OpenSSH 9.5 introduced keystroke timing obfuscation to mitigate timing attacks via traffic analysis. Despite this, a researcher discovered a bypass that allows keystroke packets to be identified among the obfuscating 'chaff' packets. Using SSHniff and latency analysis tools, the researcher could infer commands typed during an

15m read timeFrom crzphil.github.io
Post cover image
Table of contents
IntroductionThe existing problemObfuscation in a NutshellDiscovering the BypassFat PacketsSSHniffKeystroke Latency Analysis

Sort: