Threat Hunting SSH Keys – Bash Script Feature Pivoting

Malicious actors often add SSH keys to victim hosts for persistence, in the blog we will show you how to hunt with that knowledge. The process of identifying malicious activity through threat intelligence pivoting is standard practice for any CTI analyst. For readers unfamiliar with the process, pivoting is the process of identifying similar or [...]

Read More...

The post Threat Hunting SSH Keys – Bash Script Feature Pivoting appeared first on Lacework.

Article Link: - Threat Hunting SSH Keys - Bash Script Feature Pivoting