierung bevorzugen sollen. Zudem betrachten wir einige Fallstricke, die es in der Praxis bei der Aufbewahrung unserer SSH-Schlüssel zu beachten gilt. Der praktische Teil des Vortrags zeigt, wie sich SSH-Schlüssel im GnuPG-Schlüsselbund hinterlegen lassen und welche Vorteile dies gegenüber klassischen Key-Files im Home-Verzeichnis bietet. Zudem werden wir sehen, wie wir mit diesem Setup unsere SSH-Schlüssel auf SmartCar...
2025-03-23
55 min
Chaos Computer Club - recent audio-only feed
SSH-Anmeldung mit GnuPG und SmartCards (clt25)
Die Secure Shell SSH gehört zu den wichtigsten Werkzeugen der Systemadministration. Von der Sicherheit unserer SSH-Accounts hängt demnach eine Menge ab. Wir werden im Vortrag sehen, wie die Public-Key-Authentifizierung funktioniert und warum wir sie gegenüber der Passwortauthentifizierung bevorzugen sollen. Zudem betrachten wir einige Fallstricke, die es in der Praxis bei der Aufbewahrung unserer SSH-Schlüssel zu beachten gilt. Der praktische Teil des Vortrags zeigt, wie sich SSH-Schlüssel im GnuPG-Schlüsselbund hinterlegen lassen und welche Vorteile dies gegenüber klassischen Key-Files im Home-Verzeichnis bietet. Zudem werden wir sehen, wie wir mit diesem Setup unsere SSH-Schlüssel auf SmartCar...
2025-03-23
55 min
Chaos Computer Club - recent events feed (high quality)
SSH-Anmeldung mit GnuPG und SmartCards (clt25)
Die Secure Shell SSH gehört zu den wichtigsten Werkzeugen der Systemadministration. Von der Sicherheit unserer SSH-Accounts hängt demnach eine Menge ab. Wir werden im Vortrag sehen, wie die Public-Key-Authentifizierung funktioniert und warum wir sie gegenüber der Passwortauthentifizierung bevorzugen sollen. Zudem betrachten wir einige Fallstricke, die es in der Praxis bei der Aufbewahrung unserer SSH-Schlüssel zu beachten gilt. Der praktische Teil des Vortrags zeigt, wie sich SSH-Schlüssel im GnuPG-Schlüsselbund hinterlegen lassen und welche Vorteile dies gegenüber klassischen Key-Files im Home-Verzeichnis bietet. Zudem werden wir sehen, wie wir mit diesem Setup unsere SSH-Schlüssel auf SmartCar...
2025-03-23
55 min
Chaos Computer Club - recent events feed
SSH-Anmeldung mit GnuPG und SmartCards (clt25)
Die Secure Shell SSH gehört zu den wichtigsten Werkzeugen der Systemadministration. Von der Sicherheit unserer SSH-Accounts hängt demnach eine Menge ab. Wir werden im Vortrag sehen, wie die Public-Key-Authentifizierung funktioniert und warum wir sie gegenüber der Passwortauthentifizierung bevorzugen sollen. Zudem betrachten wir einige Fallstricke, die es in der Praxis bei der Aufbewahrung unserer SSH-Schlüssel zu beachten gilt. Der praktische Teil des Vortrags zeigt, wie sich SSH-Schlüssel im GnuPG-Schlüsselbund hinterlegen lassen und welche Vorteile dies gegenüber klassischen Key-Files im Home-Verzeichnis bietet. Zudem werden wir sehen, wie wir mit diesem Setup unsere SSH-Schlüssel auf SmartCar...
2025-03-23
55 min
Inderes
SSH Q4’24: Myyntipanostukset jatkuvat
SSH on jatkanut myynti- ja markkinointipanostusten kasvattamista tulorahoituksen turvin. Toimitusjohtaja Rami Raulas kommentoi inderesTV:n haastattelussa.SSH:ta voi seurata täältä https://www.inderes.fi/companies/SSH-Communications-Security00:00 Vuoden lopetus01:15 Zero Trust, OT ja kvanttiturvallisuus04:28 Myynnin vaimeus05:15 Kumppanuusmyynti06:30 Myyntipanostukset 07:30 Kannattavuus08:00 Hybridilaina08:28 Tiedotuspolitiikka0938 Puolustusteollisuus09:59 Kilpailukentän kehitys12:00 Erottuminen kilpailussa13:28 Kasvun kiihtyminen14:15 Asiakkaiden päätöksenteko15:42 Insta16:29 Geopoliittinen tilanne17:45 Näkymät 2025
2025-02-14
18 min
SANS Stormcast: Daily Cyber Security News
SANS ISC Stormcast, Jan 27, 2025: Access Brokers; Llama Stack Vuln; ESXi SSH Tunnels; Zyxel Boot Loops; Subary StarLeak
Guest Diary: How Access Brokers Maintain Persistence Explore how cybercriminals utilize access brokers to persist within networks and the impact this has on organizational security.https://isc.sans.edu/forums/diary/Guest+Diary+How+Access+Brokers+Maintain+Persistence/31600/ Critical Vulnerability in Meta's Llama Stack (CVE-2024-50050) A deep dive into CVE-2024-50050, a critical vulnerability affecting Meta's Llama Stack, with exploitation details and mitigation strategies.https://www.oligo.security/blog/cve-2024-50050-critical-vulnerability-in-meta-llama-llama-stack ESXi Ransomware and SSH Tunneling Defense Strategies Learn how to fortify your infrastructure against ransomware targeting ESXi environments, focusing...
2025-01-27
06 min
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)
SANS ISC Stormcast, Jan 27, 2025: Access Brokers; Llama Stack Vuln; ESXi SSH Tunnels; Zyxel Boot Loops; Subary StarLeak
Guest Diary: How Access Brokers Maintain Persistence Explore how cybercriminals utilize access brokers to persist within networks and the impact this has on organizational security. https://isc.sans.edu/forums/diary/Guest+Diary+How+Access+Brokers+Maintain+Persistence/31600/ Critical Vulnerability in Meta's Llama Stack (CVE-2024-50050) A deep dive into CVE-2024-50050, a critical vulnerability affecting Meta's Llama Stack, with exploitation details and mitigation strategies. https://www.oligo.security/blog/cve-2024-50050-critical-vulnerability-in-meta-llama-llama-stack ESXi Ransomware and SSH Tunneling Defense Strategies Learn how to fortify your infrastructure against ransomware targeting ESXi environments, focusing...
