Solved

Solutionary was able to poll configuration information from the Secure Shell (SSH) daemon. The information gathered remotely from an SSH daemon may include:

Posted on 2009-03-30
4
343 Views
Last Modified: 2012-08-13
Solutionary was able to poll configuration information from the Secure Shell (SSH) daemon. The information gathered remotely from an SSH daemon may include:
* SSH Version
* Host key size
* Public key size
* Authentication methods in use
* Number of authorized_keys in RSA authentication
* Encryption methods in use
* Password lengths or ranges of lengths
* Lengths of shell commands
0
Comment
Question by:Brijeshk9
  • 2
  • 2
4 Comments
 
LVL 61

Assisted Solution

by:gheist
gheist earned 500 total points
ID: 24027047
SSH protocol publishes first four and 6th by protocol design. You cannot avoid them. It is just for scaring you.
Rest needs authenticated session.
0
 

Author Comment

by:Brijeshk9
ID: 24029590
so is there any action required to remove this  kind of Website Vulnerabilities..?
0
 
LVL 61

Accepted Solution

by:
gheist earned 500 total points
ID: 24031956
This is not related to any sort of "website"
"may include" is not a strict expression. No action should be taken.
Event ehough if you never patched your SSH server, then you should find a way to get patches from your vendor - some real attacks are possible against 5yo SSH server.
0
 

Author Closing Comment

by:Brijeshk9
ID: 31564649
Thanks
0

Featured Post

What Security Threats Are You Missing?

Enhance your security with threat intelligence from the web. Get trending threat insights on hackers, exploits, and suspicious IP addresses delivered to your inbox with our free Cyber Daily.

Join & Write a Comment

A metadevice consists of one or more devices (slices). It can be expanded by adding slices. Then, it can be grown to fill a larger space while the file system is in use. However, not all UNIX file systems (UFS) can be expanded this way. The conca…
I promised to write further about my project, and here I am.  First, I needed to setup the Primary Server.  You can read how in this article: Setup FreeBSD Server with full HDD encryption (http://www.experts-exchange.com/OS/Unix/BSD/FreeBSD/A_3660-S…
Learn how to find files with the shell using the find and locate commands. Use locate to find a needle in a haystack.: With locate, check if the file still exists.: Use find to get the actual location of the file.:
Viewers will learn how to properly install and use Secure Shell (SSH) to work on projects or homework remotely. Download Secure Shell: Follow basic installation instructions: Open Secure Shell and use "Quick Connect" to enter credentials includi…

707 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

14 Experts available now in Live!

Get 1:1 Help Now