HASSH Description
HASSH is a network fingerprinting standard used to identify specific Client and Server SSH implementations, allowing for easy storage, search, and sharing of MD5 fingerprints. Invented at Salesforce in 2018, now actively maintained by Ben Reardon at Corelight. HASSH can help in detecting and investigating brute force or Cred Stuffing password attempts with higher granularity than IP Source, even in NATed or botnet-like scenarios, and in detecting covert exfiltration of data within SSH Client algorithm sets.
HASSH FAQ
Common questions about HASSH including features, pricing, alternatives, and user reviews.
HASSH is A Profiling Method for SSH Clients and Servers.. It is a Security Operations solution designed to help security teams with SSH, Brute Force.
ALTERNATIVES
A managed security service that uses hypothesis-based threat hunting to proactively discover hidden threats, create new detection rules, and improve overall security posture.
POPULAR
TRENDING CATEGORIES
Stay Updated with Mandos Brief
Get strategic cybersecurity insights in your inbox