2025-01-27
06 min
SANS Internet Storm Center's Daily Network Security News Podcast
SANS ISC Stormcast, Jan 27, 2025: Access Brokers; Llama Stack Vuln; ESXi SSH Tunnels; Zyxel Boot Loops; Subary StarLeak (#)
SANS ISC Stormcast, Jan 27, 2025: Access Brokers; Llama Stack Vuln; ESXi SSH Tunnels; Zyxel Boot Loops; Subary StarLeak Guest Diary: How Access Brokers Maintain Persistence Explore how cybercriminals utilize access brokers to persist within networks and the impact this has on organizational security. https://isc.sans.edu/forums/diary/Guest+Diary+How+Access+Brokers+Maintain+Persistence/31600/ Critical Vulnerability in Meta's Llama Stack (CVE-2024-50050) A deep dive into CVE-2024-50050, a critical vulnerability affecting Meta's Llama Stack, with exploitation details and mitigation strategies. https://www.oligo.security/blog/cve-2024-50050-critical-vulnerability-in-meta-llama-llama-stack ESXi Ransomware and SSH Tunneling Defense Strategies Learn how to...
2025-01-27
06 min
Phoenix Cast
What’s next for workloads, SSH concern, and WiFi attack
In this episode of Phoenix Cast, hosts John, Rich, and Kyle discuss some thoughts on where workloads are going, the potential for SSH to leak metadata, and a new WiFi attack. Share your thoughts with us on Twitter: @USMC_TFPhoenix (Now verified!) Follow MARFORCYBER, MCCYWG, & MCCOG on Twitter, LinkedIn, Facebook, and YouTube. Leave your review on Apple Podcasts. Links: Broadcom / VMware / etc - https://www.theregister.com/2024/11/22/broadcom_vmware_acquisition_first_anniversary/ VMware on AWS - https://aws.amazon.com/blogs/migration-and-modernization/whats-next-for-vmware-workloads-on-aws/ SSH keystroke bypass...
2024-12-04
54 min
SDNTECH: Networking, Cloud, and IoT
Securing Remote Access with SSH and Public Key Authentication
In this episode, our hosts explore SSH (Secure Shell), a protocol to establish secure connections between computers. We discuss the importance of SSH in modern networking, where secure remote access and file transfers are crucial. It dives into the fundamental concepts of public key cryptography, including RSA and ECDSA algorithms, and discusses their strengths and weaknesses. It explores how SSH leverages public key pairs for passwordless authentication, providing a more secure alternative to traditional password-based logins. It concludes by explaining how PAM (Pluggable Authentication Modules) can be used for identity access management and authorization, ensuring a more controlled and...
2024-10-14
13 min
Simulation Nation
Simulationists Guide to SSH Accreditation
Send us a textIn this conversation, Amy Cowperthwait and Deb Tauber discuss the importance of @SimulationSociety Accreditation in simulation and the benefits it brings to simulation centers. They also talk about the different options for accreditation and the process involved. Deb shares her experience as a reviewer for the Society for Simulation in Healthcare (SSH) accreditation council and highlights the support and guidance provided to simulationists. They emphasize the value of accreditation in establishing credibility, improving educational clarity, and enhancing learning. The conversation provides valuable insights for those considering accreditation and offers pra...
2024-10-02
45 min
RHCSA Prep Podcast
Mastering SSH: Secure Remote Access Made Simple
Ever wanted to control your computer from anywhere securely, like a tech ninja? In this episode, we take a deep dive into **SSH** (Secure Shell), breaking down everything from remote access to key-based authentication. Using examples from a Red Hat Enterprise Linux guide, we demystify SSH host keys, secure logins, and even show you how to replace passwords with secure digital badges (keys). Learn how to protect your server by disabling direct root login and hear about the extra security layer of SSH key agents. Plus, we explore how SSH tunneling can create private, encrypted pathways to keep your connection...
2024-09-23
09 min
Digital Forensic Survival Podcast
DFSP # 425 - SSH Forensics: Host-Based Artifacts
In the last episode on this topic, I covered SSH from a investigation point of view. I explained SSH and the artifacts that typically come up when your investigating. In this episode, we're getting into the triage methodology. This includes the artifacts targeted for a fast, but yet effective triage for notable SSH activity on a given host.
2024-04-09
30 min
Digital Forensic Survival Podcast
DFSP # 424 - SSH Forensics: Understanding Secure Shell
SSH is a protocol used to secure remote access to systems, making it a cornerstone in safeguarding sensitive information and ensuring secure communications. In this podcast, we will delve into the basics of SSH, its key concepts and other useful elements important for context when investigating for notable SSH activity.
2024-04-02
23 min
The Superposition Guy's Podcast
Suvi Lampila and Miikka Sainio, SSH Communications Security
Suvi Lampila and Miikka Sainio from SSH Communications Security, a European cyber defense company, are interviewed by Yuval Boger. SSH, known for inventing the SSH protocol, focuses on secure communication and access management. They discusses SSH's efforts in integrating post-quantum cryptography into their products, highlighting the launch of their quantum-safe solutions, elaborate on the challenges of updating operational technology for quantum safety and the importance of pragmatic solutions. They emphasize the need for market education on PQ, the urgency of preparing for quantum threats, their concerns about the future impact of quantum computing on security, and much more
2024-03-18
30 min
Risikozone
DNSSEC, KeyTrap und SSH-Würmer
Viktor Garske E-Mail Homepage LinkedIn Twitter Andreas Noack Dienst-E-Mail-Adresse In der heutigen Episode diskutieren Prof. Dr. Andreas Noack und Viktor Garske über neuartige Computerviren, die es auf SSH abgesehen haben und sich lateral durchs Netz bewegen, sowie den Angriff auf die Verfügbarkeit von DNSSEC-fähigen Resolvern. Weiterhin führen beide die Zuhörer in die Grundlagen von DNSSEC ein. Shownotes BleepingComputer: New SSH-Snake malware steals SSH keys to spread across the network (21.02.2024) BleepingComputer: KeyTrap attack: Internet access disrupted with one DNS packet (17.02.2024) Namensnennung Die Hintergrundmusik wurde uns freundlicherweise von Jason Shawn von Audio...
2024-02-28
36 min
MarketOpen Podcast
MarketOpen Podcast Episode 31 - SSH Group
In this episode, we sit down with Daniel Cowley-Cooper, who serves as the Chief Executive Officer and Managing Director of SSH Group (ASX:SSH). Join us as we delve into the most recent developments and valuable insights within SSH, and take a closer look at what drives Daniel's success.Daniel has held senior leadership roles in several Australian businesses, successfully launching new brands and guiding businesses through growth and expansion phases.
2024-01-31
09 min
BSD Now
540: Terrapin Attacks SSH
Terrapin Attack, SSH Hardening with ssh-audit, MidnightBSD 3.1.2, syscall(2) removed from -current, 2024 FreeBSD Community Survey is Here NOTES This episode of BSDNow is brought to you by Tarsnap and the BSDNow Patreon Headlines Terrapin Attack OpenSSH 9.6 is out OpenBSD Patches FreeBSD Patches If anyone is aware of NetBSD Patches, please send them into the show so I can update the show notes SSH Hardening with ssh-audit News Roundup MidnightBSD 3.1.2 syscall(2) removed from -current 2024 FreeBSD Community Survey is Here Tarsnap This...
