You are not logged in.

#1 2010-08-11 19:51:10

poopship21
Member
Registered: 2009-05-13
Posts: 177

SSH Surveillance

what are the loopholes that root can exploit to monitor ssh connections?  i ask because i am forced to use certain procedures from time to time (reverse tunneling, etc) which may be frowned upon but are necessary for the productivity of my team and the office IT department are often unhappy to find people using port 22 for anything other than nothing.  TIA

Offline

#2 2010-08-11 20:16:47

Stebalien
Member
Registered: 2010-04-27
Posts: 1,237
Website

Re: SSH Surveillance

You could try sshow and sshmitm from dsniff.


Steven [ web : git ]
GPG:  327B 20CE 21EA 68CF A7748675 7C92 3221 5899 410C
Do not email: honeypot@stebalien.com

Offline

#3 2010-08-11 20:20:18

ewaller
Administrator
From: Pasadena, CA
Registered: 2009-07-13
Posts: 19,789

Re: SSH Surveillance

For hotels, Wi-Fi cafes, and oppressive ISPs -- Okay., maybe.

For your workplace -- Are you kidding?


Nothing is too wonderful to be true, if it be consistent with the laws of nature -- Michael Faraday
Sometimes it is the people no one can imagine anything of who do the things no one can imagine. -- Alan Turing
---
How to Ask Questions the Smart Way

Offline

Board footer

Powered by FluxBB