The SSH-2 protocol supports the following user authentications:

* Public key authentication (DSA, RSA*, OpenPGP)
* Host-based authentication
* Password-based authentication

Note: SSH-1 supports a wider range of user authentications, i.e., the public-key, RSA only, RhostsRSA, password, Rhosts (rsh-style), TIS, and Kerberos authentications.

Explore More

What are the various methods of passive OS fingerprinting?

In passive OS fingerprinting, an attacker installs a sniffer on any third party such as a router on which the victim communicates frequently. Now he studies the sniffer’s log and

Joomla Administrator Login BruteForcer for v1.0 and v1.5

#!/usr/bin/python# Joomla Administrator Login BruteForcer for v1.0 and v1.5 # Feel free to do whatever you want with this code!# Share the c0de! # Darkc0de Team # www.darkc0de.com # rsauron[at]gmail[dot]com

What Damage Can Hackers Do?

Hackers like to subvert computer security without permission. They are cyber criminals. This can mean gaining access to a computer across the Internet for illicit purposes. They might engage in