2024-01-04
53 min
Buongiorno da Edo
Terrapin ha trovato il modo di rendere SSH insicuro, e altre news - Buongiorno 160
Ricercatori hanno scoperto una falla nell'handshake di SSH che ne degrada la security, vediamo un po' come fa, e poi alcuni altri aggiornamenti su OpenTofu, su Adobe e Figma, su Threads e Mastodon. 00:00 Intro 01:09 Terrapin minaccia SSH 07:17 OpenTofu RC 09:33 Adobe e Figma, Fedipact 12:08 Links #ssh #cybersecurity #security #terrapin #adobe #figma #opentofu === Podcast Spotify - https://open.spotify.com/show/4B2I1RTHTS5YkbCYfLCveU Apple Podcasts - https://podcasts.apple.com/us/p...
2023-12-21
14 min
The Post-Quantum World
Quantum-Safe Cryptographic Security – with Suvi Lampila of SSH
Cracking RSA in web traffic is primarily what people think of when they hear about the quantum threat to cryptography. But there are lots of protocols in peril, especially in a typical corporate environment. Join host Konstantinos Karagiannis for a chat with Suvi Lampila from SSH to find out how the security giant is working on securing data flows you may not have considered. For more on SSH communications security, visit www.ssh.com/. Visit Protiviti at www.protiviti.com/postquantum to learn more about how Protiviti is helping organizations get post-quantum ready. Follow host Konstantinos Kara...
2023-06-14
48 min
Chaos Computer Club - archive feed
Noch besser leben mit SSH (gpn21)
Aliase, Anmeldung mit Zertifikaten, ssh-agent -- all die praktischen Dinge, mit denen eins sich das Leben mit SSH einfacher machen kann, kennst Du schon. Dass lass uns mal drüber reden, wie Du SSH noch sicherer, resistenter gegenüber Angriffen machen kannst. Ein paar Tipps für das tägliche Arbeiten mit SSH gibts natürlich auch. Am meisten nimmst Du aus dem Talk mit, wenn Du SSH schon mal verwendet hast. Ein Blick in meinen Talk von 2022 ist hilfreich, aber nicht Voraussetzung. SSH EinsteigerInnen sind selbstverständlich auch herzlich willkommen. SSH Profis finden maximal die Witze in diesem Vortrag intere...
2023-06-09
53 min
CodeFlow
SSH und SFTP: Tipps und Tricks
In dieser Folge dreht sich alles um SSH, SSH-Keys und sftp. Ich erkläre, wie diese Tools dein Leben erleichtern können, indem sie dir einen schnellen und sicheren Zugriff auf Remote-Server ermöglichen, ohne lästiges wiederholtes Einloggen. Ich teile nützliche Anleitungen, die dir dabei helfen, SSH-Keys richtig einzurichten und sftp-Verzeichnisse effizient zu mounten: SSH Key einrichten sftp Verzeichnis mounten Diese Tipps erhöhen nicht nur die Bequemlichkeit im Umgang mit Remote-Servern, sondern verbessern auch die Sicherheit deiner Verbindungen. Kontaktiere mich! Matrix Space: Diskutiere mit und tausche dich aus. Besuche meinen...
2023-05-11
15 min
Yomikai
#4 GitHubにSSHできない? / Discordのデータベース
今回は以下の2本の記事について話しました。 1本目 (0:15) は、GitHubのRSA SSHキーが流出したインシデントについて。対応策としてGitHubのSSHキーが更新されたため、ローカルのSSH known_hostsを新しい値に更新しないとGitHubにSSHできないという挙動が生じました。キーの流出により可能になるMan-in-the-Middle Attack (MITM)とは具体的になんなのか、MITMを普段のweb開発で活かす方法、などについて話しました。 2本目 (16:50) はDiscordのチャットデータベースの変遷について。2015年のリリースからMongoDB、Casandra、ScyllaDBへと変わってきた過程を、BツリーやLSMツリーの仕組みを踏まえて振り返りました。 40:20からはアフタートークです。 【参考リンク】 We updated our RSA SSH host key Man-in-the-middle attack in SSH - How does it work? Burp Suite - Application Security Testing Software How discord stores billions of messages (2017) How discord stores trillions of messages (2023) BツリーとLSMツリー スマートフォン内に保存しているデータベースの暗号化にLINEが取り組む理由
2023-04-04
48 min
AAO Radiolab 1
5. Организация курсов в SSH: как оценивают студентов? Поговорим об этом и не только с Галией Сагындыковой
В этом выпуске мы поговорим об организации курсов и системе оценивания в SSH. Вы узнаете о том:- Как организован курс PHYS 161?- Как выстроена система оценивания и кервинга в SSH?- Как предложить свои улучшения по организации курсов SSH?- Каковы будущие планы и проекты SSH? Гость выпуска - Директор Образовательных Дисциплин SSH, Галия Сагындыкова.
2023-03-31
52 min
The Backend Engineering Show with Hussein Nasser
GitHub SSH key is Leaked - How bad is this?
GitHub Accidentally Exposed their SSH RSA Private key, this is the message you will get . @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ @ WARNING: REMOTE HOST IDENTIFICATION HAS CHANGED! @ @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ IT IS POSSIBLE THAT SOMEONE IS DOING SOMETHING NASTY! Someone could be eavesdropping on you right now (man-in-the-middle attack)! It is also possible that a host key has just been changed. The fingerprint for the RSA key sent by the remote host is SHA256:uNiVztksCsDhcc0u9e8BujQXVUpKZIDTMczCvj3tD2s. Please contact your system administrator. Add correct host key in ~/.ssh/known_hosts to get rid of this message. Host key for github.com has changed and you...
2023-03-30
21 min
Podcast de Redes de Eduardo Collado
Túneles SSH
A día de hoy levantar una VPN está chupado, levantar un wireguard es una tarea sencilla que podemos hacer en un momento. Si tenemos que acceder a una red remota podemos hacerlo con un wireguard, claro que sí, sin problema, pero muchas veces necesitamos una solución rápida y directa, algo más rápido que levantar una VPN, o incluso puede que levantar una VPN sea un poco complicado porque se pisen direccionamientos o cualuier otro motivo. Para acceder a servicios remotos a veces lo más fácil es levantar un túnel SSH...
2023-03-06
18 min
VB Pro
Something About Secure Shell Hosting Or SSH
Secure Hosting is necessary because of the increase of attacks while SSH Client transferring files and other sensitive information. To execute commands on the server from the terminal, we can use Telnet but it is declined because of insecure. It sends the commands to the server side for execution as it is (Plain text). That is without performing any encryption techniques.In Simple words, Secure Shell is a program which is used to log in to remote computer and can execute some commands on that machine and can also transfer some files over a...
2023-02-13
00 min
Configuration Examples with KevTechify for the Cisco Certified Network Associate (CCNA)
Configure SSH - Basic Device Configuration - Configuration Examples for Switching, Routing, and Wireless Essentials - CCNA - KevTechify | podcast 31
In this episode we are going to look at configuring Configure SSH.SSH should replace Telnet for management connections. Telnet uses insecure plain text communications. SSH provides security for remote connections by providing strong encryption of all transmitted data between devices. In this activity, we will secure a remote switch with password encryption and SSH. We will be discussing Secure Passwords, Encrypt Communications, and Verify SSH Implementation.Thank you so much for watching this episode of my series on Configuration Examples for the Cisco Certified Network Associate (CCNA).Once again, I’m...
