sending ssh packets at a flat rate to obscure keystroke timings

2024-09-13

A technique used to thwart SSH keystroke timing attacks is to send keystroke packets at a flat rate. Rather than immediately sending the packet, send ...

Read More

SSH keystroke timing attack

2024-09-13

A SSH keystroke timing attack occurs when an adversary is able to capture packets of ssh sessions, and measure the timing between keystrokes. Using ...

Read More

statistical learning

2024-09-13

Statistical learning is the process of learning based on the statistical structure of input.

Statistical learning has applications in language ...

Read More

Statistics

2024-09-13

Statistics is a Mathematical discipline that includes the collection, description, analysis, and inference of conclusions derived from quantitative ...

Read More

telnet, rlogin, ftp are insecure networking protcols, used broadly into the 00's

2024-09-13

When I began studying computer security in the mid 1990’s, encryption on network protocols was the exception, not the norm.

Many devices used ...

Read More

timinganalysisssh-song_wagner_tian2001

2024-09-11

Gaussian distribution
Read More

performance

2024-09-09

Performance is the measure of useful work completed within a time period.

Performance is a common metric used in computer science, athletics, and ...

Read More

refactoring

2024-09-09

Refactoring in computer science and software development is the process of making changes to existing codebases without changing its expected ...

Read More

chmod 777

2024-09-03

Often, Linux and Unix administrators will get frustrated with figuring out permissions and use `chmod 777` on the files they are having issues with in ...

Read More

hash cracking

2024-09-03

Password hashes can be ran through hash cracking software to discover a password’s unencrypted, plain-text form.

John the Ripper and Hashcat are ...

Read More