Memory Forensics of OpenSSH
Cal Leeming [Simplicity Media Ltd]
cal.leeming at simplicitymedialtd.co.uk
Mon May 5 06:49:23 EST 2014
Although I cannot speak with any authority on the data structures of SSH, I
can at least point you in the right direction on tools already available.
Looks like someone also wrote a tool already to do SSH key extraction from
memory;
https://github.com/kholia/passe-partout
Have a look at volatility framework;
https://code.google.com/p/volatility/wiki/VolatilityIntroduction?tm=6
http://www.forensicswiki.org/wiki/Volatility_Framework
http://www.forensicswiki.org/wiki/List_of_Volatility_Plugins
Also these;
http://sneakygcr.tumblr.com/post/52514790216/how-to-extract-the-private-key-from-a-running-ssh
http://c0decstuff.blogspot.co.uk/2011/01/in-memory-extraction-of-ssl-private.html
http://www.vnsecurity.net/2009/10/how-to-recover-rsa-private-key-in-a-coredump-of-ssh-agent-sapheads-hackjam-2009-challenge-6/
Hope this helps
Cal
On Sun, May 4, 2014 at 9:37 PM, Fengwei Zhang <namedylan at gmail.com> wrote:
> Hello List,
>
> One of my project needs memory forensics of OpenSSH. Here is a brief
> description of the problem:
>
> I have a raw memory dump, and all of the kernel data structures (e.g.,
> task_struct, mm_struct) have been figured out. Now, I want to retrieve the
> data structures (e.g., struct session_state) of an SSH process instance.
> Finding a session key (active_state->newkeys) could be an example. In
> order to find these information, I think I need a starting point (i.e.,
> memory address) of the OpenSSH data structures.
>
> Does anyone know how to tackle this problem? Any comments and suggestions
> are much appreciated.
>
> Thanks,
> Fengwei
> _______________________________________________
> openssh-unix-dev mailing list
> openssh-unix-dev at mindrot.org
> https://lists.mindrot.org/mailman/listinfo/openssh-unix-dev
>
More information about the openssh-unix-dev
mailing list