Did you know that you can run @ratatui_rs inside @ratatui_rs inside @kittyterminal inside @kittyterminal over #SSH?
Now you know.
Explanation in the alttext.
#ratatui #terminal #tui #kitty #kittyterminal
Alerta CISA: Ransomware Akira expande ataques para máquinas virtuais Nutanix AHV
🔗 https://tugatech.com.pt/t74323-alerta-cisa-ransomware-akira-expande-ataques-para-maquinas-virtuais-nutanix-ahv
#ataque #backup #cve #edr #linux #mfa #ransomware #segurança #sem #servidores #ssh #velocidade #vpn #vulnerabilidade #vulnerabilidades
Tự host web trên OCI E1 Instance với Cloudflare Tunnel, Caddy/Traefik, SSH bằng key và Fail2Ban. Liệu có vấn đề nào nổi bật không? #SelfHosted #OCI #Webserver #TựHost #BảoMật #Cloudflare #Caddy #Traefik #SSH #Fail2Ban #WebSecurity #BảoMậtWeb
https://www.reddit.com/r/selfhosted/comments/1owr8u4/oci_webserver/
🌘 解決通道 0 子系統請求失敗問題
➤ SCP 檔案傳輸失敗?一鍵切換回舊式協議輕鬆解決
✤ https://blog.x-way.org/Linux/2025/11/06/How-to-fix-subsystem-request-failed-on-channel-0.html
當使用 SCP 傳輸檔案時,您可能會遇到「通道 0 子系統請求失敗」的錯誤。此問題源於 OpenSSH 9.0 版本後預設使用 SFTP 協議進行檔案傳輸,而某些舊式伺服器僅支援 SCP 協議。為瞭解決此問題,只需在 SCP 命令中加入 `-O` 參數,即可強制使用原始 SCP 協議,順利完成檔案傳輸。
+ 太好了!一直被這個問題困擾,沒想到只是個簡單的參數。感謝分享!
+ 這個解釋很清晰,對於不熟悉 SSH 版本差異的用戶非常有幫助。測試後確實有效。
#SSH #SCP #SFTP #網絡傳輸
Varios me han pedido roadmaps, y considerando que ya tenemos cursos de:
🔹 Redes #TCPIP
🔹 Análisis de tráfico con #Wireshark
🔹 Firewalls ( #iptables & #nftables)
🔹 #GNU #Linux
🔹 #SSH
Y que me apasiona el #hacking / #infosec, voy a armar un roadmap completo de #Ciberseguridad 🙂
Voy sumando:
🔸 🔐 Criptografía aplicada - Enfoque práctico con OpenSSL y GPG (+ post-quantum crypto)
🔸 🌐 VPN (IPsec, OpenVPN, WireGuard,)
¿Les interesa? ¿Qué agregarían? 👇
🔗 #Cursos actuales:
ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIHiwjttrKpxU7aQY3H/CnZG8vFxI7pRPzvXI3348XGI3 ari@ari.lt #ssh #sshkey #addmysshkey #pubnix #nix #giveroot #root #ineedroot #rootssh #rootkit #sshroot #giveroot #unix #linux
Unleashing the Kraken ransomware group
The Kraken ransomware group, emerging from the remnants of the HelloKitty cartel, has been observed conducting big-game hunting and double extortion attacks. Utilizing SMB vulnerabilities for initial access, they employ tools like Cloudflared for persistence and SSHFS for data exfiltration. Kraken's cross-platform ransomware targets Windows, Linux, and VMware ESXi environments, featuring a unique benchmarking capability. The group operates a data leak site and has announced a new underground forum called 'The Last Haven Board'. Kraken's sophisticated ransomware includes extensive command-line options, encryption performance testing, and anti-analysis techniques. It targets various file types, including SQL databases and network shares, while employing multi-threaded encryption and self-deletion processes to evade detection.
Pulse ID: 69161dab29c1fb1dc04a0b05
Pulse Link: https://otx.alienvault.com/pulse/69161dab29c1fb1dc04a0b05
Pulse Author: AlienVault
Created: 2025-11-13 18:04:27
Be advised, this data is unverified and should be considered preliminary. Always do further verification.
#Cloud #CyberSecurity #ELF #Encryption #Extortion #InfoSec #Linux #OTX #OpenThreatExchange #RAT #RansomWare #SMB #SQL #SSH #VMware #Windows #bot #AlienVault
Petit tuto d'un 'ssh secret' :
vous avez une machine distante dont la négociation ssh est lente
et c'est chiant pour passer une commande directe qui doit être rapide ?
> C'est mon cas avec une #caméra #PTZ
Mais j'ai trouvé en farfouillant (c'est pas dans la doc !)
qu'on pouvait lui passer des commandes DBus en shell SSH
qui font la même chose que les requêtes HTTPS/CGI, mais en beaucoup plus rapide,
genre tu veux changer de preset de postition, ça prend 3 plombes,
en DBus, c'est direct ! ⤵️
Sicherheitslücken melden: Mein Umgang mit einem Vulnerability Report
Ein Vulnerability Report kam rein: angeblich Terrapin (CVE-2023-48795) auf meinem SSH-Server. Stellte sich raus: fremder Server per CNAME aliased, JavaScript-Typ im Template vergessen. Trotzdem ein guter Anlass zu security.txt und Umgang mit solchen Hinweisen.
FreeBSD SSH-Server absichern: MFA mit Google Authenticator einrichten
Zwei-Faktor-Authentifizierung auf FreeBSD SSH: Google Authenticator PAM-Modul, Challenge-Response in sshd_config, Benutzer-Setup mit QR-Code und Backup-Codes. Erhöht die Sicherheit merklich, unkompliziert einzurichten.https://www.kernel-error.de/2024/03/29/freebsd-ssh-server-mit-mfa-2fa/

DNSSEC und SSHFP unter Linux Mint und Ubuntu zum Laufen bringen
SSH sollte Hostkeys via DNSSEC-gesicherten SSHFP-Records verifizieren. Fehler: systemd-resolved filterte das AD-Flag raus. Loesung: systemd-resolved weg, NetworkManager mit trust-ad Option. Jetzt funktioniert DNSSEC korrekt.https://www.kernel-error.de/2024/03/29/linux-mint-ubuntu-und-dnssec/
