Resources

People often ask me "How did you learn how to hack?" The answer: by reading. This page is a collection of the blog posts and other articles that I have accumulated over the years of my journey. Enjoy!

Username Enumeration in OpenSSH- 79

Nviso LabsPosted 6 Years Ago
  • Bypassed upon a username being valid or not, two different code paths were taken.
  • One, with an invalid username, closed the connection immediately. The other, did something entirely different. This subtle difference made it possible to deduce if a username was valid or not!