SSH Authorized Keys2 Backdoor Attack
SSH通过已弃用的`authorized_keys2`文件留下后门风险,许多Linux用户未知晓。视频演示滥用及检测方法,并介绍无代理Linux EDR工具Sandfly用于发现此类攻击及其他威胁。 2024-12-11 17:12:32 Author: sandflysecurity.com(查看原文) 阅读量:1 收藏

Sandfly Blog

SSH has a little known way to leave behind backdoor keys, and that is by using the deprecated authorized_keys2 file. Many Linux users are unaware of this feature and what risks it poses. In this video we discuss this access method and how it can be abused as a backdoor. Then we show you how to find it with command line tools and automatic detection with agentless Sandfly as a Linux EDR.

Sandfly is able to find this and many other types of Linux attacks without deploying any endpoint agents. Get your free license today or contact us for more information.



文章来源: https://sandflysecurity.com/blog/ssh-authorized-keys2-backdoor-attack
如有侵权请联系:admin#unsafe.sh