SSH Authorized Keys

Description

Adversaries may modify the SSH authorized_keys file to maintain persistence on a victim host. Linux distributions and macOS commonly use key-based authentication to secure the authentication process of SSH sessions for remote management. The authorized_keys file in SSH specifies the SSH keys that can be used for logging into the user account for which the file is configured. This file is usually found in the user's home directory under /.ssh/authorized_keys.[1] Users may edit the system’s SSH config file to modify the directives PubkeyAuthentication and RSAAuthentication to the value "yes" to ensure public key and RSA authentication are enabled. The SSH config file is usually located under /etc/ssh/sshd_config.

Products, Sensors, and Dependencies

ProductDependenciesData sourceAccess requiredProtocolData CollectedNotes
Tenable Cloud SecurityIaaSRead-onlyHTTPSCloud Virtual Machine

Attack Path Technique Details

Framework: MITRE ATT&CK

Family: Privilege Escalation, Persistence

Sub-Technique: SSH Authorized Keys

Platform: Cloud

Products Required: Tenable Cloud Security

Tenable Release Date: 2024 Q4