hachyderm.io is one of the many independent Mastodon servers you can use to participate in the fediverse.
Hachyderm is a safe space, LGBTQIA+ and BLM, primarily comprised of tech industry professionals world wide. Note that many non-user account types have restrictions - please see our About page.

Administered by:

Server stats:

9.4K
active users

#ssh

31 posts31 participants5 posts today
Daniel Wayne Armstrong<p>Disable password logins on the SERVER in favour of using SSH keys for authentication. Create the necessary SSH keys on a Linux CLIENT that will be used to secure access to remote devices:</p><p><a href="https://www.dwarmstrong.org/ssh-keys/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">dwarmstrong.org/ssh-keys/</span><span class="invisible"></span></a></p><p><a href="https://fosstodon.org/tags/SSH" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SSH</span></a> <a href="https://fosstodon.org/tags/Linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Linux</span></a></p>
sudonem<p>I think that the <span class="h-card" translate="no"><a href="https://1password.social/@1password" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>1password</span></a></span> team is really on to something with their ssh-agent tools lately.</p><p>The SSH bookmark function has a lot of potential even though it's pretty rough right now. (The linux build in particular).</p><p>I'd really like to see the following implemented: </p><ul><li>Edit created bookmarks (obviously) </li><li>Bookmark names/titles</li><li>Custom ports per bookmark</li><li>Specify launch app per bookmark</li><li>A dedicated keyboard shortcut to display the ssh bookmarks (so I don't have to dig)</li><li>Access to the bookmarks via op/cli</li></ul><p><a href="https://infosec.exchange/tags/1Password" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>1Password</span></a> <a href="https://infosec.exchange/tags/ssh" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ssh</span></a> <a href="https://infosec.exchange/tags/sshagent" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>sshagent</span></a> <a href="https://infosec.exchange/tags/RemoteAccess" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RemoteAccess</span></a> <a href="https://infosec.exchange/tags/RemoteAdministration" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RemoteAdministration</span></a> <a href="https://infosec.exchange/tags/SysAdmin" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SysAdmin</span></a></p>
Atanas Laskov 🏳️‍🌈<p>Trying to test something that was implemented with Ssh.Net library. API of the library is derived from IBaseClient which is cool, and I can mock it. But the RunCommand("cmd") method returns "SshCommand" object, which does not implement any interface and only has internal constructor. </p><p>By some miracle of introspection I created SshCommand in my test mocks. But it has complex async logic inside it. Can't they just return an interface? :sadness: </p><p><a href="https://mastodon.social/tags/ssh" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ssh</span></a> <a href="https://mastodon.social/tags/dotnet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dotnet</span></a> <a href="https://mastodon.social/tags/testing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>testing</span></a> <a href="https://mastodon.social/tags/webdev" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>webdev</span></a></p>
Tomáš<p><a href="https://merveilles.town/tags/unix_surrealism" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>unix_surrealism</span></a> <a href="https://merveilles.town/tags/openbsd" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>openbsd</span></a> <a href="https://merveilles.town/tags/openssh" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>openssh</span></a> <a href="https://merveilles.town/tags/ssh" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ssh</span></a> <a href="https://merveilles.town/tags/comic" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>comic</span></a> <a href="https://merveilles.town/tags/runbsd" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>runbsd</span></a> <a href="https://merveilles.town/tags/fish" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>fish</span></a> <a href="https://merveilles.town/tags/puffy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>puffy</span></a></p>
Jonathan Harker<p>Wow, check your sshd configs folks, this one's nasty. Have some sneakily enabled PasswordAuthentication!<br><a href="https://bugs.launchpad.net/ubuntu/+source/cloud-init/+bug/2088207" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">bugs.launchpad.net/ubuntu/+sou</span><span class="invisible">rce/cloud-init/+bug/2088207</span></a><br><a href="https://cloudisland.nz/tags/ssh" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ssh</span></a> <a href="https://cloudisland.nz/tags/principleofleastsurprise" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>principleofleastsurprise</span></a></p>
Felix Schepmann<p><span class="h-card" translate="no"><a href="https://ms.vg/@m" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>m</span></a></span> <a href="https://mastodon.online/tags/ssh" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ssh</span></a> Wird auch schon sportlich... tail /var/log/syslog -f wird wohl nicht gehen....</p>
