Penetration Testing mailing list archives

Re: How to decrypt a connection SSH v2?


From: Ulises2k <ulises2k () gmail com>
Date: Sun, 13 Jul 2008 16:19:23 -0300

Sorry, but I don't understand you correctly. (My English is not very good.)

A man-in-the-middle can not perform in ssh v2.

Regards,
--
Ulises U. Cuñé
Web: http://www.ulises2k.com.ar


On Fri, Jul 11, 2008 at 00:57, rajat swarup <rajats () gmail com> wrote:
I think he exploited a vulnerability in the Debian implementation of SSH.
Just capturing a sniff of all the traffic is otherwise insufficient unless a
man-in-the-middle is performed.  Please correct me if I'm wrong.

Thanks and regards,
Rajat.
--
Rajat Swarup

http://rajatswarup.blogspot.com/

------------------------------------------------------------------------
This list is sponsored by: Cenzic

Top 5 Common Mistakes in
Securing Web Applications
Get 45 Min Video and PPT Slides

www.cenzic.com/landing/securityfocus/hackinar
------------------------------------------------------------------------


Current thread: