Some things you can learn from SSH traffic, (Wed, Apr 3rd)

This week, the SSH protocol made the news due to the now infamous xz-utils backdoor. One of my favorite detection techniques is network traffic analysis. Protocols like SSH make this, first of all, more difficult. However, as I did show in the discussion of SSH identification strings earlier this year, some information is still to be gained from SSH traffic [1].

This article has been indexed from SANS Internet Storm Center, InfoCON: green

Read the original article: