Key Recovery Vulnerability Discovered in PuTTY SSH

  Рет қаралды 62,529

Mental Outlaw

Mental Outlaw

Күн бұрын

In this video I explain CVE-2024-31497 a vulnerability discovered in PuTTY SSH that allows an attacker to figure out a victims NIST P-521 Private Keys from their public key and 60 signed messages.
More information
www.chiark.greenend.org.uk/~s...
git.tartarus.org/?p=simon/put...
My merch is available at
based.win/
Subscribe to me on Odysee.com
odysee.com/@AlphaNerd:8
₿💰💵💲Help Support the Channel by Donating Crypto💲💵💰₿
Monero
45F2bNHVcRzXVBsvZ5giyvKGAgm6LFhMsjUUVPTEtdgJJ5SNyxzSNUmFSBR5qCCWLpjiUjYMkmZoX9b3cChNjvxR7kvh436
Bitcoin
3MMKHXPQrGHEsmdHaAGD59FWhKFGeUsAxV
Ethereum
0xeA4DA3F9BAb091Eb86921CA6E41712438f4E5079
Litecoin
MBfrxLJMuw26hbVi2MjCVDFkkExz8rYvUF

Пікірлер: 339
@bagaco6886
@bagaco6886 Ай бұрын
What the fuck This month has a vulnerability on every single software imaginable, no one is safe
@thingsiplay
@thingsiplay Ай бұрын
Not even Rust was safe. We are doomed.
@YTDeletes90PercentOfMyComments
@YTDeletes90PercentOfMyComments Ай бұрын
​@@UCgx7OseCrundqkE8oEVeobglol. lmao even.
@fort809
@fort809 Ай бұрын
@@UCgx7OseCrundqkE8oEVeobgglowing
@renderedpixels4300
@renderedpixels4300 Ай бұрын
@@YTDeletes90PercentOfMyComments kek, if i may
@thingsiplay
@thingsiplay Ай бұрын
@@UCgx7OseCrundqkE8oEVeobg I don't believe you.
@atahanozbayram1619
@atahanozbayram1619 Ай бұрын
Bro is reporting every single vulnerability ever before anywhere else.
@anonimenkolbas1305
@anonimenkolbas1305 Ай бұрын
What if he's in on it bc he's a glowie 👀
@slavsquatsuperstar
@slavsquatsuperstar Ай бұрын
Bro is DJ Khaled as this point. “Another one!” “Another one!”
@JonathanSwiftUK
@JonathanSwiftUK Ай бұрын
I've been updating all the software for the last two days. I also discovered another product which has an old version of the putty binaries in the install directory, but nobody knows about that one, I'm waiting for the company to get back to me after I reported it.
@japlic
@japlic Ай бұрын
bro copyyed me
@anonimenkolbas1305
@anonimenkolbas1305 Ай бұрын
@@japlic bullshit, your comment is younger
@evccyr
@evccyr Ай бұрын
Vulnerabilities need to know that it's not April 1st anymore and that we're already overwhelmed
@SeeWhatIs
@SeeWhatIs Ай бұрын
I use real random number standard RFC 1149.5. I don't need to worry about any vulnerabilities
@LucasImpulse
@LucasImpulse Ай бұрын
@@SeeWhatIs that's fine bro i use RFC 9564
@billant2
@billant2 Ай бұрын
April started out with a joke, now the vulns are having the last laugh. lol PUTTY was never considered to be safe anyway.
@baraka629
@baraka629 Ай бұрын
And they don't stop coming and they don't stop coming....
@slavsquatsuperstar
@slavsquatsuperstar Ай бұрын
Fed to the glowies and I hit the ground running…
@Shigbeard
@Shigbeard Ай бұрын
Didn't make sense to backdoor for fun...
@dacho707
@dacho707 Ай бұрын
your seg gets fault and your core gets dumped
@Heizenberg32
@Heizenberg32 Ай бұрын
So much to do, so much to see! So what's wrong with attacking a hashed key?!
@nureinbratwurst2109
@nureinbratwurst2109 Ай бұрын
You'll never grow with your lame code, you'll never shine with the glow bros
@fritsonpetitfrere9038
@fritsonpetitfrere9038 Ай бұрын
Have you guys heard about "insert new vulnerbility", is April's new motto
@stage6fan475
@stage6fan475 Ай бұрын
Algorithm. It has been awesome how many vulnerabilities found. Makes you wonder how many more are out there. Thanks, Kenny.
