Any known SSH attacks/vulnerabilities other than brute force, dictionary attacks and compromising keys?

I am looking for attacks over Tor that can be applied to a server running SSH. I have been looking at SSH.com, IEEE papers, SpringerLink papers/books, etc. but so far I have only found that the attacks performed on SSH are brute force, dic… Continue reading Any known SSH attacks/vulnerabilities other than brute force, dictionary attacks and compromising keys?

while using TOR, why I also see traffic flowing to hosts other than the guard node? [migrated]

I’m using TOR browser and using wireshark to monitor IP traffic. I noticed that every now and then there are packets flowing from/to other IPs. Checking them, I noticed they are TOR relays, which I think it’s strange as they are not my gua… Continue reading while using TOR, why I also see traffic flowing to hosts other than the guard node? [migrated]

Posted in tor

while using TOR, why I also see traffic flowing to hosts other than the guard node? [migrated]

I’m using TOR browser and using wireshark to monitor IP traffic. I noticed that every now and then there are packets flowing from/to other IPs. Checking them, I noticed they are TOR relays, which I think it’s strange as they are not my gua… Continue reading while using TOR, why I also see traffic flowing to hosts other than the guard node? [migrated]

Posted in tor

REvil ransomware gang goes dark after its Tor sites are hacked

By ghostadmin
In July 2021 the REvil ransomware group vanished due to mounting US pressure after the Kaseya attack. However, the group was back in September 2021 by carrying out extortion-based DDoS attacks on ITSPs in the UK and Canada/America. The in… Continue reading REvil ransomware gang goes dark after its Tor sites are hacked