SSH as the next back door. Are you giving hackers root access?

Presented at Black Hat USA 2011, Aug. 3, 2011, 2:25 p.m. (30 minutes).

SSH is a broadly leveraged to secure communication technology used for admin, root-level access into mission critical systems (firewalls, routers, switches, Unix, Linux, etc.) as well as for automated machine-to-machine operations in corporations and governments alike. Most organizations don't track or manage the SSH keys used to encrypt communications and authenticate syste and users, exposing them to vulnerabilities. Without concise information about the account and system access made possiblems by these keys, organizations are at risk of unauthorized access to sensitive data and systems. This session will address common and best practices for managing SSH encryption and authentication keys in enterprise environments.


Presenters:

Links:

Similar Presentations: