Secure Shell (SSH): 22
Security Weaknesses
Vulnerable to brute force attacks targeting credentials.
Exploitation of weak encryption ciphers.
Risks from stolen private keys if not protected.
Security Defense and Mitigation Measures
Enforce key-based authentication instead of passwords.
Regularly update SSH software to patch vulnerabilities.
Configure SSH to disable root login and enforce IP whitelisting.
Use tools like fail2ban to limit brute-force attempts.
Indicators of Compromise or Attack
Repeated failed login attempts in SSH logs.
Unauthorized addition of SSH keys to authorized_keys files.
Unexpected or unauthorized SSH sessions.
Last updated