際際滷shows by User: adulau / http://www.slideshare.net/images/logo.gif 際際滷shows by User: adulau / Tue, 12 Jan 2021 15:14:41 GMT 際際滷Share feed for 際際滷shows by User: adulau Passive SSH, a Fast-Lookup Database of SSH Key Materials to Support Incident Response /adulau/passive-ssh-a-fastlookup-database-of-ssh-key-materials-to-support-incident-response passive-ssh-presentation-210112151442
Fingerprinting, tracing and tracking SSH network activities is a key functionality in network forensic and incident response. In the past years, Passive DNS and SSL have been a cornerstone for efficient incident handling at CIRCL. SSH connectivity is used to manage various devices from IoT up to network equipment or even critical devices. Passive SSH goal is to provide a fast-lookup database with the history of all the SSH keys seen per IPv4/IPv6 address on the global Internet. We developed an open source software toolkit to gather, analyse and store SSH key materials and provide an access to members of the CSIRT community.]]>

Fingerprinting, tracing and tracking SSH network activities is a key functionality in network forensic and incident response. In the past years, Passive DNS and SSL have been a cornerstone for efficient incident handling at CIRCL. SSH connectivity is used to manage various devices from IoT up to network equipment or even critical devices. Passive SSH goal is to provide a fast-lookup database with the history of all the SSH keys seen per IPv4/IPv6 address on the global Internet. We developed an open source software toolkit to gather, analyse and store SSH key materials and provide an access to members of the CSIRT community.]]>
Tue, 12 Jan 2021 15:14:41 GMT /adulau/passive-ssh-a-fastlookup-database-of-ssh-key-materials-to-support-incident-response adulau@slideshare.net(adulau) Passive SSH, a Fast-Lookup Database of SSH Key Materials to Support Incident Response adulau Fingerprinting, tracing and tracking SSH network activities is a key functionality in network forensic and incident response. In the past years, Passive DNS and SSL have been a cornerstone for efficient incident handling at CIRCL. SSH connectivity is used to manage various devices from IoT up to network equipment or even critical devices. Passive SSH goal is to provide a fast-lookup database with the history of all the SSH keys seen per IPv4/IPv6 address on the global Internet. We developed an open source software toolkit to gather, analyse and store SSH key materials and provide an access to members of the CSIRT community. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/passive-ssh-presentation-210112151442-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Fingerprinting, tracing and tracking SSH network activities is a key functionality in network forensic and incident response. In the past years, Passive DNS and SSL have been a cornerstone for efficient incident handling at CIRCL. SSH connectivity is used to manage various devices from IoT up to network equipment or even critical devices. Passive SSH goal is to provide a fast-lookup database with the history of all the SSH keys seen per IPv4/IPv6 address on the global Internet. We developed an open source software toolkit to gather, analyse and store SSH key materials and provide an access to members of the CSIRT community.
Passive SSH, a Fast-Lookup Database of SSH Key Materials to Support Incident Response from adulau
]]>
480 0 https://cdn.slidesharecdn.com/ss_thumbnails/passive-ssh-presentation-210112151442-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
https://public.slidesharecdn.com/v2/images/profile-picture.png