
During a recent network security assessment, a colleague of mine proposed a very simple yet brilliant idea: logging credentials from an SSH server in order to compromise network services. What?
Here's the simple part:
Grabbing credentials from SSH – a quick Google search turns up a few blog posts...