Link to home
Start Free TrialLog in
Avatar of Brijeshk9
Brijeshk9Flag for India

asked on

Solutionary was able to poll configuration information from the Secure Shell (SSH) daemon. The information gathered remotely from an SSH daemon may include:

Solutionary was able to poll configuration information from the Secure Shell (SSH) daemon. The information gathered remotely from an SSH daemon may include:
* SSH Version
* Host key size
* Public key size
* Authentication methods in use
* Number of authorized_keys in RSA authentication
* Encryption methods in use
* Password lengths or ranges of lengths
* Lengths of shell commands
SOLUTION
Avatar of gheist
gheist
Flag of Belgium image

Link to home
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
Start Free Trial
Avatar of Brijeshk9

ASKER

so is there any action required to remove this  kind of Website Vulnerabilities..?
ASKER CERTIFIED SOLUTION
Link to home
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
Start Free Trial
Thanks