2022-08-03
17 min
Chaos Computer Club - archive feed
SSH Configuration, Intermediate Level (MCH2022)
So, you know how to "use" the ssh command line? You enter connection parameters like username, hostname or private key every time you need to connect? You manually log into the jump/bastion host when connecting to your target host? Then come to this session and learn how you can make your life easier and your work more efficient by using custom config files and a tiny little bit of preparation. So, you know how to "use" the ssh command line? You enter connection parameters like username, hostname or private key every time you need to connect? You manually log...
2022-07-26
48 min
Protocol
Setting Up an SSH Bastion Host
What is an SSH bastion and how is this different from an SSH jump server or an SSH proxy? https://goteleport.com/blog/ssh-bastion-host/ What is an SSH bastion and how is this different from an SSH jump server or an SSH proxy? In this post, we’ll answer this question and will show you how to set it up using two popular open source projects. OpenSSH is the older and better known SSH server. It comes pre-installed by default with the vast majority of Linux distributions and is the easier option to get started wi...
2022-05-24
10 min
Protocol
SSH Best Practices using Certificates, 2FA and Bastions
The industry best practices for SSH security include using certificates, two-factor authentication, and SSH bastion hosts. B https://goteleport.com/blog/how-to-ssh-properly/ There's no denying that SSH is the de facto tool for *nix server administration. It's far from perfect, but it was designed with security in mind, and there's been a huge amount of tooling written over the years to make it easier to use. In addition, many popular products and just about every server deployment system integrate with SSH somehow. It is universally supported across pretty much all architectures and distributions, from Raspberry Pi's all...
2022-05-24
23 min
Root Causes: A PKI and Security Podcast
Root Causes 226: The Six Benefits of SSH Certificates
In this third episode in our series on SSH keys, we identify the six main benefits of SSH certificates and how they mitigate the problems with SSH identified in earlier episodes.
2022-05-24
21 min
Root Causes: A PKI and Security Podcast
Root Causes 226: The Six Benefits of SSH Certificates
In this third episode in our series on SSH keys, we identify the six main benefits of SSH certificates and how they mitigate the problems with SSH identified in earlier episodes.
2022-05-24
21 min
Tech Brewed
Tech Brewed Tech Tip - SSH and IoT Defined
Send a textThe internet of things (IoT) is a network of interconnected devices and objects that can collect and exchange data. These smart devices can interact with each other and humans, making our lives easier and more efficient. IoT relies on artificial intelligence (AI) to make decisions based on the data collected by the devices. SSH (Secure Shell) is a cryptographic network protocol for secure data communication, remote command-line login, and other secure network services between two networked computers. It replaces insecure protocols such as telnet, rlogin, and ftp. SSH was created as an o...
2022-02-24
02 min
Network Security with KevTechify on the Cisco Certified Network Associate (CCNA)
Configure SSH - Secure Device Access - Network Security - KevTechify | Podcast 16
Greetings to all my Tech Heads out there in the KevTechify Nation and if you are new here, welcome.In this episode we are going to look at Configure SSH.We will be discussing The Need for SSH, Enable SSH, Enhance SSH Login Security, Syntax Checker - Enable SSH on R2, Connect a Router to an SSH-Enabled Router, Connect a Host to an SSH-Enabled Router, Configure Secure Administrative Access, Configure Secure Passwords and SSH, and Configure Network Devices with SSH.Thank you so much for listening to this episode of my series on N...
2022-02-17
12 min
Protocol
How to Set Up an SSH Jump Server
In this blog post we’ll cover how to set up an SSH jump server. We’ll cover two open source projects. A traditional SSH jump server using OpenSSH. The advantage of this method is that your servers already have OpenSSH pre-installed. https://goteleport.com/blog/ssh-jump-server/ What is an SSH Jump Server? An SSH jump server is a regular Linux server, accessible from the Internet, which is used as a gateway to access other Linux machines on a private network using the SSH protocol. Sometimes an SSH jump server is also called a “jump host”...
2022-01-18
08 min
La comandería.
Administra tus servidores con SSH.
¿Alguna habéis pensado como se gestiona un servidor si está ubicado a kilómetros de distancia? Estamos acostumbrados a sentarnos delante del ordenador que queremos gestionar, pero cuando se trata de un servidor es diferente. Los servidores están ubicados en centros específicos bajo unas condiciones muy controladas de seguridad y temperatura, con lo que su acceso presencial es bastante complicado. Para realizar las gestiones oportunas existe un protocolo que nos permite conectarnos a cualquier ordenador mediante una terminal.Normalmente esa terminal es remota y se accede con un protocolo llamado SSH (Secure...
2021-08-10
12 min
PC Networking
What is SSH (Secure Shell), and What are its Features?
What is SSH (Secure Shell), and What are its Features? Secure Shell (SSH) is a network protocol that provides users, especially system administrators, a secure way to access a computer over an unsecured network. SSH is a network protocol that provides users, especially system administrators, a secure way to access a computer over an unsecured network. SSH provides strong authentication and encrypted data communication between two computers connected over an open network such as the internet. SSH is widely used by network administrators to remotely manage systems and applications. Thus, this protocol allows...
2021-03-05
02 min
Chit Chat Across the Pond
CCATP #672 – TTT 37A of n – SSH Agents
In 2017 on Taming the Terminal installment 37 of n, Bart taught us about SSH agents and the advantages of using a passphrase to further protect your SSH keys. In the intervening four years, things have changed a bit in macOS, so we decided to do a supplemental update to installment 37. We review a bit about what SSH Keys are (from installment 30) and then discuss how much easier and cleaner things are on macOS with the clean integration of your identity, passphrase and Apple's Keychain. You can find the replaced show notes for TTT 37 at ttt.bartificer.net/...
2021-02-21
31 min
Chit Chat Across the Pond
CCATP #672 – TTT 37A of n – SSH Agents
In 2017 on Taming the Terminal installment 37 of n, Bart taught us about SSH agents and the advantages of using a passphrase to further protect your SSH keys. In the intervening four years, things have changed a bit in macOS, so we decided to do a supplemental update to installment 37. We review a bit about what SSH Keys are (from installment 30) and then discuss how much easier and cleaner things are on macOS with the clean integration of your identity, passphrase and Apple's Keychain. You can find the replaced show notes for TTT 37 at ttt.bartificer.net/...
2021-02-21
31 min
Security All In
Tatu Ylonen- Founder of SSH Communications Security
Tatu and Sam discuss how the SSH protocol became “viral” when Tatu first created it in the mid-’90s. What led Tatu to dive, head first, into a field he knew little about when he first created SSH. What is the link between security and communication, and what fascinates Tatu so much about language and the […] The post Tatu Ylonen- Founder of SSH Communications Security appeared first on Malicious Life.
