Poor SSH Configuration Missing From Off-Chain Attacks #11
Labels
Document Attack Pattern
Document an Attack Pattern not listed
documentation
Improvements or additions to documentation
Example Attack Pattern
code for an existing attack pattern
help wanted
Extra attention is needed
Is your feature request related to a problem? Please describe.
Backend servers are often used for things like compounders, apis, oracles, etc.. This requires remote access, usually through SSH. Default SSH configurations are dogshit, often permitting root access with password enable ssh.
Describe the solution you'd like
Describe alternatives you've considered
Telnet? /s
The text was updated successfully, but these errors were encountered: