How To Set Up 2FA With TOTP For OpenSSH Servers

Implementing robust authentication mechanisms is crucial to safeguard sensitive information. One such method gaining popularity for its effectiveness is Time-based One-Time Passwords (TOTP). In this article, we set up TOTP with OpenSSH, a widely used and versatile protocol for secure remote access. By integrating TOTP into your OpenSSH configuration, you enhance the security of your system by adding an additional layer of authentication, strengthening defenses against unauthorized access and potential cyber threats. Follow along as we guide you through the steps to fortify your OpenSSH environment with TOTP, ensuring a resilient defense against security breaches.

Continue reading “How To Set Up 2FA With TOTP For OpenSSH Servers”

Securing Ansible Automation with Single Entry Points: SSH Jump Hosts

Using SSH jump hosts (also known as bastion hosts or SSH gateways) with Ansible allows you to securely access and manage servers in a remote network or behind a firewall. Jump hosts act as intermediaries, forwarding your SSH connection to the target hosts. You can configure Ansible to use jump hosts for managing remote servers. Here’s how to set it up:

Continue reading “Securing Ansible Automation with Single Entry Points: SSH Jump Hosts”

SSH Tunneling, Jump Hosts and Security In Real Practice

SSH tunneling is a method for securely transmitting network traffic between two devices, typically a local machine (client) and a remote server, using the Secure Shell (SSH) protocol. It creates an encrypted communication channel over an untrusted network, such as the internet, to protect the data being transmitted. SSH tunneling can be used for various purposes, including forwarding ports, accessing remote resources, and enhancing security.

Continue reading “SSH Tunneling, Jump Hosts and Security In Real Practice”

A Comprehensive Guide to Configure SSH Connections in Ansible

Ansible, a powerful open-source automation tool, simplifies the management of infrastructure, applications, and data across your IT environment. At the heart of Ansible’s magic lies SSH (Secure Shell) – the trusted protocol for secure remote access. Configuring SSH connections in Ansible is a fundamental step in reaching its capabilities for server provisioning, configuration management, and application deployment. In this guide, we will walk you through the process of setting up SSH connections in Ansible to help you automate your infrastructure efficiently and securely.

Continue reading “A Comprehensive Guide to Configure SSH Connections in Ansible”

How to brute force and crack SSH passwords with Hydra? Ethical Hacking in real practice!

In this presentation we will crack the password of a general Linux user via SSH in our personal lab. The machine from which we start the attack is a Kali Linux box, and the attacked machine is an ordinary Debian Linux on which a user set a weak password. Unfortunately the security settings are weak on the target host, so we have a great chance for success. We already know the name of the user.

Important note: cracking passwords in the wild is illegal! Do NOT do it out of the lab, unless you are a penetration tester with a signed contract!

Continue reading “How to brute force and crack SSH passwords with Hydra? Ethical Hacking in real practice!”