SSH Authorized Keys (T1098.004)

View on ATT&CK

In Playbook

Associated Tactics

  • Persistence
  • Privilege Escalation

Persistence (TA0003)

The adversary is trying to maintain their foothold. Persistence consists of techniques that adversaries use to keep access to systems across restarts, changed credentials, and other interruptions that could cut off their access. Techniques used for persistence include any access, action, or configuration changes that let them maintain their foothold on systems, such as replacing or hijacking legitimate code or adding startup code.

View on ATT&CK

Procedure Examples

Description Source(s)
Blachman, Y. (2020, April 22). Growing Abuse of SSH Keys: Commodity Malware Campaigns Now Equipped with SSH Capabilities. Retrieved June 24, 2020. Venafi SSH Key Abuse
Chris Moberly. (2020, February 12). Tutorial on privilege escalation and post exploitation tactics in Google Cloud Platform environments. Retrieved April 1, 2022. Google Cloud Privilege Escalation
Cisco. (2021, August 23). ip ssh pubkey-chain. Retrieved July 13, 2022. cisco_ip_ssh_pubkey_ch_cmd
Cybereason Nocturnus. (2019, June 13). New Pervasive Worm Exploiting Linux Exim Server Vulnerability. Retrieved June 24, 2020. Cybereason Linux Exim Worm
Google Cloud. (2022, March 31). gcloud compute instances add-metadata. Retrieved April 1, 2022. Google Cloud Add Metadata
Microsoft. (n.d.). Virtual Machines - Update. Retrieved April 1, 2022. Azure Update Virtual Machines
ssh.com. (n.d.). Authorized_keys File in SSH. Retrieved June 24, 2020. SSH Authorized Keys