The SSH-2 protocol supports the following user authentications:

* Public key authentication (DSA, RSA*, OpenPGP)
* Host-based authentication
* Password-based authentication

Note: SSH-1 supports a wider range of user authentications, i.e., the public-key, RSA only, RhostsRSA, password, Rhosts (rsh-style), TIS, and Kerberos authentications.

Explore More

Hack Tools, Utilities and Exploits

Packetstorm Last 10 Files glsa-200901-13.txt – Gentoo Linux Security Advisory GLSA 200901-13 – Multiple vulnerabilities have been discovered in Pidgin, allowing for remote arbitrary code execution, denial of service and

About WPA & WPA2

Wi-Fi Protected Access (WPA and WPA2) is a class of systems to secure wireless (Wi-Fi) computer networks. It was created in response to several serious weaknesses researchers had found in

Critical XSS Vulnerability in Ministry of Transport http://www.mot.gov.mm/

PlanetCreator has reported another Critical XSS Vulnerability in Ministry of Transport http://www.mot.gov.mm/ Cross-site scripting (XSS) is a type of computer security vulnerability typically found in web applications that enables malicious