Dustin Decker

Tag: ssh

  • Terrapin Attack – What You Should Know

    Terrapin Attack – What You Should Know

    Named Terrapin, the new attack works when an attacker obtains an active adversary-in-the-middle position between a ssh client and server. The exploit allows the attacker to assume the identity of both parties, allowing interception and alteration of communications. There are a host of resources available on the Internet for a “deeper dive” into this issue.…

    Continue reading