90 likes | 211 Views
This document details a security vulnerability in SSH version 1, demonstrating an attack through DNS spoofing and a man-in-the-middle (MITM) daemon. The attack begins when a user establishes a connection, unaware that the DNS has been spoofed. The user is presented with a forged public key and, upon entering their password, the attacker gains full access to sensitive data and passwords. This gives the attacker the ability to type commands and hijack the connection without the user's knowledge, exposing them to serious security risks.
E N D
Attack on SSHv1 using dsniff By Oleg Kolesnikov ok@cc.gatech.edu
Attacker gains Full Access to Data and Passwords Decrypted Login / password Attacker can type in commands and hijack connection