telnet vs ssh on Core equipment , looking for reasons why ?

fingers fingers at fingers.co.za
Tue Jul 31 15:39:12 UTC 2001


Hi

> Monkey in the Middle attack on SSH is very difficult to perform. I'm cc'ing
> Matt Bishop (bishop at cs.ucdavis.edu) who together with yours truly wrote a
> paper on this in 1997.

Well I saw a monkey do it in 10 minutes with ettercap. Sorry I did mention
in 1 of my posts that the ssh key sniff was done using arp soofing, my
text got lost somewhere along the line....

--Rob




More information about the NANOG mailing list