Use and abuse of SSH AuthorizedKeysCommand and SSH Certificates

This talk will discuss the recent rise of SSH Certificates and SSH AuthorizedKeyCommands as alternative Identity and Access Management solutions. This talk will show how they can be used defensively as well as an innovative backdoor.

This talk will cover setup, program suites that utilize certificates, how to set them up yourself, and how to backdoor systems.

Register Today!