Matthias Schmidt - Opa Gollum<p>Über <a href="https://ms.vg/tags/Meshtastic" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Meshtastic</span></a> 868 MHz 0.5 Watt sind andere Nodes zu sehen. Und zwischen Wohnung und Terrasse der Stammkneipe (840 Meter Luftlinie) konnten Nachrichten übermittelt werden.</p><p>Und Zack denke ich an <a href="https://ms.vg/tags/SSH" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SSH</span></a> über Meshtastic, Home Office ohne Internet.</p>
Hacker News<p>The order of files in /etc./SSH/sshd_config.d/ matters (and may surprise you)</p><p><a href="https://utcc.utoronto.ca/~cks/space/blog/sysadmin/OpenSSHConfigOrderMatters" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">utcc.utoronto.ca/~cks/space/bl</span><span class="invisible">og/sysadmin/OpenSSHConfigOrderMatters</span></a></p><p><a href="https://mastodon.social/tags/HackerNews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>HackerNews</span></a> <a href="https://mastodon.social/tags/OpenSSH" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenSSH</span></a> <a href="https://mastodon.social/tags/Config" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Config</span></a> <a href="https://mastodon.social/tags/Order" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Order</span></a> <a href="https://mastodon.social/tags/Matters" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Matters</span></a> <a href="https://mastodon.social/tags/SSH" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SSH</span></a> <a href="https://mastodon.social/tags/Configurations" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Configurations</span></a> <a href="https://mastodon.social/tags/System" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>System</span></a> <a href="https://mastodon.social/tags/Administration" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Administration</span></a> <a href="https://mastodon.social/tags/Linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Linux</span></a> <a href="https://mastodon.social/tags/Tips" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Tips</span></a></p>
N-gated Hacker News<p>🤖 <a href="https://mastodon.social/tags/QEMU" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>QEMU</span></a> output on serial console with shell scripts in 2019? Groundbreaking! 🎉 Who knew stringing together <a href="https://mastodon.social/tags/SSH" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SSH</span></a>, Expect, and named pipes could be so... riveting? 🚀 Meanwhile, Timothy's saving the world, one fundraiser at a time. 🌍<br><a href="https://fadeevab.com/how-to-setup-qemu-output-to-console-and-automate-using-shell-script/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">fadeevab.com/how-to-setup-qemu</span><span class="invisible">-output-to-console-and-automate-using-shell-script/</span></a> <a href="https://mastodon.social/tags/ShellScripts" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ShellScripts</span></a> <a href="https://mastodon.social/tags/Fundraising" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Fundraising</span></a> <a href="https://mastodon.social/tags/Innovation" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Innovation</span></a> <a href="https://mastodon.social/tags/HackerNews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>HackerNews</span></a> <a href="https://mastodon.social/tags/ngated" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ngated</span></a></p>
HoldMyType<p><a href="https://mathstodon.xyz/tags/ssh" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ssh</span></a> session hijack<br>cool post<br>&gt; To hijack newly created SSH sessions we can leverage a feature known as SSH multiplexing. This feature allows for the creation of control sockets that enable an attacker to create their own sessions inside the original user' socket, without re-authentication. The ControlMaster feature was introduced in OpenSSH 4, <br><a href="https://medium.com/@hx015/ssh-session-hijack-analytic-a2c684ba410f" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">medium.com/@hx015/ssh-session-</span><span class="invisible">hijack-analytic-a2c684ba410f</span></a></p>
Cambionn<p>Quick reminder that your <a href="https://mastodon.nl/tags/smartwatch" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>smartwatch</span></a> will never be as cool as mine if it doesn't run <a href="https://mastodon.nl/tags/Linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Linux</span></a>. And that you should check out <span class="h-card" translate="no"><a href="https://fosstodon.org/@AsteroidOS" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>AsteroidOS</span></a></span> so you too can <a href="https://mastodon.nl/tags/SSH" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SSH</span></a> into your <a href="https://mastodon.nl/tags/watch" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>watch</span></a>!</p><p>I promise the screen isn't blurry, but that I just suck at taking pictures of screens 😉.</p>
