SSH Default Login Scanner
This scanner detects the use of SSH (Secure Shell) defaults logins in digital assets.
Short Info
Level
Critical
Single Scan
Single Scan
Can be used by
Asset Owner
Estimated Time
1 minute
Time Interval
20 days 5 hours
Scan only one
Domain, IPv4
Toolbox
-
SSH (Secure Shell) is a cryptographic network protocol for operating network services securely over an unsecured network. It is commonly used by network administrators to manage systems and applications remotely. The protocol is widely utilized in various environments, including data centers, cloud environments, and enterprise networks, because of its secure data communication, remote command-line login, and command execution capabilities. It is implemented in a wide range of operating systems, making it essential for secure network communication. Users usually employ SSH for logging into machines, executing commands remotely, and transferring files and can also use it to create secure tunnels between network devices. This ubiquity and range of functionality make SSH a critical component in network security and administration.
Default logins refer to the initial username and password set by the manufacturer or software developer, which are often kept in place by users. In the case of SSH, this vulnerability can occur if administrators do not change the default credentials post-installation. Attackers exploit default login credentials to gain unauthorized access to remote systems. Critically, this vulnerability arises because the default credentials are often publicly known and can be easily obtained. Thus, detecting such vulnerabilities is vital in ensuring that remote systems are not exposed to unnecessary risks. This detection template focuses on identifying default logins to mitigate potential security breaches.
The vulnerability in question arises from SSH systems that retain manufacturer-established default login credentials. When an SSH client connects to a host, it checks if password-based authentication is allowed. This template leverages that check to brute-force potential default credentials. The technical process involves connecting to the SSH server using pre-defined lists of potential usernames and passwords. By assessing the response from the server upon attempting a login with these credentials, the template identifies whether a default login vulnerability is present.
If malicious actors exploit default SSH logins, a range of detrimental outcomes can ensue. An unauthorized user could gain full control over the system, compromising the confidentiality and integrity of sensitive data. They could execute arbitrary commands, alter system configurations, create backdoors for future access, and potentially pivot attacks to other systems within the network. Moreover, compromised systems may be used to conduct further attacks, such as Distributed Denial of Service (DDoS) attacks. Organizations could face severe reputational damage, financial losses, and possible legal consequences should such exploits occur.