2020-10-28
17 min
Atareao con Linux
ATA 213 Gestiona tus túneles SSH desde el escritorio
Este es del tio de episodios que mas me gustan. Y, no me refiero a este episodio en concreto, sino al tipo de episodios. Y es que en este tipo de episodio tengo la oportunidad de hacer un refrito de la técnica de sistemas con el entorno de escritorio, mostrando lo mejor de cada uno de los mundos. Desde luego que el terminal tiene un gran potencial, no solo para ser mucho mas productivo, sino también para ahuyentar al usuario de a pie. Realmente, el usuario de a pie no necesita la consola para absolutamente nada, aunque en...
2020-09-21
19 min
Podcast de Redes de Eduardo Collado
Algoritmos de cifrado en SSH
El otro día mirando los algoritmos de cifrado en SSH cayó en mi mano un artículo que empezaba con la siguiente frase: ¿Qué es peor que una clave privada insegura? Una clave pública insegura. Me parece una frase maravillosa y me pareció un tema muy bueno, lo suficiente como para dedicarle un largo rato de estudio al tema. Como administradores de sistemas sabemos qué es SSH, o como mínimo si no sabemos qué es sabemos para qué sirve y cómo usarlo. Sabemos que SSH significa «SHell Segura«, Shell...
2020-08-28
23 min
opensource и около
Настраиваем авторизацию SSH по ключу в Linux / Unix
Запускаем мощную платную обучающую программу, интересно принять участие? Пройдите опрос — https://simpoll.ru/run/survey/c44b6a04 Поддержать канал и получить доступ к закрытым видео — https://boosty.to/digitalize.team Заходить (авторизоваться) на сервер по SSH можно, используя пару логин-пароль, а можно, используя пару публичного и приватного ключа, причём именно использование ключей является способом предпочтительным. Почему? Во-первых, вход по SSH ключам безопаснее, во-вторых, удобнее. Как это настроить и использовать — об этом пойдёт речь в очередном видео, а заодно обсудим настройку серверного SSH, запрет входа root пользователем, запрет входа по паролю и другие важные фичи. Поехали! Разбираемся с Tmux — https://www.youtube.com/watch?v=1Y2CD4WnbP0 Изучаем Vim — https://www.youtube.com/watch?v=SHo3fAZfXMk Быстрое копирование многогигабайтных файлов в *nix — https://www.youtube.com/watch?v=vTkJhy-Deck /****************** about ******************/ Меня зовут Алексей Голобурдин, я программирую с 2004 года и на этом канале делюсь своим опытом. Я основатель и руководитель компаний: — Диджитализируй https://digitalize.team, разрабатываем сложные IT системы для бизнеса; — Salesbeat https://salesbeat.pro, комплексный модуль доставки для интернет магазинов. Если у вас есть проект на разработку, пишите нам на hi@digitalize.team. С другими предложениями, а также если вам нужна одна или несколько индивидуальных консультаций/уроков по разработке (3000 руб/час), пишите мне на alexey@salesbeat.pro. Мои соц сети: https://www.facebook.com/a.goloburdin https://www.instagram.com/alexeygoloburdin/ https://vk.com/a.goloburdin
2020-08-04
00 min
opensource и около
Настраиваем авторизацию SSH по ключу в Linux / Unix
Запускаем мощную платную обучающую программу, интересно принять участие? Пройдите опрос — https://simpoll.ru/run/survey/c44b6a04 Поддержать канал и получить доступ к закрытым видео — https://boosty.to/digitalize.team Заходить (авторизоваться) на сервер по SSH можно, используя пару логин-пароль, а можно, используя пару публичного и приватного ключа, причём именно использование ключей является способом предпочтительным. Почему? Во-первых, вход по SSH ключам безопаснее, во-вторых, удобнее. Как это настроить и использовать — об этом пойдёт речь в очередном видео, а заодно обсудим настройку серверного SSH, запрет входа root пользователем, запрет входа по паролю и другие важные фичи. Поехали! Разбираемся с Tmux — https://www.youtube.com/watch?v=1Y2CD4WnbP0 Изучаем Vim — https://www.youtube.com/watch?v=SHo3fAZfXMk Быстрое копирование многогигабайтных файлов в *nix — https://www.youtube.com/watch?v=vTkJhy-Deck /****************** about ******************/ Меня зовут Алексей Голобурдин, я программирую с 2004 года и на этом канале делюсь своим опытом. Я основатель и руководитель компаний: — Диджитализируй https://digitalize.team, разрабатываем сложные IT системы для бизнеса; — Salesbeat https://salesbeat.pro, комплексный модуль доставки для интернет магазинов. Если у вас есть проект на разработку, пишите нам на hi@digitalize.team. С другими предложениями, а также если вам нужна одна или несколько индивидуальных консультаций/уроков по разработке (3000 руб/час), пишите мне на alexey@salesbeat.pro. Мои соц сети: https://www.facebook.com/a.goloburdin https://www.instagram.com/alexeygoloburdin/ https://vk.com/a.goloburdin
2020-08-04
00 min
Podcast de Redes de Eduardo Collado
Ejecución remota de comandos con ssh
Para realizar una ejecución remota de comandos con ssh lo primero que tenemos que hacer es añadir nuestra llave al fichero authorized_keys del usuario correspondiente del equipo remoto. El authorized_keys lo tenéis en el directorio ~/.ssh Otra opción es hacer un ssh-copy-id y con eso copiará nuestra llave. Una vez tengamos la llave ya podemos realizar ejecuciones remotas. Un ejemplo de ejecución remota es: ssh 198.51.100.4 "uptime" Ese comando nos dice el uptime de la máquina remota, sólo hace eso, pero siempre...
2020-07-03
18 min
Root Causes: A PKI and Security Podcast
Root Causes 86: SSH Keys
SSH keys are essential for controlling access to production infrastructure. Our hosts are joined by repeat guest David Colon to discuss how SSH keys are used in contemporary computing environments, what risks they carry with them, and tips for IT professionals to use SSH keys easily and securely.
2020-04-27
18 min
David Bombal
#127: VIRL 2 Terminal Server SSH, Multiple Tabs, Scripts And More
VIRL 2 has a built-in multiplexing terminal server that allows you to SSH directly to devices running in VIRL. You can either SSH to the terminal server and then use commands to access devices, or you can SSH directly to the individual devices. The advantage of this is that you can use applications such SecureCRT, Royal TSX or SolarPutty that support multiple tabs to easily access individual devices running with in VIRL. This is Part 4 of my VIRL series showing you how to download, install and configure Cisco VIRL 2. The new version of Cisco VIRL allows you to create virtual Cisco...
2020-04-07
19 min
David Bombal
#127: David Bombal: VIRL 2 Terminal Server SSH, Multiple Tabs, Scripts And More
VIRL 2 has a built-in multiplexing terminal server that allows you to SSH directly to devices running in VIRL. You can either SSH to the terminal server and then use commands to access devices, or you can SSH directly to the individual devices. The advantage of this is that you can use applications such SecureCRT, Royal TSX or SolarPutty that support multiple tabs to easily access individual devices running with in VIRL. This is Part 4 of my VIRL series showing you how to download, install and configure Cisco VIRL 2. The new version of Cisco VIRL...
