Penetration Testing mailing list archives
Re: How to decrypt a connection SSH v2?
From: Ulises2k <ulises2k () gmail com>
Date: Sun, 13 Jul 2008 16:19:23 -0300
Sorry, but I don't understand you correctly. (My English is not very good.) A man-in-the-middle can not perform in ssh v2. Regards, -- Ulises U. Cuñé Web: http://www.ulises2k.com.ar On Fri, Jul 11, 2008 at 00:57, rajat swarup <rajats () gmail com> wrote:
I think he exploited a vulnerability in the Debian implementation of SSH. Just capturing a sniff of all the traffic is otherwise insufficient unless a man-in-the-middle is performed. Please correct me if I'm wrong. Thanks and regards, Rajat. -- Rajat Swarup http://rajatswarup.blogspot.com/
------------------------------------------------------------------------ This list is sponsored by: Cenzic Top 5 Common Mistakes in Securing Web Applications Get 45 Min Video and PPT Slides www.cenzic.com/landing/securityfocus/hackinar ------------------------------------------------------------------------
Current thread:
- Re: How to decrypt a connection SSH v2?, (continued)
- Re: How to decrypt a connection SSH v2? Paul Melson (Jul 09)
- Re: How to decrypt a connection SSH v2? Ulises2k (Jul 10)
- Re: How to decrypt a connection SSH v2? Tim (Jul 10)
- Re: How to decrypt a connection SSH v2? Jimmy Brokaw (Jul 12)
- Re: How to decrypt a connection SSH v2? Ulises2k (Jul 10)
- Re: How to decrypt a connection SSH v2? Gary E. Miller (Jul 10)
- RE: How to decrypt a connection SSH v2? Paul Melson (Jul 10)
- RE: How to decrypt a connection SSH v2? Gary E. Miller (Jul 10)
- Re: How to decrypt a connection SSH v2? Ulises2k (Jul 10)
- Re: How to decrypt a connection SSH v2? Paul Melson (Jul 09)
- Re: How to decrypt a connection SSH v2? Tim (Jul 10)
- Message not available
- Re: How to decrypt a connection SSH v2? Ulises2k (Jul 13)