The SSH-2 protocol supports the following user authentications:

* Public key authentication (DSA, RSA*, OpenPGP)
* Host-based authentication
* Password-based authentication

Note: SSH-1 supports a wider range of user authentications, i.e., the public-key, RSA only, RhostsRSA, password, Rhosts (rsh-style), TIS, and Kerberos authentications.

Explore More

Social Engineering Fundamentals

A True Story One morning a few years back, a group of strangers walked into a large shipping firm and walked out with access to the firm’s entire corporate network.

Log Poisoning

Log poisoning is a technique that not many know about. this technique works only if you can make an LFI of the page. if we say that you call index.php,

Hackers note to Windows Defender’s Team in Zlob Trojan source code

Russian hacker has sent a note to the windows defender team. It’s discovered by a French analyst while analyzing the variant of the Zlob Trojan. The original note below. “For