View Issue Details
ID | Project | Category | View Status | Date Submitted | Last Update |
---|---|---|---|---|---|
0001405 | Kali Linux | New Tool Requests | public | 2014-06-10 09:39 | 2020-02-10 18:12 |
Reporter | c0r3dump3d | Assigned To | |||
Priority | normal | Severity | feature | Reproducibility | N/A |
Status | closed | Resolution | won't fix | ||
Summary | 0001405: OSUETA - A simple Python2 script to exploit the OpenSSH User Enumeration Timing Attack | ||||
Description | Osueta it's a simple Python2 script to exploit the OpenSSH User Enumeration Timing Attack, present in OpenSSH versions 5. and 6.. The script has the ability to make variations of the username employed in the bruteforce attack, and the possibility to establish a DOS condition in the OpenSSH server. I would be really happy if you consider to try this tool. You can get the latest version here: https://github.com/c0r3dump3d/osueta More info: http://cureblog.de/openssh-user-enumeration-time-based-attack/ | ||||
To help speed up the process of evaluating the tool, please make sure to include the following information (the more information you include, the more beneficial it will for us):
|
|
This is python 2 - which is now EOL. |
|
Date Modified | Username | Field | Change |
---|---|---|---|
2014-06-10 09:39 | c0r3dump3d | New Issue | |
2014-06-29 19:52 |
|
Issue cloned: 0001477 | |
2018-01-29 15:07 | g0tmi1k | Note Added: 0008441 | |
2018-05-08 08:41 | g0tmi1k | Summary | OSUETA: A simple Python2 script to exploit the OpenSSH User Enumeration Timing Attack => OSUETA - A simple Python2 script to exploit the OpenSSH User Enumeration Timing Attack |
2019-12-09 13:30 | g0tmi1k | Severity | minor => feature |
2020-02-10 18:12 | g0tmi1k | Status | new => closed |
2020-02-10 18:12 | g0tmi1k | Resolution | open => won't fix |
2020-02-10 18:12 | g0tmi1k | Note Added: 0012192 |