@WashingtonFernandes
@WashingtonFernandes Ай бұрын
NSA won't tell us 😢.
@replikvltyoutube3727
@replikvltyoutube3727 Ай бұрын
They have signed NDA ☹️
@nopenoperson9118
@nopenoperson9118 Ай бұрын
all these fucking bots in the comments and meanwhile google's too busy circlejerking about fucking adblock
@tacokoneko
@tacokoneko Ай бұрын
i am using gentoo + firefox + ublock origin and i have never seen a single ad and i have never seen the anti adblock popup
@mwolf2620
@mwolf2620 Ай бұрын
really? it worked that well for you? thats crazy! do you have a place i could buy those?
@paultidwell8799
@paultidwell8799 Ай бұрын
I know, right?
@curtis026
@curtis026 Ай бұрын
Atleast your comments don’t get blocked! I am on the “list” apparently. Everything I say on KZbin is either immediately deleted or “reviewed” by the commies before it is allowed. I cannot wait until KZbin goes under because everyone smart moves to somewhere else. Rumble is cool, but gd KZbin is hard to let go of. I get it, and that’s why I am still here finding new creators. The day is coming though, Susan.
@curtis026
@curtis026 Ай бұрын
Sorry, I’ve replied enough. They keep getting deleted though, and I am done. You’re correct nopenoperson… KZbin is dead. Can’t wait for January 2025
@marc-andreservant201
@marc-andreservant201 Ай бұрын
I use Ed25519, which uses the fact that 2^255-19 is prime as a trick to make software implementations faster (modulo operations have software optimisations when you're close to a power of 2). As a bonus, the nonce can be any 255 bit number, such as sha256(concatenate(privkey, message)) trimming one bit. This is secure because the order of the generator point is guaranteed to be between 2^255-19 and 2^255-19 - sqrt(2^255 - 19) from Hasse's theorem, limiting any bias to sqrt(2^-255-19) which is not faster to crack than the baby-step giant-step algorithm. Obviously a quantum computer would crack the private key instantly using Shor's algorithm, but for now we're safe.
@Swineflu-jm7wx
@Swineflu-jm7wx Ай бұрын
This channel for me is like manual for cyber security. Thank you
@itswilliamanimate
@itswilliamanimate Ай бұрын
government agencies stash of exploits getting discovered this month, huh... (x2) linux exploit giving ring 0 xz poorly escaped strings in windows firewall not firewalling this crazy year for the tech world, no?
@WashingtonFernandes
@WashingtonFernandes Ай бұрын
White hats suck ass dude, they think just because they have an OSCP or some shit they can be better than anyone else, then forget the basics, as using a real random number generator to encrypt shit, just like putty.
@razzedb811
@razzedb811 Ай бұрын
I don't know how I found your channel because I've never even been into tech, but you are just so entertaining.
@robotron1236
@robotron1236 Ай бұрын
Are you a right winger/ libertarian? There are very few right leaning/ moderate tech channels out there. It’s been a godsend for someone like me! I thought I was all alone 😂
@psaini1999
@psaini1999 Ай бұрын
I found it from "Yuki Installs Gentoo"
@snowcloudshinobi
@snowcloudshinobi Ай бұрын
it was the haruhi suzumiya video for me
@blackspider4
@blackspider4 Ай бұрын
@@robotron1236 yeah gotta make tech political
@curtis026
@curtis026 Ай бұрын
You’re a legend, Kenny! I have no idea what you’re talking about in each video, but I understand your genius. Learning so much! ❤ you
@ArthurTheEpicGuy
@ArthurTheEpicGuy Ай бұрын
SSH is being attacked constantly at this point.
@oskarz
@oskarz Ай бұрын
well yeah- it’s basically the only way that almost all servers on the internet are maintained, and the implications can mean user level or root level RCE.
@whannabi
@whannabi Ай бұрын
​@@oskarzgonna have to get a keyboard and plug it into the actual server.
@Cuplex1
@Cuplex1 Ай бұрын
Really? I dont think so. This was specifically a ECDSA nistp521 problem, an algorithm I always avoided due to security concerns dating many years back. So claiming that it's SSH that is the problem and somehow under attack is stretching the truth to the extreme. Did you use this algorithmic combo, or do you know of anyone who did?
@Cuplex1
@Cuplex1 Ай бұрын
Really? I dont think so. This was specifically a ECDSA nistp521 problem, an algorithm I always avoided due to security concerns dating many years back. So claiming that it's SSH that is the problem and somehow under attack is stretching the truth to the extreme. Did you use this algorithmic combo, or do you know of anyone who did?
