Hi everyone,
I am looking for attacks over TOR which can be applied to a server running SSH. I have been looking at SSH.com (SSH creator's website), IEEE papers, SpringerLink papers/books, etc. but so far I have only found that the atttacks performed on SSH are dictionaty attacks, brute force attacks and compromising public-private keys pairs. Does anyone know of other attacks that can be performed on SSH servers ? If so would you mind to let me know or, at least, point me out to the right direction ? Thanks in advance.
cadena said: Me and my group are trying to build a hidden service which implements SSH/SFTP and we are interested in the various ways the SSH can be pentested.