this post was submitted on 29 Aug 2025
7 points (100.0% liked)

cybersecurity

4970 readers
16 users here now

An umbrella community for all things cybersecurity / infosec. News, research, questions, are all welcome!

Community Rules

Enjoy!

founded 2 years ago
MODERATORS
 

In this paper, we present a method to identify compromised SSH servers at scale. For this, we use SSH's behavior to only send a challenge during public key authentication, to check if the key is present on the system. Our technique neither allows us to access compromised systems (unlike, e.g., testing known attacker passwords), nor does it require access for auditing.

no comments (yet)
sorted by: hot top controversial new old
there doesn't seem to be anything here