Skip navigation.

Gentlem3n's blog

SSH Exploitation Theory

Two effects of SSH is terminal access and SFTP access, which can be used to send and recieve data. When you connect into either SSH/SFTP its going to be a direct established connection; so what if you're connecting an infected SSH server it just happens to have some kind of script that opens an SFTP connection to you using the current connection, checks system info such as Operating System and Client being used.

Syndicate content