@Cuplex1
@Cuplex1 Ай бұрын
​@@oskarz Nah, no important system should have port 22 open for anyone to connect. At a minimum, you could at least IP restrict access. SSH traffic is usually tunneled though a VPN connection when connecting to production servers. Unless it's just a cloud VM where nothing sensitive is stored.
@Agent_Schrader
@Agent_Schrader Ай бұрын
Thank you for the work you do to keep people informed of these things 👍
@thingsiplay
@thingsiplay Ай бұрын
A new day, a new vulnerability.
@Amipotsophspond
@Amipotsophspond Ай бұрын
always grab some bio metrics such as mouse movement, microphone, camera pixel, and/or key stroke times to throw in with your RNG.
@Cuplex1
@Cuplex1 Ай бұрын
No. I guess you are not aware of the concept of Cryptographically Secure Random Numbers? It's built into windows! It uses multiple sources of unique hardware data fetched from the system, which is then used to seed a random number generator with a sequence length that is substantially longer than the standard random number generator used in Python or C#. While the latter is much more focused on generation speed, not cryptographic safety. 😉
@dimitralex1892
@dimitralex1892 Ай бұрын
so you are telling me computer random is more secure than random user input? you know HTTP SSL Certs are created with random non computer input? you ever heard of lava lamps? i don't think there is one sec guy who says "better don't use real world random, only computer random"
@RoscaPaul
@RoscaPaul Ай бұрын
@@dimitralex1892you do know the cloudflare lavalamps are mostly just for show and the the real source of randomness is the noise from the camera?
@packjackisback
@packjackisback Ай бұрын
I'm going to be honest, I wouldn't even trust microsoft with my random number values
@StertyOG
@StertyOG Ай бұрын
Thank you mental for keeping us informed!
@bobbyrandomguy1489
@bobbyrandomguy1489 Ай бұрын
Also the ongoing attacks on xmr and tor. Crazy
@Cuplex1
@Cuplex1 Ай бұрын
Anything new I haven't heard of? There was the mempool issue with Monero that is no longer an Issue. And with tor, compromised exit nodes. Which has been an issue for long and can be mitigated.
@bobbyrandomguy1489
@bobbyrandomguy1489 Ай бұрын
@@Cuplex1 The attack on xmr is now in its passive phase. If I remember correctly the decoy ring sig ratio went from 1:15 to about 1:5. Making statistical analysis much easier. It remains an issue and they are currently mounting a second attack on monero. With tor Im hearing people are having issues with middle and exit nodes. Not positive what the problem is there but reportedly there is a possibility of deanonymization. Sounds scary but I think its important we understand these issues and adapt to them. Not stop using the systems out of fear yknow. Theres a lot more info on certain forums. daunt and dot link and all that
@bobbyrandomguy1489
@bobbyrandomguy1489 Ай бұрын
@@Cuplex1 for some reason youtube likes to delete my replies. the attack on xmr is now in its passive phase. Its still an issue as the attacker made ring signatures remain and they are currently mounting a second phase of the attack. Just to make statistical analysis much easier. If I remember right the ring sig ratio went from like 1:15 to 1:5. Not great. Also heard people having issues with middle and exit nodes. Not positive what the problem is exactly but it said theres a possibility deanonymization. Theres a lot more info out there than I can give
@Slavolko
@Slavolko Ай бұрын
@@bobbyrandomguy1489 I wonder if it's a state-backed attack, considering the nature of XMR. Just a thought.
@Nico-eq3rf
@Nico-eq3rf Ай бұрын
I'm really happy that a based individual that actually has some good shit on yt got recognized so fast. Keep on doing the good work
@h.brickers1169
@h.brickers1169 Ай бұрын
Lololol bruh my whole cs program has been based around utilizing putty to connect to the schools student machine. Awesome hahahahahahahahab
@hashbrown777
@hashbrown777 Ай бұрын
They should really update their stuff :/ windows has openssh from MS themselves.. Putty hasnt been required since like win7?
