Pentesters: Is it common for bruteforce/ dictionary attacks, e.g. for SSH username enumeration, to be successful in the real-world pentests? [closed]

I am learning and practicing on vulnerable-by-design machines (vulnhub, metasploitable etc.). I found that this machine is running OpenSSH 7.5, and I tried a few exploits of Username enumeration from ExploitDB, which all ask for a wordlist… Continue reading Pentesters: Is it common for bruteforce/ dictionary attacks, e.g. for SSH username enumeration, to be successful in the real-world pentests? [closed]

QR code SQL injection and other vulnerabilities in a popular biometric terminal

The report analyzes the security properties of a popular biometric access control terminal made by ZkTeco and describes vulnerabilities found in it. Continue reading QR code SQL injection and other vulnerabilities in a popular biometric terminal

Now that `sshcontrol` has been deprecated, how to use gpg key for ssh authentication with an agent?

The GnuPG Manual states that:

This [sshcontrol] file is deprecated in favor of the "Use-for-ssh"
attribute in the key files.

What is now the correct way to configure gpg / gpg-agent to use your key for SSH?
Specifically:

What … Continue reading Now that `sshcontrol` has been deprecated, how to use gpg key for ssh authentication with an agent?

Should I be worried about unusual SSH login attempts from unknown IP addresses?

I’ve been monitoring my server’s SSH logs and noticed a steady stream of login attempts from unknown IP addresses, mostly from different countries.
Heaps and heaps of account names are tried, and with some quick server stats I’d say, at le… Continue reading Should I be worried about unusual SSH login attempts from unknown IP addresses?