2020-04-07
19 min
Atareao con Linux
ATA 107 - SSH desde Windows con MobaXterm
Creo que lo he comentado en algún que otro episodio del podcast. Pero, sea como fuere, la cuestión, en el trabajo tengo que utilizar Windows. Esto tiene dos problemas para mi. Por un lado que no me encuentro tan cómodo como me encontraría si estuviera con Linux. Si fuera Ubuntu, mejor, pero esto sería con independencia de la distribución. Por otro lado, es que al final me tengo que conectar a máquinas Linux vía SSH. En este sentido, hasta hace algo mas de un año, había estado utilizando herramientas como Putty...
2019-09-16
19 min
Atareao con Linux
ATA 106 - Configuración SSH y segunda temporada
Aquí comienza la segunda temporada del podcast.¿Que fecha mas rara? Lo he cambiado para la próxima temporada. En este episodio te quiero contar que es lo que vas a encontrar en atareao.es durante los próximos meses. Sin embargo, esto no está cerrado ni mucho menos, por lo que te comentaré mas adelante. ¿Quien me lo iba a decir a mi cuando empecé con aquel primer podcast titulado sobre el peligro de las apuestas? Empujado por Angel uGeek. Ya ves, segunda temporada con algo mas de 100 episodios a las espaldas… Por otro lado, te quiero hablar de mi expe...
2019-09-12
24 min
Chaos Computer Club - archive feed (high quality)
SSH Tipps und Tricks (cosin2019)
Für Unix-Systemadministratoren ist die SSH heutzutage ein unverzichtbares Arbeitsmittel, aber die meisten nutzen und kennen nur ihre elementarsten Funktionen. Der Vortrag soll Anfängern und Fortgeschrittenen zeigen, was man mit der SSH neben auf dem Server einloggen noch so alles anstellen kann. Für Unix-Systemadministratoren ist die SSH heutzutage ein unverzichtbares Arbeitsmittel, aber die meisten nutzen und kennen nur ihre elementarsten Funktionen. Der Vortrag soll Anfängern und Fortgeschrittenen zeigen, was man mit der SSH neben auf dem Server einloggen noch so alles anstellen kann: Dienste tunneln, Trigger auslösen, per SOCKS-Proxy von woanders aus surfen, auf anderen Rechnern liege...
2019-06-15
45 min
PSIADE Learning Channel
Linux/Mac Tutorial: SSH Key-Based Authentication - How to SSH Without a Password
In this Linux/Mac terminal tutorial, we will be learning how to configure ssh keys so that we can login to our servers without a password. Not only is this more convenient, but it is also more secure. This also allows us to write automated scripts to talk to our servers without the need of putting in passwords constantly. Let's get started. How to Create a Network of Machines in VirtualBox with SSH Access: https://youtu.be/S7jD6nnYJy0 If you enjoy these videos and would like to support my channel, I would...
2018-12-10
00 min
PSIADE Learning Channel
Linux/Mac Tutorial: SSH Key-Based Authentication - How to SSH Without a Password
In this Linux/Mac terminal tutorial, we will be learning how to configure ssh keys so that we can login to our servers without a password. Not only is this more convenient, but it is also more secure. This also allows us to write automated scripts to talk to our servers without the need of putting in passwords constantly. Let's get started. How to Create a Network of Machines in VirtualBox with SSH Access: https://youtu.be/S7jD6nnYJy0 If you enjoy these videos and would like to support my channel, I would...
2018-12-10
00 min
Canvas
SSH from iOS
This week we dive into a nerdy topic: working with SSH connections on iOS. This episode of Canvas is sponsored by: Sanebox: Clean up your inbox in minutes. Sign up for a two-week free trial and a $20 credit. Links and Show Notes: Using SSH is not necessarily part of every computer user's daily life but, for those who know they want it, iOS has a number of good options for making SSH connections on the go. Featured Apps Prompt 2 iSSH 2 Blink Shell: Mosh & SSH Featured Links Teaching Programming...
2018-01-19
43 min
Semi-Intellectual Musings
Conferences & Making SSH Matter
Phil & Matt start this episode by talking about their favorite writing implement: pens. Phil is reminded of the West Wing, again. While retelling the story of how we got our first unsolicited podcast advice, we had to do our first content edit after Phil told the listener to !@#$ off... Fortunately, the show moved on to things that actually matter. Conferences & Making SSH Matter (16:10) As academic conference season gets off to a start, Matt & Phil talk about how and why academics share their goods in public. If you’re looking for a large academic gathering of SS...
2017-05-29
1h 08
Taming the Terminal
TTT 37A of n – SSH Agents
In 2017 on Taming the Terminal installment 37 of n, Bart taught us about SSH agents and the advantages of using a passphrase to further protect your SSH keys. In the intervening four years, things have changed a bit in macOS, so we decided to do a supplemental update to installment 37. We review a bit about what SSH Keys are (from installment 30) and then discuss how much easier and cleaner things are on macOS with the clean integration of your identity, passphrase and Apple's Keychain. You can find the replaced show notes for TTT 37 at ttt.bartificer.net/...
2017-05-27
31 min
Taming the Terminal – Bart Busschots
TTT Part 37 of n – SSH Agents
Since we covered SSH in parts 29 & 30, Apple have changed how their desktop OS deals with the passphrases protecting SSH identities (key pairs). This provides us a good opportunity to have a look at the SSH Agent in general, and, how things have changed on the Mac in particular. The good news is that while things have changed on the Mac, with a small amount of effort, you can get back all the convenience and security you had before. Listen Along: Taming the Terminal Podcast Episode 37 https://media.blubrry.com/nosillacast/traffic.libsyn...
2017-05-25
00 min
System Administration – Bart Busschots
TTT Part 37 of n – SSH Agents
Since we covered SSH in parts 29 & 30, Apple have changed how their desktop OS deals with the passphrases protecting SSH identities (key pairs). This provides us a good opportunity to have a look at the SSH Agent in general, and, how things have changed on the Mac in particular. The good news is that while things have changed on the Mac, with a small amount of effort, you can get back all the convenience and security you had before. Listen Along: Taming the Terminal Podcast Episode 37 https://media.blubrry.com/nosillacast/traffic.libsyn...