OSTechNix<p>Pico.sh: The SSH-Powered Services Every Developer Should Try <a href="https://floss.social/tags/Pico" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Pico</span></a> <a href="https://floss.social/tags/SSH" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SSH</span></a> <a href="https://floss.social/tags/Developer" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Developer</span></a> <a href="https://floss.social/tags/Webservice" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Webservice</span></a> <a href="https://floss.social/tags/Linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Linux</span></a> <a href="https://floss.social/tags/SecureShell" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SecureShell</span></a> <br><a href="https://ostechnix.com/pico-sh-ssh-powered-developer-services/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">ostechnix.com/pico-sh-ssh-powe</span><span class="invisible">red-developer-services/</span></a></p>
Sascha Stumpler<p>Gerando chaves SSH apenas com o Powershell <a href="http://dlvr.it/TJxphF" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">http://</span><span class="">dlvr.it/TJxphF</span><span class="invisible"></span></a> via PlanetPowerShell <a href="https://hessen.social/tags/Powershell" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Powershell</span></a> <a href="https://hessen.social/tags/SSH" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SSH</span></a> <a href="https://hessen.social/tags/CSharp" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CSharp</span></a> <a href="https://hessen.social/tags/DotNet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DotNet</span></a></p>
OTX Bot<p>Outlaw Linux Malware: Persistent, Unsophisticated, and Surprisingly Effective</p><p>OUTLAW is a persistent Linux malware that uses basic techniques like SSH brute-forcing, SSH key manipulation, and cron-based persistence to maintain a long-lasting botnet. Despite its lack of sophistication, it remains active by leveraging simple but impactful tactics. The malware deploys modified XMRig miners, uses IRC for command and control, and includes publicly available scripts for persistence and defense evasion. OUTLAW's infection chain spans nearly the entire MITRE ATT&amp;CK framework, offering many detection opportunities. It propagates in a worm-like manner, using compromised hosts to launch further SSH brute-force attacks on local subnets, rapidly expanding the botnet.</p><p>Pulse ID: 67ef069f9224aa64d79e6a8e<br>Pulse Link: <a href="https://otx.alienvault.com/pulse/67ef069f9224aa64d79e6a8e" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">otx.alienvault.com/pulse/67ef0</span><span class="invisible">69f9224aa64d79e6a8e</span></a> <br>Pulse Author: AlienVault<br>Created: 2025-04-03 22:07:27</p><p>Be advised, this data is unverified and should be considered preliminary. Always do further verification.</p><p><a href="https://social.raytec.co/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://social.raytec.co/tags/ICS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ICS</span></a> <a href="https://social.raytec.co/tags/InfoSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InfoSec</span></a> <a href="https://social.raytec.co/tags/Linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Linux</span></a> <a href="https://social.raytec.co/tags/Malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Malware</span></a> <a href="https://social.raytec.co/tags/OTX" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OTX</span></a> <a href="https://social.raytec.co/tags/OpenThreatExchange" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenThreatExchange</span></a> <a href="https://social.raytec.co/tags/RCE" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RCE</span></a> <a href="https://social.raytec.co/tags/SSH" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SSH</span></a> <a href="https://social.raytec.co/tags/Worm" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Worm</span></a> <a href="https://social.raytec.co/tags/XMRigMiner" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>XMRigMiner</span></a> <a href="https://social.raytec.co/tags/bot" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bot</span></a> <a href="https://social.raytec.co/tags/botnet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>botnet</span></a> <a href="https://social.raytec.co/tags/AlienVault" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AlienVault</span></a></p>
Iroiro<p>Stable version of SSH Key Wallet has been delivered.<br>The display was buggy because I forgot <span class="h-card" translate="no"><a href="https://mastodon.social/@MainActor" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>MainActor</span></a></span>. Took me a long time to figure out the cause.</p><p><a href="https://mastodon.social/tags/SwiftUI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SwiftUI</span></a> <a href="https://mastodon.social/tags/macOS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>macOS</span></a> <a href="https://mastodon.social/tags/App" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>App</span></a> <a href="https://mastodon.social/tags/SSH" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SSH</span></a> <a href="https://mastodon.social/tags/OpenSSH" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenSSH</span></a></p><p><a href="https://apps.apple.com/app/id6743005902" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">apps.apple.com/app/id6743005902</span><span class="invisible"></span></a></p>
