The SSH-2 protocol supports the following user authentications:

* Public key authentication (DSA, RSA*, OpenPGP)
* Host-based authentication
* Password-based authentication

Note: SSH-1 supports a wider range of user authentications, i.e., the public-key, RSA only, RhostsRSA, password, Rhosts (rsh-style), TIS, and Kerberos authentications.

Explore More

Single-line attack infects thousands of Web sites

Thousands of Web sites have fallen victim to an attack using just one line of code that maliciously re-directs browsers via Javascript to servers that are hosting a variety of

Joomla Administrator Login BruteForcer for v1.0 and v1.5

#!/usr/bin/python# Joomla Administrator Login BruteForcer for v1.0 and v1.5 # Feel free to do whatever you want with this code!# Share the c0de! # Darkc0de Team # www.darkc0de.com # rsauron[at]gmail[dot]com

XSS Stealing Cookies

This method (XSS attacks) is for get the cookies users, so, for get information of users… and then, login into the account of the victim user…u will have to give