{"id":672,"date":"2012-06-03T13:40:33","date_gmt":"2012-06-03T18:40:33","guid":{"rendered":"http:\/\/zitstif.no-ip.org\/?p=672"},"modified":"2014-02-15T19:18:42","modified_gmt":"2014-02-16T00:18:42","slug":"ssh-tricks-and-more-presented-by-kyle-young-gr-issa-4-20-12","status":"publish","type":"post","link":"http:\/\/zitstif.no-ip.org\/?p=672","title":{"rendered":"SSH Tricks And More! Presented By Kyle Young [GR-ISSA] (4-20-12)"},"content":{"rendered":"<p><object width=\"560\" height=\"315\"><param name=\"movie\" value=\"\/\/www.youtube.com\/v\/x7Q2mCYCShE?version=3&amp;hl=en_US\"><\/param><param name=\"allowFullScreen\" value=\"true\"><\/param><param name=\"allowscriptaccess\" value=\"always\"><\/param><embed src=\"\/\/www.youtube.com\/v\/x7Q2mCYCShE?version=3&amp;hl=en_US\" type=\"application\/x-shockwave-flash\" width=\"560\" height=\"315\" allowscriptaccess=\"always\" allowfullscreen=\"true\"><\/embed><\/object><\/p>\n<p>What was covered in this presentation: SSH basics, Offensive uses of  SSH, Defensive uses of SSH, automating SSH through scripting languages,  brief history of SSH, setting up a poor man&#8217;s VPN, using SSH with IPV6,  attacks on SSH and more!<\/p>\n<p>PowerPoint Slides available at:<\/p>\n<p><a title=\"http:\/\/ia601206.us.archive.org\/32\/items\/SshTricksAndMorePresentedByKyleYoung\/PresentationNix.ppt\" dir=\"ltr\" rel=\"nofollow\" href=\"http:\/\/ia601206.us.archive.org\/32\/items\/SshTricksAndMorePresentedByKyleYoung\/PresentationNix.ppt\" target=\"_blank\">http:\/\/ia601206.us.archive.org\/32\/items\/SshTricksAndMorePresentedByKyleYoung\/&#8230;<\/a><\/p>\n<p>sha1sum: fb8a4132f57c12f6e49beeb18880b2d961d2e37c<\/p>\n<p>Full video for download is available at:<\/p>\n<p><a title=\"http:\/\/ia601206.us.archive.org\/1\/items\/KyleyoungSshTricksandMorevideo\/KyleYoungSSHTricksAndMore.wmv\" dir=\"ltr\" rel=\"nofollow\" href=\"http:\/\/ia601206.us.archive.org\/1\/items\/KyleyoungSshTricksandMorevideo\/KyleYoungSSHTricksAndMore.wmv\" target=\"_blank\">http:\/\/ia601206.us.archive.org\/1\/items\/KyleyoungSshTricksandMorevideo\/KyleYou&#8230;<\/a><\/p>\n<p>sha1sum: 3b862e15e9c6664040470034ef4c2f04ce2ad1e5<\/p>\n<p>Part 2: <a title=\"http:\/\/youtu.be\/h0mzoOsc85s\" dir=\"ltr\" rel=\"nofollow\" href=\"http:\/\/youtu.be\/h0mzoOsc85s\" target=\"_blank\">http:\/\/youtu.be\/h0mzoOsc85s<\/a><\/p>\n<p>Part 3: <a title=\"http:\/\/youtu.be\/ne-H7kGrw8w\" dir=\"ltr\" rel=\"nofollow\" href=\"http:\/\/youtu.be\/ne-H7kGrw8w\" target=\"_blank\">http:\/\/youtu.be\/ne-H7kGrw8w<\/a><\/p>\n<p>Part 4: <a title=\"http:\/\/youtu.be\/nLSSf8CXWqk\" dir=\"ltr\" rel=\"nofollow\" href=\"http:\/\/youtu.be\/nLSSf8CXWqk\" target=\"_blank\">http:\/\/youtu.be\/nLSSf8CXWqk<\/a><\/p>\n<p>I want to thank the <a title=\"http:\/\/gr-issa.org\/\" href=\"http:\/\/gr-issa.org\/\" target=\"_blank\">Grand Rapids ISSA<\/a> chapter for allowing me to put on this presentation back in April.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>What was covered in this presentation: SSH basics, Offensive uses of SSH, Defensive uses of SSH, automating SSH through scripting languages, brief history of SSH, setting up a poor man&#8217;s VPN, using SSH with IPV6, attacks on SSH and more! PowerPoint Slides available at: http:\/\/ia601206.us.archive.org\/32\/items\/SshTricksAndMorePresentedByKyleYoung\/&#8230; sha1sum: fb8a4132f57c12f6e49beeb18880b2d961d2e37c Full video for download is available at: http:\/\/ia601206.us.archive.org\/1\/items\/KyleyoungSshTricksandMorevideo\/KyleYou&#8230; &hellip; <a href=\"http:\/\/zitstif.no-ip.org\/?p=672\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">SSH Tricks And More! Presented By Kyle Young [GR-ISSA] (4-20-12)<\/span> <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[16],"tags":[260,583,585,586,383,584,571,28,26,581,573,222,574,570,576,577,49,578,579,580,582,568,569,572,575,345],"class_list":["post-672","post","type-post","status-publish","format-standard","hentry","category-videos","tag-bypass-firewall","tag-gr-issa","tag-grand-rapids","tag-grcon","tag-ipv6","tag-issa","tag-kyle-young","tag-metasploit","tag-netcat","tag-paramiko","tag-proxychains","tag-python","tag-rdesktop","tag-secure-shell","tag-socks-proxy-server","tag-socks5-proxy-server","tag-ssh","tag-ssh-hacking","tag-ssh-hacks","tag-ssh-presentation","tag-ssh-programming","tag-ssh-tricks","tag-ssh-tricks-and-more","tag-teredo","tag-tunnel","tag-zitstif"],"_links":{"self":[{"href":"http:\/\/zitstif.no-ip.org\/index.php?rest_route=\/wp\/v2\/posts\/672","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/zitstif.no-ip.org\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/zitstif.no-ip.org\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/zitstif.no-ip.org\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/zitstif.no-ip.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=672"}],"version-history":[{"count":12,"href":"http:\/\/zitstif.no-ip.org\/index.php?rest_route=\/wp\/v2\/posts\/672\/revisions"}],"predecessor-version":[{"id":682,"href":"http:\/\/zitstif.no-ip.org\/index.php?rest_route=\/wp\/v2\/posts\/672\/revisions\/682"}],"wp:attachment":[{"href":"http:\/\/zitstif.no-ip.org\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=672"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/zitstif.no-ip.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=672"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/zitstif.no-ip.org\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=672"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}