HASSH is a network fingerprinting standard used to identify specific Client and Server SSH implementations, allowing for easy storage, search, and sharing of MD5 fingerprints. Invented at Salesforce in 2018, now actively maintained by Ben Reardon at Corelight. HASSH can help in detecting and investigating brute force or Cred Stuffing password attempts with higher granularity than IP Source, even in NATed or botnet-like scenarios, and in detecting covert exfiltration of data within SSH Client algorithm sets.
Common questions about HASSH including features, pricing, alternatives, and user reviews.
HASSH is A Profiling Method for SSH Clients and Servers. It is a Security Operations solution designed to help security teams with SSH, Brute Force.
HASSH is a free Security Operations tool. This makes it accessible for organizations of all sizes, from startups to enterprises. Visit https://github.com/salesforce/hassh/ for download and installation instructions.
Popular alternatives to HASSH include:
Compare these tools and more at https://cybersectools.com/categories/security-operations
HASSH is for security teams and organizations that need SSH, Brute Force. It's particularly suitable for small to medium-sized teams looking for cost-effective solutions. Other Security Operations tools can be found at https://cybersectools.com/categories/security-operations
Managed Agentic Threat Hunting Service (IOC sweeps and hypothesis based hunting)
A managed security service that uses hypothesis-based threat hunting to proactively discover hidden threats, create new detection rules, and improve overall security posture.