Skip to content

Commit 13948cd

Browse files
committed
Docs: Expand SSH Credentials Collector explanation
1 parent 87aeeb1 commit 13948cd

File tree

1 file changed

+25
-7
lines changed
  • docs/content/features/credentials_collectors

1 file changed

+25
-7
lines changed

docs/content/features/credentials_collectors/ssh.md

+25-7
Original file line numberDiff line numberDiff line change
@@ -8,11 +8,29 @@ pre: "<i class='fa fa-terminal'></i> "
88

99
## Description
1010

11-
SSH keys are crucial for secure access to remote servers and systems. Attackers
12-
may attempt to steal them for gaining access to sensitive systems, data theft,
13-
lateral movement, privilege escalation, and persistence.
11+
SSH public/private key pairs are credentials that allow users to remotely
12+
access systems using the [Secure Shell Protocol
13+
(SSH)](https://en.wikipedia.org/wiki/Secure_Shell). Stealing them could enable
14+
an attacker to:
1415

15-
The SSH Credentials Collector steals SSH keys from Linux users. For all users
16-
on the system, it locates the `/home/<user>/.ssh` directory and steals keypairs
17-
from it. The supported private key encryption formats are RSA, DSA, EC, and
18-
ECDSA.
16+
- Gain access to sensitive systems
17+
- Steal data
18+
- Move laterally through the network
19+
- Escalate their privileges
20+
- Establish a persistent presence
21+
22+
While SSH key pairs can be encrypted to mitigate this risk, many users skip this
23+
step and trade security for convenience. This leaves the SSH keys vulnerable to
24+
theft. Infection Monkey's SSH Credentials Collector seeks out and steals
25+
unprotected SSH key pairs. After compromising a Linux host, the SSH Credentials
26+
Collector will locate the `$HOME/.ssh` directory for each user and attempt to
27+
steal unencrypted SSH key pairs from it.
28+
29+
The SSH Credentials Collector will attempt to steal any key pair matching all
30+
of the following criteria:
31+
32+
- The key pair is stored in `$HOME/.ssh` for any user on the system.
33+
- The key pair is readable by the user running the Infection Monkey Agent.
34+
- The key pair is not encrypted.
35+
- The key pair is stored in one of the supported formats (RSA, DSA, EC, or
36+
ECDSA).

0 commit comments

Comments
 (0)