ssh

Back Open Paginator
15.11.2025 12:56
j_g00da (@j_g00da@fosstodon.org)

Did you know that you can run @ratatui_rs inside @ratatui_rs inside @kittyterminal inside @kittyterminal over #SSH?

Now you know.

Explanation in the alttext.

#ratatui #terminal #tui #kitty #kittyterminal





Show Original Post


14.11.2025 22:23
objects (@objects@social.retroedge.tech)
Has anyone used this?

OTP (one time passwords) for SSH access.

Sounds like an extra headache. I am working with a company that has to jump through some "security hoops" and adding MFA to admin accounts is one of the boxes to check.

This may be one way to do that.

https://github.com/ziyan/ssh-otp

#ssh #otp #security


Show Original Post


14.11.2025 14:02
tugatech (@tugatech@masto.pt)

Alerta CISA: Ransomware Akira expande ataques para máquinas virtuais Nutanix AHV
🔗 tugatech.com.pt/t74323-alerta-

#ataque #backup #cve #edr #linux #mfa #ransomware #segurança #sem #servidores #ssh #velocidade #vpn #vulnerabilidade #vulnerabilidades 




Show Original Post


14.11.2025 10:17
reddit_tech_vn_bot (@reddit_tech_vn_bot@mastodon.maobui.com)

Tự host web trên OCI E1 Instance với Cloudflare Tunnel, Caddy/Traefik, SSH bằng key và Fail2Ban. Liệu có vấn đề nào nổi bật không? #SelfHosted #OCI #Webserver #TựHost #BảoMật #Cloudflare #Caddy #Traefik #SSH #Fail2Ban #WebSecurity #BảoMậtWeb

reddit.com/r/selfhosted/commen




Show Original Post


14.11.2025 02:18
GripNews (@GripNews@mastodon.social)

🌘 解決通道 0 子系統請求失敗問題
➤ SCP 檔案傳輸失敗?一鍵切換回舊式協議輕鬆解決
blog.x-way.org/Linux/2025/11/0
當使用 SCP 傳輸檔案時,您可能會遇到「通道 0 子系統請求失敗」的錯誤。此問題源於 OpenSSH 9.0 版本後預設使用 SFTP 協議進行檔案傳輸,而某些舊式伺服器僅支援 SCP 協議。為瞭解決此問題,只需在 SCP 命令中加入 `-O` 參數,即可強制使用原始 SCP 協議,順利完成檔案傳輸。
+ 太好了!一直被這個問題困擾,沒想到只是個簡單的參數。感謝分享!
+ 這個解釋很清晰,對於不熟悉 SSH 版本差異的用戶非常有幫助。測試後確實有效。




Show Original Post


13.11.2025 22:27
d1cor (@d1cor@mstdn.io)

Varios me han pedido roadmaps, y considerando que ya tenemos cursos de:

🔹 Redes #TCPIP
🔹 Análisis de tráfico con #Wireshark
🔹 Firewalls ( #iptables & #nftables)
🔹 #GNU #Linux
🔹 #SSH

Y que me apasiona el #hacking / #infosec, voy a armar un roadmap completo de #Ciberseguridad 🙂

Voy sumando:

🔸 🔐 Criptografía aplicada - Enfoque práctico con OpenSSL y GPG (+ post-quantum crypto)

🔸 🌐 VPN (IPsec, OpenVPN, WireGuard,)

¿Les interesa? ¿Qué agregarían? 👇

🔗 #Cursos actuales:

juncotic.com/cursos




Show Original Post


13.11.2025 21:34
r (@r@fed.brid.gy)

ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIHiwjttrKpxU7aQY3H/CnZG8vFxI7pRPzvXI3348XGI3 ari@ari.lt #ssh #sshkey #addmysshkey #pubnix #nix #giveroot #root #ineedroot #rootssh #rootkit #sshroot #giveroot #unix #linux




Show Original Post


13.11.2025 21:31
techbot (@techbot@social.raytec.co)

Unleashing the Kraken ransomware group

The Kraken ransomware group, emerging from the remnants of the HelloKitty cartel, has been observed conducting big-game hunting and double extortion attacks. Utilizing SMB vulnerabilities for initial access, they employ tools like Cloudflared for persistence and SSHFS for data exfiltration. Kraken's cross-platform ransomware targets Windows, Linux, and VMware ESXi environments, featuring a unique benchmarking capability. The group operates a data leak site and has announced a new underground forum called 'The Last Haven Board'. Kraken's sophisticated ransomware includes extensive command-line options, encryption performance testing, and anti-analysis techniques. It targets various file types, including SQL databases and network shares, while employing multi-threaded encryption and self-deletion processes to evade detection.

Pulse ID: 69161dab29c1fb1dc04a0b05
Pulse Link: otx.alienvault.com/pulse/69161
Pulse Author: AlienVault
Created: 2025-11-13 18:04:27

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

#Cloud #CyberSecurity #ELF #Encryption #Extortion #InfoSec #Linux #OTX #OpenThreatExchange #RAT #RansomWare #SMB #SQL #SSH #VMware #Windows #bot #AlienVault




Show Original Post


13.11.2025 17:28
s4mdf0o1 (@s4mdf0o1@piaille.fr)

Petit tuto d'un 'ssh secret' :
vous avez une machine distante dont la négociation ssh est lente
et c'est chiant pour passer une commande directe qui doit être rapide ?
> C'est mon cas avec une #caméra #PTZ
Mais j'ai trouvé en farfouillant (c'est pas dans la doc !)
qu'on pouvait lui passer des commandes DBus en shell SSH
qui font la même chose que les requêtes HTTPS/CGI, mais en beaucoup plus rapide,
genre tu veux changer de preset de postition, ça prend 3 plombes,
en DBus, c'est direct ! ⤵️

#Geek #Bash #SSH




Show Original Post


17.02.2025 10:20
2025 (@2025@www.kernel-error.de)

Sicherheitslücken melden: Mein Umgang mit einem Vulnerability Report

Ein Vulnerability Report kam rein: angeblich Terrapin (CVE-2023-48795) auf meinem SSH-Server. Stellte sich raus: fremder Server per CNAME aliased, JavaScript-Typ im Template vergessen. Trotzdem ein guter Anlass zu security.txt und Umgang mit solchen Hinweisen.

kernel-error.de/2025/02/17/sic





Show Original Post


29.03.2024 15:35
2024 (@2024@www.kernel-error.de)

FreeBSD SSH-Server absichern: MFA mit Google Authenticator einrichten​

Zwei-Faktor-Authentifizierung auf FreeBSD SSH: Google Authenticator PAM-Modul, Challenge-Response in sshd_config, Benutzer-Setup mit QR-Code und Backup-Codes. Erhöht die Sicherheit merklich, unkompliziert einzurichten.

kernel-error.de/2024/03/29/fre





Show Original Post


29.03.2024 14:04
2024 (@2024@www.kernel-error.de)

DNSSEC und SSHFP unter Linux Mint und Ubuntu zum Laufen bringen

SSH sollte Hostkeys via DNSSEC-gesicherten SSHFP-Records verifizieren. Fehler: systemd-resolved filterte das AD-Flag raus. Loesung: systemd-resolved weg, NetworkManager mit trust-ad Option. Jetzt funktioniert DNSSEC korrekt.

kernel-error.de/2024/03/29/lin





Show Original Post


1 ...49 50 51 52 53 54 55
UP