The Upgrading and Securing SSH Security module provides you with the instructions and devices to develop your hands-on skills in the following topics.
- Connecting to Kali
- Upgrading OpenSSH
- Adding Sudo User
- Regenerate SSH keys to avoid MITM attacks
- MOTD (Message of the Day)
- Change the SSH Port
Lab time: It will take approximately 1 hour to complete this lab
The following exam objectives are covered in this lab:
- CAS-002 1.1: Distinguish which cryptographic tools and techniques are appropriate for a given situation
- CAS-002 1.3: Given a scenario, analyze network and security components, concepts and architectures
- CAS-002 4.2: Given a scenario, select the appropriate control to secure communications and collaboration solutions
Exercise 1 - Connecting to Kali
We will first begin by connecting to PLABKALI01 which will permit the path to configuring SSH installation and configuration into the Linux system.
Exercise 2 - Upgrading OpenSSH
SSH like all protocols needs to be updated, as well as the services which manage those protocols. Moving to a more up-to-date version of the service helps to overcome vulnerabilities in older types and assists in making sure no data is being leaked out unnecessarily from the connection.
Exercise 3 - Adding Sudo User
Kali inherently has the main OS user as root which can be dangerous in the wrong hands. Adding a non-root user to Kali is simple and is essential to maintaining good security measures within a system.
Exercise 4 - Regenerate SSH Keys to Avoid MITM Attacks
Default SSH keys are vulnerable from the fact that they are possible to guess. Therefore, changing those keys is an immediate, secure enhancement to the connection.
Exercise 5 - MOTD (Message of the Day)
The MOTD is a legal requirement for all networks to present on a connection with the European Union and is good practice when considering computing ethics. The message should be clear and robust in its nature, avoiding confusion on terms and meanings as much as possible.
Exercise 6 - Change the SSH Port
Changing the SSH port helps to evade obvious detection by sniffing tools and port scanners by placing the connection on a port value not normally recognized for SSH connections. This form of obfuscation acts only to initially bypass common port scans.
See the full benefits of our immersive learning experience with interactive courses and guided career paths.