You are not logged in.
Pages: 1
what are the loopholes that root can exploit to monitor ssh connections? i ask because i am forced to use certain procedures from time to time (reverse tunneling, etc) which may be frowned upon but are necessary for the productivity of my team and the office IT department are often unhappy to find people using port 22 for anything other than nothing. TIA
Offline
You could try sshow and sshmitm from dsniff.
Steven [ web : git ]
GPG: 327B 20CE 21EA 68CF A7748675 7C92 3221 5899 410C
Do not email: honeypot@stebalien.com
Offline
For hotels, Wi-Fi cafes, and oppressive ISPs -- Okay., maybe.
For your workplace -- Are you kidding?
Nothing is too wonderful to be true, if it be consistent with the laws of nature -- Michael Faraday
Sometimes it is the people no one can imagine anything of who do the things no one can imagine. -- Alan Turing
---
How to Ask Questions the Smart Way
Offline
Pages: 1