6. Which instances of the SSH servers from question 5 were run?
It might be that the attacker run different versions on
different ports at different times.
Anyway, the instances of ssh that we described in the previous answer were running:
|PID||Proc.Name||Name of service that normally uses that port||Port||Proto|
|Previous||To answer N.7 --> Did any of the SSH servers identified in question 5 appear to have been modified to collect unique information? If so, was any information collected?||Home|