The SSH-2 protocol supports the following user authentications:

* Public key authentication (DSA, RSA*, OpenPGP)
* Host-based authentication
* Password-based authentication

Note: SSH-1 supports a wider range of user authentications, i.e., the public-key, RSA only, RhostsRSA, password, Rhosts (rsh-style), TIS, and Kerberos authentications.

Explore More

Blind SQL Injection

Blind injection: you dont actually see anything, you just see how the server responds.Blind injection is a little more complicated/time consuming, but when your injection is multi-select and union isn’t

Website of meteorologist U Tun Lwin hacked

Chiang Mai (Mizzima) – A Burmese hacker group that targets popular Burmese websites broke into the  Myanmar Climate Change Watch (MCCW) website created by noted meteorologist Dr. Tun Lwin. The

Critical SQL Injection in Stamps Myanmar

PlanetCreator has reported another critical SQL Injection (vulnerability) on Stamps Myanmar http://www.stampsmyanmar.com and powered by indexmyanmar SQL injection is a code injection technique that exploits a security vulnerability occurring in