TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Black Hat 2024: Secure Shells in Shambles [pdf]

101 pointsby hdmoore10 months ago

6 comments

hdmoore10 months ago
The Secure Shell (SSH) protocol has survived as an internet-facing management protocol for almost 30 years. Over the decades it has transformed from a single patented codebase to a multitude of implementations available on nearly every operating system and network-connected device.<p>This presentation dives deep into the Secure Shell protocol, its popular implementations, what&#x27;s changed, what hasn&#x27;t, and how this leads to unexpected vulnerabilities and novel attacks. An open source tool, dubbed &quot;sshamble&quot;, will be demonstrated, which reproduces these attacks and opens the door for further research.<p><a href="https:&#x2F;&#x2F;github.com&#x2F;runZeroInc&#x2F;sshamble">https:&#x2F;&#x2F;github.com&#x2F;runZeroInc&#x2F;sshamble</a>
评论 #41215928 未加载
transpute10 months ago
SSH and other services can be further protected by Single Packet Authentication (SPA), <a href="https:&#x2F;&#x2F;github.com&#x2F;mrash&#x2F;fwknop">https:&#x2F;&#x2F;github.com&#x2F;mrash&#x2F;fwknop</a><p><i>&gt; SPA requires only a single packet which is encrypted, non-replayable, and authenticated via an HMAC in order to communicate desired access to a service that is hidden behind a firewall in a default-drop filtering stance. The main application of SPA is to use a firewall to drop all attempts to connect to services such as SSH in order to make the exploitation of vulnerabilities (both 0-day and unpatched code) more difficult.</i>
评论 #41215562 未加载
评论 #41215689 未加载
评论 #41215662 未加载
mrbluecoat10 months ago
&gt; Tons of issues in the periphery<p>I wonder how TinySSH[1] compares<p>[1] <a href="https:&#x2F;&#x2F;github.com&#x2F;janmojzis&#x2F;tinyssh">https:&#x2F;&#x2F;github.com&#x2F;janmojzis&#x2F;tinyssh</a>
tzury10 months ago
a lot to grasp in this one. anyone know if a video is available ?
评论 #41216504 未加载
metadat10 months ago
What is the fancy htop-like program displayed on page 44?<p>It reminds me of the DeLorean dashboard in Back To The Future :)
评论 #41217164 未加载
评论 #41217205 未加载
评论 #41217222 未加载
davidfiala10 months ago
Great presentation.<p>As the founder of teclada.com, I&#x27;ll also share that one of the biggest risks is not even technical but human:<p><pre><code> - not managing your SSH keys properly - not even knowing where they are - reuse, copying, etc - forgotten placement of keys in authorized_keys </code></pre> And worst of all:<p><pre><code> - &quot;no way I&#x27;m going to even consider changing any of it&quot; - &quot;our audit logs are .bash_history&quot; </code></pre> ¯\_(ツ)_&#x2F;¯