Iroiro<p>SSH Key Walletの安定版を配信しました。<br><span class="h-card" translate="no"><a href="https://mastodon.social/@MainActor" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>MainActor</span></a></span>を忘れたため、表示がバグっていました。原因を特定するのに随分かかった。</p><p><a href="https://mastodon.social/tags/SwiftUI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SwiftUI</span></a> <a href="https://mastodon.social/tags/macOS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>macOS</span></a> <a href="https://mastodon.social/tags/App" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>App</span></a> <a href="https://mastodon.social/tags/SSH" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SSH</span></a> <a href="https://mastodon.social/tags/OpenSSH" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenSSH</span></a></p><p><a href="https://apps.apple.com/app/id6743005902" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">apps.apple.com/app/id6743005902</span><span class="invisible"></span></a></p>
OTX Bot<p>TookPS distributed under the guise of UltraViewer, AutoCAD, and Ableton</p><p>A malware campaign is distributing the TookPS downloader by impersonating popular software like UltraViewer, AutoCAD, SketchUp, Ableton, and Quicken. The malware establishes an SSH tunnel for remote access and deploys additional payloads like TeviRat and Lapmon backdoors. The attackers gain full system control through various methods. The campaign targets both individuals and organizations, using domains registered in early 2024. Users are advised to avoid downloading pirated software, while organizations should implement strict security policies and conduct regular awareness training.</p><p>Pulse ID: 67eea35a7cea57b67d9c3172<br>Pulse Link: <a href="https://otx.alienvault.com/pulse/67eea35a7cea57b67d9c3172" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">otx.alienvault.com/pulse/67eea</span><span class="invisible">35a7cea57b67d9c3172</span></a> <br>Pulse Author: AlienVault<br>Created: 2025-04-03 15:03:54</p><p>Be advised, this data is unverified and should be considered preliminary. Always do further verification.</p><p><a href="https://social.raytec.co/tags/BackDoor" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BackDoor</span></a> <a href="https://social.raytec.co/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://social.raytec.co/tags/InfoSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InfoSec</span></a> <a href="https://social.raytec.co/tags/Malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Malware</span></a> <a href="https://social.raytec.co/tags/OTX" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OTX</span></a> <a href="https://social.raytec.co/tags/OpenThreatExchange" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenThreatExchange</span></a> <a href="https://social.raytec.co/tags/RAT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RAT</span></a> <a href="https://social.raytec.co/tags/SSH" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SSH</span></a> <a href="https://social.raytec.co/tags/bot" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bot</span></a> <a href="https://social.raytec.co/tags/AlienVault" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AlienVault</span></a></p>
particleflux<p>Aaah yes 🤡 </p><p>```<br># Disable tunneling<br>PermitTunnel yes<br>```</p><p>Outdated comments are always lovely.<br>(tho in this case not _strictly_ outdated, rather not updated correctly by ansible role)</p><p><a href="https://mastodon.social/tags/ssh" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ssh</span></a> <a href="https://mastodon.social/tags/ansible" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ansible</span></a></p>
HoldMyType<p>1. S/MIME - centralized trust model with certificates<br>2. PGP/MIME- decentralized "web of trust"<br>3 <a href="https://mathstodon.xyz/tags/tailscale" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>tailscale</span></a> - 0 trust model <br>Is there something like best choice in these?<br><a href="https://mathstodon.xyz/tags/gpg" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>gpg</span></a> <a href="https://mathstodon.xyz/tags/ssh" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ssh</span></a></p>
0x40k<p>Seriously, the Outlaw botnet? Still pulling off SSH brute-force attacks in 2024?! Wild how that's *still* getting results. It really just hammers home the point: the fundamentals are absolutely crucial!</p><p>You've gotta have solid password habits locked down. Things like key authentication, maybe changing the default SSH port, setting up Fail2ban... c'mon, it isn't exactly brain surgery, right?</p><p>But yeah, setting it up takes a bit of effort, doesn't it? And we all know time equals money...</p><p>Working as a pentester, I see it way too often – companies cutting corners precisely on these foundational steps. They'd rather splash out on flashy AI security tools, yet leave the digital front door practically wide open. Then, inevitably, everyone acts shocked when things go sideways.</p><p>So, I gotta ask: What "basic" security measures do you see getting consistently overlooked where you work? 🤔</p><p><a href="https://infosec.exchange/tags/pentest" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pentest</span></a> <a href="https://infosec.exchange/tags/ssh" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ssh</span></a> <a href="https://infosec.exchange/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/basics" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>basics</span></a></p>