nixCraft, to macos
@nixCraft@mastodon.social avatar
YourAnonRiots, to linux Japanese
@YourAnonRiots@mstdn.social avatar

Urgent action required!

Internet-facing systems and IoT devices are under attack! Discover how threat actors hijack SSH credentials, deploy backdoors and mining .

https://thehackernews.com/2023/06/new-cryptocurrency-mining-campaign.html

kkarhan,
@kkarhan@mstdn.social avatar

@YourAnonRiots The best and simplest way is to restrict to authorized keys only, disable password logins and fail2ban IPs when they try to brute-force access...

You may also employ [network-wide] blocklists like the :
https://github.com/greyhat-academy/lists.d/blob/main/blocklists.list.tsv

governa, to linux
@governa@fosstodon.org avatar

The 7 Best Clients for :terminal: :linux:
https://www.makeuseof.com/best-ssh-clients-for-linux/

peter, to random
@peter@area51.social avatar

Just a reminder if you use BitBucket, they are replacing their RSA Host Key and removing the DSA Host key at 1700 UTC today

https://bitbucket.org/blog/ssh-host-key-changes

thomas, to sysadmin
@thomas@metalhead.club avatar

TIL: You can download your GitHub SSH public keys from this URL:

https://github.com/username.keys

...which is quite handy when you want to register your keys on a new machine with internet access ;)

abimelechbeutelbilch,

@thomas BTW:
Do you also know whoami.filippo.io ? (A server that knows who you are)
Therefore I have the following last line in my ~/.ssh/config:

Host *
User BadHackerFromHell # not my real one so my ssh-identify will not be made public)

nilmethod, to Ansible

I was settling in to tinker with today for work and I just discovered a host called "docker0" on my server here at the house. I have no entry for it in my config nor in . I have no clue what users are present on the system or what its purpose is. There does appear to be some state files laying around that might be related to it?

Current plan: murder it and see which family member starts to complain so I can identify what service(s) it's running.

WoodooProd, to gaming French
@WoodooProd@mastodon.cloud avatar

Nethack
You can play online or watch live playing games of Nethack at: nethack.alt.org

By telnet: telnet nethack.alt.org
or: telnet nethack.alt.org 14321

Or by ssh: ssh nethack@alt.org

I found that very cool to see people going far in the game

(Wonder if BBS possible. Curious!).

More:
https://nethackwiki.com/wiki/Nethack.alt.org

kohelet, to random
@kohelet@mstdn.social avatar

Connected to my 2 android devices via SSH on my laptop using

Now, I'm using for quite a long time now, how come I never thought to just to them??

idk it's just so cool. Now I need ideas for some projects I can do with my phones using termux.

kohelet, to random
@kohelet@mstdn.social avatar

SSHing into my Termux from my laptop is just so nice.

0xor0ne, to infosec

Very interesting reading about OpenSSH security measures (privilege separation and sandboxing)

https://jfrog.com/blog/examining-openssh-sandboxing-and-privilege-separation-attack-surface-analysis/

image/jpeg
image/jpeg

brunty, to random
@brunty@brunty.social avatar

I bloody love the agent stuff

diegelernten, to linux German

Erstmal das lokale Testsystem mit abgesichert https://ubuntu.com/tutorials/configure-ssh-2fa bevor es auf weitere Systeme ausgerollt wird

bitprophet, to programming
@bitprophet@social.coop avatar

3.1 / 3.2 out now, after months of hacking, rewriting, cursing ancient design decisions that don't work w/ non-OpenSSH targets, & so on & so forth.

Most of this is opt-in, experimental, and incomplete - but hey, it works well enough that my colleagues can get their ssh-agents and passphraseless pubkeys working with both and !

Solid foundation, living room furnished…rest of house forthcoming 😂

https://www.fabfile.org/changelog.html#3.1.0
https://www.paramiko.org/changelog.html#3.2.0

raptor, to random
leyrer, to random
@leyrer@chaos.social avatar
jmamblat, to infosec
michael, to infosec
@michael@thms.uk avatar

Hm. Bitbucket rotating their SSH host keys is interesting for all kinds of reasons, but maybe primarily because GitHub just rotated theirs a couple of months ago.

Strange coincidence!

https://bitbucket.org/blog/ssh-host-key-changes

strypey, to random
@strypey@mastodon.nzoss.nz avatar

"SSH key-based authentication is tried-and-true, but it lacks a true public key infrastructure for key certification, revocation, and expiration. is a framework that uses the OpenPGP web of trust for these PKI functions."

@riseup

https://riseuplabs.org/en/projects

Sounds like a cool project, is the monkey still alive? The homepage linked on that page is dead, and the only code I could find doesn't look like it's been touched in a while.

https://0xacab.org/monkeysphere

to3k, to linux Polish
@blog.tomaszdunia.pl avatar

🇵🇱 Nowy wpis na blogu! / 🇬🇧 New blog post!

YunoHost – backup [ENG 🇬🇧]

Autor: @to3k

https://blog.tomaszdunia.pl/yunohost-backup-eng/

5am, to linux
@5am@fosstodon.org avatar

Before executing important commands and scripts over , use in case of disconnect. If your connection drops or you close the terminal, you can SSH back in and enter screen -r to recover from where you left off. Being reunited with that hanging command prompt will be a relief!

jtk, to random

Something you rarely see are brute password attempts when the listener is on a port other than 22. 143.198.3.2 () did just that today.

It may be targeted, but I'd be curious if anyone has seen this source.

I saw it on one DNS server at an .edu. I've not seen the source poking any other hosts or any other port including 22. Shodan doesn't know about this SSH odd port listener.

feoh, to random

So, I am totally in love with the terminal. My only issue is that I have to do the infocmp | pbcopy -> ssh -> tic - Cmd-v dance for EVERY SINGLE NEW MACHINE I connect to, and as a Devops guy that's multiple times per day.

Anyone know of a way around that? Do you just set your TERM to be xterm rather than xterm-kitty and lose all the groovy special Kitty features?

feoh,

sigh this bright boy should go read the fine manual :)

Kitty is pretty amazing, and as it turns out it will inject the appropriate terminal magic into any machine you ssh to so it to can be kitty enhanced :)

https://sw.kovidgoyal.net/kitty/faq/#i-get-errors-about-the-terminal-being-unknown-or-opening-the-terminal-failing-or-functional-keys-like-arrow-keys-don-t-work

jpmens, to random
@jpmens@mastodon.social avatar

deleted_by_author

  • Loading...
  • sneufeind,
    @sneufeind@chaos.social avatar

    @jpmens I didn't know about for . That's a great feature and a big step for security.

  • All
  • Subscribed
  • Moderated
  • Favorites
  • JUstTest
  • GTA5RPClips
  • DreamBathrooms
  • InstantRegret
  • magazineikmin
  • everett
  • Youngstown
  • mdbf
  • Durango
  • slotface
  • rosin
  • thenastyranch
  • kavyap
  • modclub
  • anitta
  • cubers
  • tester
  • osvaldo12
  • tacticalgear
  • ethstaker
  • ngwrru68w68
  • khanakhh
  • Leos
  • normalnudes
  • cisconetworking
  • provamag3
  • megavids
  • lostlight
  • All magazines