2017-05-25
00 min
Conversas em Código
Ep. 7 - Dicas SSH
Neste episódio falamos sobre algumas funcionalidades menos conhecidas relacionadas com SSH.Segue-nos no Mastodon ou no Twitter e junta-te ao nosso Slack.Links:SSH client escape sequences https://lonesysadmin.net/2011/11/08/ssh-escape-sequences-aka-kill-dead-ssh-sessions/connection multiplexing http://man.openbsd.org/ssh_confighttps://en.wikibooks.org/wiki/OpenSSH/Cookbook/Multiplexing#Setting_Up_Multiplexinghttp://blog.scottlowe.org/2015/12/11/using-ssh-multiplexing/authorized_keys http://man.openbsd.org/OpenBSD-current/man8/sshd.8http://gitolite.com/gitolite/glssh.html#how-does-gitolite-use-all-this-ssh-magicSSH Tunnels http://blog.trackets.com/2014/05/17/ssh-tunnel-local-and-remote-port-forwarding-explained-with-examples.htmlhttp://unix.stackexchange.com/questions/46235/how-does-reverse-ssh-tunneling-worksshuttle http://sshuttle.readthedocs.io/en/stable/https://github.com/sshuttle/sshuttle.git
2016-11-22
17 min
Conversas em Código
Ep. 7 - Dicas SSH
Shownotes SSH client escape sequences https://lonesysadmin.net/2011/11/08/ssh-escape-sequences-aka-kill-dead-ssh-sessions/ connection multiplexing http://man.openbsd.org/ssh_config https://en.wikibooks.org/wiki/OpenSSH/Cookbook/Multiplexing#Setting_Up_Multiplexing http://blog.scottlowe.org/2015/12/11/using-ssh-multiplexing/ authorized_keys http://man.openbsd.org/OpenBSD-current/man8/sshd.8 http://gitolite.com/gitolite/glssh.html#how-does-gitolite-use-all-this-ssh-magic SSH Tunnels http://blog.trackets.com/2014/05/17/ssh-tunnel-local-and-remote-port-forwarding-explained-with-examples.html http://unix.stackexchange.com/questions/46235/how-does-reverse-ssh-tunneling-work sshuttle http://sshuttle.readthedocs.io/en/stable/ https://github.com/sshuttle/sshuttle.git
2016-11-22
17 min
Taming the Terminal
TTT 33 of n - SSH Bookmarks
In this installment we learn how to use SSH config files to automate some aspects of SSH, creating what amount to bookmarks to servers we connect to often. We'll also look at some GUIs for storing SSH connection details. As always, you can get to Bart's fabulous tutorial shownotes at ttt.bartificer.net/...
2015-10-23
00 min
Taming the Terminal – Bart Busschots
TTT Part 33 of n – SSH ‘Bookmarks’
This is the final SSH instalment. So far we’ve learned how to securely execute terminal commands on remote computers, how to securely copy files across the network using SSH, how to add both security and convenience to both those operations with SSH key pairs, and how to tunnel just about anything through SSH. In this final instalment we’ll look two approaches for creating SSH bookmarks, SSH config files, and SSH GUIs. Listen Along: Taming the Terminal Podcast Episode 33 http://media.blubrry.com/tamingtheterminal/archive.org/download/TTT33SSHBookmarks/TTT_33_SSH_Bookmarks.mp3 podc...
2015-04-25
00 min
Taming the Terminal – Bart Busschots
TTT Part 32 of n – SSH Tunnelling
This is the fourth SSH instalment. So far we’ve learned how to securely execute terminal commands on remote computers, how to securely copy files across the network using SSH, and how to add both security and convenience to both those operations with SSH key pairs. As we saw in the previous instalment, SSH’s ability to provide a secure connection between two computers can be used in many different ways. In this instalment we’ll learn about three more ways to encapsulate other network traffic within an SSH connection, adding encryption to that traffic. Runnin...
2015-04-06
00 min
Taming the Terminal – Bart Busschots
TTT Part 31 of n – SSH File Transfers
In Part 29 of n we learned how to use SSH to execute commands on a remote computer. In the previous instalment we learned how to add security and convenience to SSH connections using SSH key-pairs. The most important thing SSH provides is an encrypted connection between two computers. As we’ve seen, that encrypted connection can be used to securely issue terminal commands to a remote computer, but that same secured channel can also be used to secure other network connections between computers. In this instalment we’ll look at three different ways of securely copying files betw...
2015-04-04
00 min
Tech Chats from ITProPortal.com
SSH Security says, After Snowden, Why Ignore Keys?
Many organisations take proactive steps to prevent hackers from gaining access to company networks, believing that by keeping the information safely inside it¹s secure. What companies forget is that IT administrators, with unfettered access to company information, are in an ideal position to leak sensitive information. Jason Thompson, Director of Global Marketing from SSH Security is here to talk about the need for SSH key management to close security holes and control system administrators access to critical systems and data. For related articles and podcasts visit: http://www.itproportal.com
2013-12-06
11 min
Chaos Computer Club - archive feed (high quality)
SSH Security vs. Automation (linuxtag13)
Are you still ignoring the WARNING: REMOTE HOST IDENTIFICATION HAS CHANGED! messages? Do you use “ssh -o StrictHostkeyChecking=no -o UserKnownHostsFile=/dev/null” to make SSH connections? How can you trust SSH keys in an environment where you install 10 new servers every day? Many How-Tos and articles talk about SSH security but fail to put SSH security into the context of managing large data centers with a high degree of automation. Based upon recent research into these topics, this talk covers the ground with SSH security features and shows advanced usage scenarios like: How to differentiat between human-machine and machine-machine comm...
2013-05-25
16 min
Tech Chats from ITProPortal.com
The release of SSH Risk Assessor
In this podcast I speak to Matthew McKenna, COO and EVP of SSH Communications who have launched their SSH Risk Assessor Security product at Infosecurity Europe this year. They talk us through the product and explain some of the other elements around SSH security. For related articles and podcasts visit http://www.itproportal.com Firstly give us some of the background on SSH? SSH are the inventors of the SSH protocol. The SSH protocol has been used for remote log on for Unix admins for a...
2013-05-08
10 min
Hackerfunk
HF025 - Secure Shell SSH
Zusammen mit XTaran rede ich über die Secure Shell SSH. Wir besprechen die Geschichte und die ganzen lustigen Sachen, die man damit zwischen seinen Servern so machen kann. Trackliste Palerider – Jump Aboard! XNI – Supreme Theme Leviathan – Forcefield Nächste Sendung am 4. Juli 2009, 19:00 Uhr FSK Hamburg :: Freies Sender Kombinat Hamburg NerdAlert :: NerdAlert Telnet :: Telnet bei Wikipedia RSH :: Remote Shell SSH :: Secure Shell SSH Tectia :: SSH Tectia OpenSSH Geschichte :: Geschichte und Entstehung von OpenSSH rsync :: rsync SSHFS :: Secure Shell Filesystem Public Key Kryp...
2009-06-06
58 min
Hackerfunk: MP3
HF025 - Secure Shell SSH
Zusammen mit XTaran rede ich über die Secure Shell SSH. Wir besprechen die Geschichte und die ganzen lustigen Sachen, die man damit zwischen seinen Servern so machen kann. Trackliste Palerider – Jump Aboard! XNI – Supreme Theme Leviathan – Forcefield Nächste Sendung am 4. Juli 2009, 19:00 Uhr FSK Hamburg :: Freies Sender Kombinat Hamburg NerdAlert :: NerdAlert Telnet :: Telnet bei Wikipedia RSH :: Remote Shell SSH :: Secure Shell SSH Tectia :: SSH Tectia OpenSSH Geschichte :: Geschichte und Entstehung von OpenSSH rsync :: rsync SSHFS :: Secure Shell Filesystem Public...
