Still celebrating National IT Professionals Day with 3 months of free Premium Membership. Use Code ITDAY17


Solutionary was able to poll configuration information from the Secure Shell (SSH) daemon. The information gathered remotely from an SSH daemon may include:

Posted on 2009-03-30
Medium Priority
Last Modified: 2012-08-13
Solutionary was able to poll configuration information from the Secure Shell (SSH) daemon. The information gathered remotely from an SSH daemon may include:
* SSH Version
* Host key size
* Public key size
* Authentication methods in use
* Number of authorized_keys in RSA authentication
* Encryption methods in use
* Password lengths or ranges of lengths
* Lengths of shell commands
Question by:Brijeshk9
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
  • 2
LVL 62

Assisted Solution

gheist earned 1500 total points
ID: 24027047
SSH protocol publishes first four and 6th by protocol design. You cannot avoid them. It is just for scaring you.
Rest needs authenticated session.

Author Comment

ID: 24029590
so is there any action required to remove this  kind of Website Vulnerabilities..?
LVL 62

Accepted Solution

gheist earned 1500 total points
ID: 24031956
This is not related to any sort of "website"
"may include" is not a strict expression. No action should be taken.
Event ehough if you never patched your SSH server, then you should find a way to get patches from your vendor - some real attacks are possible against 5yo SSH server.

Author Closing Comment

ID: 31564649

Featured Post

Technology Partners: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

A metadevice consists of one or more devices (slices). It can be expanded by adding slices. Then, it can be grown to fill a larger space while the file system is in use. However, not all UNIX file systems (UFS) can be expanded this way. The conca…
Installing FreeBSD… FreeBSD is a darling of an operating system. The stability and usability make it a clear choice for servers and desktops (for the cunning). Savvy?  The Ports collection makes available every popular FOSS application and packag…
Learn how to navigate the file tree with the shell. Use pwd to print the current working directory: Use ls to list a directory's contents: Use cd to change to a new directory: Use wildcards instead of typing out long directory names: Use ../ to move…
This video shows how to set up a shell script to accept a positional parameter when called, pass that to a SQL script, accept the output from the statement back and then manipulate it in the Shell.
Suggested Courses

721 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question