Sebastian Krahmer (Germany)
SuSE Security team, Germany

Organisatorof the festival is
Multimedijski center Kibla, Maribor

 



Autobiography

Sebastian Krahmer studied Computer Science at the University of Potsdam, Germany. In particular his interest within the computer science field focuses on networking, cryptography and operating systems. He has written various software ranging from IPv4/IPv6 load balancers, SSL and SSH Man in the Middle implementations to rootkits.
He also actively reviews code for security vulnerabilities and develops proof of concept exploits for security relevant bugs. Sebastian contributed code to some open source projects such as libpcap and snort, to name some popular ones. He is working for the SuSE Security team since the year 2000 and lives in Potsdam, Germany.

Subject

SSH features

- Attacker usually breaks in via remote exploits (overflows etc)

- With SSH you can do many things, such as:

- steal authentication credentials

- bruteforce passwords

- Perform MiM attack (focus of the lecture)

- Man in Middle:

- A common attack on asymetric crypto

- With the use of SSH this means to be introduced as another server and send a spoofed hostkey

- SSH client records hostkeys, so it can detect attacks such as MiM

- Most of the MiM programs are able to perform this key-fake -> SSH this way detects an attack by comparing keys and exit

- Expressed more clearly: acquired key is lost via playing with the key-type or protocol version (see also http://stealth.7350.org/SSH/ssharp.pdf)

-> result: ssh client no longer exits since it doesn't find the key to compare with

- If everything is properly installed, a Demo shows how the xterm pops up upon client connection. The attacker takes over the SSH session and the password is logged

- This also shows that single time passwords are not secure

 

  Design : ZRCALO d.o.o.      Copyright KIBLIX 2003