SSH Authorized Keys

Overview

Evidence: SSH Authorized Keys Description: Collect SSH authorized keys Category: System Platform: AIX Short Name: sshauth Is Parsed: Yes Sent to Investigation Hub: Yes Collect File(s): No

Background

SSH authorized keys on AIX systems contain public keys that are allowed to authenticate to user accounts without passwords. This data is essential for understanding SSH key-based authentication, detecting unauthorized access, and investigating SSH-related security incidents. SSH authorized keys provide evidence of key-based access patterns and potential security vulnerabilities.

Data Collected

This collector gathers structured data about ssh authorized keys.

Ssh Authorized Keys Data

Field
Description
Example

ID

Primary key (auto-increment)

1

Name

Record name

Example Record

Value

Record value

Example Value

Timestamp

Record timestamp

2023-10-15 14:30:25

Collection Method

This collector parses the necessary data from SSH authorized keys files.

This collector collects files from the following locations:

  • ~/.ssh/authorized_keys

Usage

This evidence is crucial for forensic investigations as it provides information about SSH key-based authentication on AIX systems. It helps investigators understand SSH access patterns, detect unauthorized keys, and investigate SSH-related attacks. The data can reveal key-based access, authentication methods, and potential security vulnerabilities. Analysts can use this information to identify suspicious keys, trace SSH access patterns, and assess AIX system security posture.

Notes

This data may contain sensitive information that should be handled according to data protection requirements. Ensure proper chain of custody is maintained during collection and analysis.

Last updated

Was this helpful?