Published August 22, 2022 | Version 0.1
Dataset Open

Extracting Session Keys From the Main Memory Using Brute-force and Machine Learning

  • 1. University of Passau
  • 2. Reykjavík University

Description

This dataset contains:

  1. Heap dump of three version of OpenSSH (V_7_9_P1, V_8_0_P1 and V_8_1_P1)
  2. Heap dump of two applications that uses TLS (lynx and curl)
  3. Network recording in format of pcap
  4. JSON file that contains the keys' information

The source code is available at: https://github.com/smartvmi/SSH-TLS-key-extraction

Notes

This work has been funded by the Bundesministerium für Bildung und Forschung (BMBF, German Federal Ministry of Education and Research) -- project 01IS21063A-C (SmartVMI).

Files

clean-ssh.zip

Files (2.3 GB)

Name Size Download all
md5:35b15b6a6e1564ef9ed70ef6fad2e9da
42.1 MB Preview Download
md5:728f3435f24578d1a25d379f92167c0f
707.3 MB Preview Download
md5:45370776dec8c908a3aff8d80ee92af4
191.0 MB Preview Download
md5:8b14495feea35aa7432c3c54a6ecbb49
1.3 GB Preview Download