2009-06-06
58 min
Hackerfunk: ogg
HF025 - Secure Shell SSH
Zusammen mit XTaran rede ich über die Secure Shell SSH. Wir besprechen die Geschichte und die ganzen lustigen Sachen, die man damit zwischen seinen Servern so machen kann. Trackliste Palerider – Jump Aboard! XNI – Supreme Theme Leviathan – Forcefield Nächste Sendung am 4. Juli 2009, 19:00 Uhr FSK Hamburg :: Freies Sender Kombinat Hamburg NerdAlert :: NerdAlert Telnet :: Telnet bei Wikipedia RSH :: Remote Shell SSH :: Secure Shell SSH Tectia :: SSH Tectia OpenSSH Geschichte :: Geschichte und Entstehung von OpenSSH rsync :: rsync SSHFS :: Secure Shell Filesystem Public...
2009-06-06
58 min
Hackerfunk: mp3
HF025 - Secure Shell SSH
Zusammen mit XTaran rede ich über die Secure Shell SSH. Wir besprechen die Geschichte und die ganzen lustigen Sachen, die man damit zwischen seinen Servern so machen kann. Trackliste Palerider – Jump Aboard! XNI – Supreme Theme Leviathan – Forcefield Nächste Sendung am 4. Juli 2009, 19:00 Uhr FSK Hamburg :: Freies Sender Kombinat Hamburg NerdAlert :: NerdAlert Telnet :: Telnet bei Wikipedia RSH :: Remote Shell SSH :: Secure Shell SSH Tectia :: SSH Tectia OpenSSH Geschichte :: Geschichte und Entstehung von OpenSSH rsync :: rsync SSHFS :: Secure Shell Filesystem Public...
2009-06-06
58 min
Hackerfunk: mp3
HF025 - Secure Shell SSH
Zusammen mit XTaran rede ich über die Secure Shell SSH. Wir besprechen die Geschichte und die ganzen lustigen Sachen, die man damit zwischen seinen Servern so machen kann. Trackliste Palerider – Jump Aboard! XNI – Supreme Theme Leviathan – Forcefield Nächste Sendung am 4. Juli 2009, 19:00 Uhr FSK Hamburg :: Freies Sender Kombinat Hamburg NerdAlert :: NerdAlert Telnet :: Telnet bei Wikipedia RSH :: Remote Shell SSH :: Secure Shell SSH Tectia :: SSH Tectia OpenSSH Geschichte :: Geschichte und Entstehung von OpenSSH rsync :: rsync SSHFS :: Secure Shell Filesystem Public Key Kryp...
2009-06-06
58 min
Hackerfunk: ogg
HF025 - Secure Shell SSH
Zusammen mit XTaran rede ich über die Secure Shell SSH. Wir besprechen die Geschichte und die ganzen lustigen Sachen, die man damit zwischen seinen Servern so machen kann. Trackliste Palerider – Jump Aboard! XNI – Supreme Theme Leviathan – Forcefield Nächste Sendung am 4. Juli 2009, 19:00 Uhr FSK Hamburg :: Freies Sender Kombinat Hamburg NerdAlert :: NerdAlert Telnet :: Telnet bei Wikipedia RSH :: Remote Shell SSH :: Secure Shell SSH Tectia :: SSH Tectia OpenSSH Geschichte :: Geschichte und Entstehung von OpenSSH rsync :: rsync SSHFS :: Secure Shell Filesystem Public Key Kryp...
2009-06-06
58 min
Hackerfunk: MP3
HF025 - Secure Shell SSH
Zusammen mit XTaran rede ich über die Secure Shell SSH. Wir besprechen die Geschichte und die ganzen lustigen Sachen, die man damit zwischen seinen Servern so machen kann. Trackliste Palerider – Jump Aboard! XNI – Supreme Theme Leviathan – Forcefield Nächste Sendung am 4. Juli 2009, 19:00 Uhr FSK Hamburg :: Freies Sender Kombinat Hamburg NerdAlert :: NerdAlert Telnet :: Telnet bei Wikipedia RSH :: Remote Shell SSH :: Secure Shell SSH Tectia :: SSH Tectia OpenSSH Geschichte :: Geschichte und Entstehung von OpenSSH rsync :: rsync SSHFS :: Secure Shell Filesystem Public Key Kryp...
2009-06-06
58 min
iTechster.com Video Tutorials
Mac Linux Terminal: SSH File Transfer Part 2
Mac Linux Terminal: SSH File Transfer Part 2 Mac Linux Terminal: SSH File Transfer Part 2 In this tutorial I will show in this follow up vid to my previous tutorial on ssh file tranfers,. open up terminal type: ssh -l username yourIPaddress press enter type password. scp -r file/location username@ipAddress:/file/location press enter type in password when promted. Have Fun & Enjoy.
2008-08-17
04 min
Linux Reality Podcast (MP3 Feed)
Episode 037 - SSH
In this episode: Linux Reality server move; my initial impressions of the Release Candidate of Ubuntu Edgy Eft; a discussion of OpenSSH with an emphasis on ssh, scp, ssh-keygen, public/private key authentication, and dynamic port forwarding (additional link to PuTTY, a Windows SSH client); a Listener Tip on the Flock web browser; listener feedback. Extra notes are located here.
2006-10-24
00 min
Black Hat Briefings, Las Vegas 2005 [Audio] Presentations from the security conference
Adam Boileau: Trust Transience: Post Intrusion SSH Hijacking
Trust Transience: Post Intrusion SSH Hijacking explores the issues of transient trust relationships between hosts, and how to exploit them. Applying technique from anti-forensics, linux VXers, and some good-ole-fashioned blackhat creativity, a concrete example is presented in the form of a post-intrusion transparent SSH connection hijacker. The presentation covers the theory, a real world demonstration, the implementation of the SSH Hijacker with special reference to defeating forensic analysis, and everything you'll need to go home and hijack yourself some action. Adam Boileau is a deathmetal listening linux hippy from New Zealand. When not furiously playing air-guitar, he works for linux...
2006-06-05
59 min
Black Hat Briefings, Las Vegas 2005 [Video] Presentations from the security conference
Adam Boileau: Trust Transience: Post Intrusion SSH Hijacking
Trust Transience: Post Intrusion SSH Hijacking explores the issues of transient trust relationships between hosts, and how to exploit them. Applying technique from anti-forensics, linux VXers, and some good-ole-fashioned blackhat creativity, a concrete example is presented in the form of a post-intrusion transparent SSH connection hijacker. The presentation covers the theory, a real world demonstration, the implementation of the SSH Hijacker with special reference to defeating forensic analysis, and everything you'll need to go home and hijack yourself some action. Adam Boileau is a deathmetal listening linux hippy from New Zealand. When not furiously playing air-guitar, he works for linux...
2006-06-05
59 min