Photo by Maria Ziegler on Unsplash

What Files Might An Intruder Look For — In Order to Breach Trust

--

A breach of the trust infrastructure of an organization is one of the most expensive to fix. So, if an adversary has gained access to your systems, which files might they scan for so that they can breach the trust of your systems?

Well, there are often hidden files that you use to gain access to remote systems. One type of file is the OpenSSH private

--

--

Prof Bill Buchanan OBE FRSE
ASecuritySite: When Bob Met Alice

Professor of Cryptography. Serial innovator. Believer in fairness, justice & freedom. Based in Edinburgh. Old World Breaker. New World Creator. Building trust.