2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS) 2018
DOI: 10.1109/ntms.2018.8328710
|View full text |Cite
|
Sign up to set email alerts
|

Penetration and Security of OpenSSH Remote Secure Shell Service on Raspberry Pi 2

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 7 publications
(2 citation statements)
references
References 13 publications
0
2
0
Order By: Relevance
“…For OpenSSH vulnerabilities, Alsaadi et al [36] introduced a penetration testing approach to protect the OpenSSH on Raspberry Pi 2. There are particular restrictions that require additional investigation.…”
Section: ) Solutions For Information Collection Attacksmentioning
confidence: 99%
“…For OpenSSH vulnerabilities, Alsaadi et al [36] introduced a penetration testing approach to protect the OpenSSH on Raspberry Pi 2. There are particular restrictions that require additional investigation.…”
Section: ) Solutions For Information Collection Attacksmentioning
confidence: 99%
“…H. Alsaadi & M. AlKubaisi [22] performed penetration testing on remote secure OpenSSH running on version 7.1p2 On Raspberry Pi 2 running Kali Linux version 3.2-4.4. Their study focused on the vulnerabilities discovered in exchange keys in SSH protocol which creates multiple CRLF injections and admits to conduct man in the middle attack to allow remote users bypass shell-command constraints via crafted X11 forwarding data.…”
Section: Literature Reviewmentioning
confidence: 99%