HASSH Logo

HASSH

0
Free
Visit Website

HASSH is a network fingerprinting standard used to identify specific Client and Server SSH implementations, allowing for easy storage, search, and sharing of MD5 fingerprints. Invented at Salesforce in 2018, now actively maintained by Ben Reardon at Corelight. HASSH can help in detecting and investigating brute force or Cred Stuffing password attempts with higher granularity than IP Source, even in NATed or botnet-like scenarios, and in detecting covert exfiltration of data within SSH Client algorithm sets.

FEATURES

ALTERNATIVES

Scan the internet for publicly exposed network components

A honeypot system designed to detect and analyze potential security threats

A network protocol analyzer for capturing and analyzing network traffic with a focus on TCP/IP flow reconstruction and response time tracking.

A collection of PCAPs for ICS/SCADA utilities and protocols with the option for users to contribute.

Fast passive subdomain enumeration tool

Open source DDoS protection system with centralized policy for network operators.

A multi-threaded scanner for identifying CORS flaws and misconfigurations

A Hadoop library for reading and querying PCAP files