Decrypting live SSH traffic in virtual environments

07/25/2019
by   Peter McLaren, et al.
0

Decrypting and inspecting encrypted malicious communications may assist crime detection and prevention. Access to client or server memory enables the discovery of artefacts required for decrypting secure communications. This paper develops the MemDecrypt framework to investigate the discovery of encrypted artefacts in memory and applies the methodology to decrypting the secure communications of virtual machines. For Secure Shell, used for secure remote server management, file transfer, and tunnelling inter alia, MemDecrypt experiments rapidly yield AES-encrypted details for a live secure file transfer including remote user credentials, transmitted file name and file contents. Thus, MemDecrypt discovers cryptographic artefacts and quickly decrypts live SSH malicious communications including the detection and interception of data exfiltration of confidential data.

READ FULL TEXT

page 4

page 6

research
05/24/2018

SEVered: Subverting AMD's Virtual Machine Encryption

AMD SEV is a hardware feature designed for the secure encryption of virt...
research
07/24/2019

A Forensic Audit of the Tor Browser Bundle

The increasing use of encrypted data within file storage and in network ...
research
06/07/2018

Secure Multilayer Perceptron Based On Homomorphic Encryption

In this work, we propose an outsourced Secure Multilayer Perceptron (SML...
research
04/16/2019

Decrypting SSL/TLS traffic for hidden threats detection

The paper presents an analysis of the main mechanisms of decryption of S...
research
02/15/2022

Crypto-ransomware detection using machine learning models in file-sharing network scenario with encrypted traffic

Ransomware is considered as a significant threat for most enterprises si...
research
12/21/2022

CyberEye: Obtaining Data from Virtual Desktop by Video

VDI is no longer safe and reliable anymore. VDI(Virtual Desktop Infrastr...
research
12/07/2017

Enabling the Remote Acquisition of Digital Forensic Evidence through Secure Data Transmission and Verification

Providing the ability to any law enforcement officer to remotely transfe...

Please sign up or login with your details

Forgot password? Click here to reset