The SSH-2 protocol supports the following user authentications:

* Public key authentication (DSA, RSA*, OpenPGP)
* Host-based authentication
* Password-based authentication

Note: SSH-1 supports a wider range of user authentications, i.e., the public-key, RSA only, RhostsRSA, password, Rhosts (rsh-style), TIS, and Kerberos authentications.

Explore More

Hacking SOHO Routers

The purpose of this paper is to outline the security measures being taken by vendors to prevent such attacks in their home routing products, what those security measures accomplish, and

Myanmar Hacker Groups Hacked Bangladesh Sites

Hacker groups from Myanmar ..:: My@nm@r H4ck3rs Unite4m / Myanmar Cyber Army / Blink Hacker Group / Myanmar Cracking Team / Team Destroyer Army ::..  hacked 20 bangladesh web sites

Metasploit Framework 3.7.0 Released!

The Metasploit team has spent the last two months focused on one of the least-visible, but most important pieces of the Metasploit Framework; the session backend. Metasploit 3.7 represents a