SSH Downgrade Attack using ARP Cache Poisoning from ssh protocol version Watch Video
Preview(s):
Gallery
Play Video: (Note: The default playback of the video is HD VERSION. If your browser is buffering the video slowly, please play the REGULAR MP4 VERSION or Open The Video below for better experience. Thank you!)
Description: An SSH Downgrade Attack is performed by poisoning the ARP Cache of the Hosts on a LAN.nnBelow is the setup:nnAttacker's Machine: 192.168.1.3 (Backtrack 4 R1)nOpenSSH Server: 192.168.1.2 (Ubuntu 11.04)nVictim's Machine: 192.168.1.100 (Windows 7 Premium)nnThe SSH protocol version is downgraded by the MITM from version 2 to 1. It intercepts the data packets from the SSH Server, manipulates them, edits the Version String. The Client thinks it's still talking to the SSH Server using SSH Protocol vers
Play Video: (Note: The default playback of the video is HD VERSION. If your browser is buffering the video slowly, please play the REGULAR MP4 VERSION or Open The Video below for better experience. Thank you!)