Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Catch-22 - Uncovering Compromised Hosts using SSH Public Keys

USENIX via YouTube

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Learn how to identify compromised SSH servers at Internet scale through a novel methodology that leverages SSH's public key authentication behavior. Discover a technique that uses SSH's challenge-response mechanism to detect malicious public keys on systems without requiring access credentials or system penetration. Explore the research findings that identified over 21,700 unique compromised systems across 1,649 ASes and 144 countries using 52 verified malicious keys from threat intelligence sources. Examine real-world case studies including the 'fritzfrog' IoT botnet, 'teamtnt' malicious actors, and state-actor associated keys within sensitive autonomous systems. Understand the limitations of honeypot data in representing attacker activities and learn about collaborative efforts with national CSIRTs and the Shadowserver Foundation for system remediation and continuous monitoring.

Syllabus

USENIX Security '25 - Catch-22: Uncovering Compromised Hosts using SSH Public Keys

Taught by

USENIX

Reviews

Start your review of Catch-22 - Uncovering Compromised Hosts using SSH Public Keys

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.