answersLogoWhite

0


Best Answer

There were numerous vulnerabilities in SSH1. One allowed malicious data to be injected into an SSH stream. Another vulnerability in some implementations was to not disconnect after four unsuccessful attempts to log in, making brute force attacks easier.

User Avatar

Wiki User

14y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: What type of attack is SSH1 vulnerable to?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

What kind of attack is SSH1 most vulnerable to?

Join ITT Technical Institute and refer the " Practical guide to Fedora and Redhat Enterprise Linux"


Which type of attack are you most vulnerable to?

D.D.O.S every one, no matter the operating system is vulnerable. See related link.


Does SSH1 run on some Linux distributions?

SSH1 can technically be used on virtually all distributions, yes. It is not, however, in wide use due to certain security vulnerabilities.


A civilization on a vast open plain with rich resources is likely to be?

vulnerable to attack from warring civilizations.


What type of attack are bluetooth cell phones most vulnerable to with auto-discovery enabled and auto-pairing disabled?

BlueJacking


What country do you think are vulnerable to attack?

Any country that does not have a Military or Ministry of Defense are potentially vulnerable to attacks.


What country do you think are vulnerable to attack now?

Any country that does not have a Military or Ministry of Defense are potentially vulnerable to attacks.


What action showes that japan was vulnerable to attack?

The Doolittle Raid .


How is Mesopotamia vulnerable from attack?

There were no natural land forms protecting it


To what are polar bears vulnerable?

Swimming polar bears are vulnerable to being killed and eaten by orcas. On land, they only are vulnerable to humans with guns.


Which of the following makes Alex's personal information vulnerable to attack by identity thieves?

Which of the following makes Alex's personal information vulnerable to attack by identity thieves?Carrying his Social Security Card with him


Is a tree a prey or a predator?

a tree is a prey because its vulnerable to attack