@log13_88
@log13_88 Ай бұрын
rip
@DanielOnFire101
@DanielOnFire101 Ай бұрын
same here
@h.brickers1169
@h.brickers1169 Ай бұрын
@hashbrown777 you're right abt this I try and ssh with vscode but the school only has documentation on connections with putty and file transfers thru wincp
@h.brickers1169
@h.brickers1169 Ай бұрын
Or whatever they fuck the old school ssh file transfer thing is
@Laughingman9432
@Laughingman9432 20 күн бұрын
Outlaw has been such a good resource for me breaking into cyber security
@Br1ckInTh3W4LL
@Br1ckInTh3W4LL Ай бұрын
Return 4. Chosen by fair dice roll. Guaranteed to be random. - xkcd
@DarkLink606
@DarkLink606 Ай бұрын
Of course it's far too early for drawing conclusions, but NIST keys have been the subject of skepticism by cryptographers for quite some time, and this exploit was specific to NIST ECC curves (created by the US government) not Ed25519 or RSA...
@thewhitefalcon8539
@thewhitefalcon8539 Ай бұрын
This didn't involve any NIST keys and it was a bug in PuTTY. It could have been put there intentionally but it doesn't have anything to do with NIST keys.
@garfellini2557
@garfellini2557 Ай бұрын
@@thewhitefalcon8539 Don't bother. The comment section is being flooded by sockpuppet accounts.
@timewave02012
@timewave02012 Ай бұрын
DJ Bernstein has writeups on suspicious curves. E-521 isn't known or suspected vulnerable. Nonce reuse is a widely known vulnerability for all discrete log problem asymmetric crypto schemes, and has nothing to do with the underlying curve. Over 13 years ago, nonce reuse was how the PS3 was hacked. Deterministic nonce generation is ideal, but as with everything crypto, it's extremely sensitive to implementation vulnerabilities, which is where PuTTY failed.
@marcuskissinger3842
@marcuskissinger3842 Ай бұрын
Are you dumb
@varanjitsingh9663
@varanjitsingh9663 Ай бұрын
thanks for the save. I had a vulnerable version.
@akirastudios1406
@akirastudios1406 Ай бұрын
Love when I get notified for another banger video
@cyphersurf890
@cyphersurf890 Ай бұрын
very important stuff indeed. Mental Outlaw 1st man on deck!
@TechGorilla1987
@TechGorilla1987 Ай бұрын
Me about to check my version when a whole sting of words come out that probably indicate that I am not in the vulnerable group. I'll finish watching and finish dinner before I update.
@user-cz7py
@user-cz7py Ай бұрын
"I won't update just yet, but I'll just go ahead and announce my decision to not update to the public." =p
@iRunKids
@iRunKids Ай бұрын
Why are all these CVEs and RCEs coming out, you think some AI algo is finding them?
@amparorod2000
@amparorod2000 Ай бұрын
Thank you for your service 😆
@arbra5934
@arbra5934 Ай бұрын
Thank-you I was just using putty this morning...
@beskamir5977
@beskamir5977 Ай бұрын
What a wild month. Major vulnerabilities in almost everything.
@instructorbixby5719
@instructorbixby5719 Ай бұрын
April being a significant month for security vulnerabilities is not all that surprising when you look at all the macro forces at play. The majority of CVEs are discovered by consulting firms hired by organizations to perform security testing. Due to the budgetary schedule, security testing is normally performed at the end of a quarter. Q1 Jan-Mar, Q2 Apr-Jun, Q3 Jul-Sep, & Q4 Oct-Dec. Standard practice is to wait 90 days (1 Quarter) before disclosing a new vulnerability. Because of these two factors, the majority of CVEs will almost always be disclosed Mar-Apr, Jun-Jul, Sep-Oct, & Dec-Jan. Especially so for Mar-Apr & Dec-Jan as the beginning of the year sees the highest releases of new products and the end of the year has the highest spending to clear any surplus budget. Many of us are data scientists, I don't believe in coincidental trends. I would be interested to hear if anyone has any opposing opinions, this is mostly informed from my own experience in the industry.
@jamess1787
@jamess1787 Ай бұрын
I always knew there was a reason to stick with hash-like passwords....
@thewhitefalcon8539
@thewhitefalcon8539 Ай бұрын
Connect to the wrong server and the server knows your password
@cyphersurf890
@cyphersurf890 Ай бұрын
@@thewhitefalcon8539 Good thing he keeps his passwords unique and disposable right? :D
@dimitralex1892
@dimitralex1892 Ай бұрын
tbh there is no reason to use passwords. Far less secure, people use the same one everywhere and the main point: if a server is compromised your password is compromised, if you use asym encryption your private key is still safe with you.
@BanglaBitTheAi
@BanglaBitTheAi Ай бұрын
This year is wild
@Cuplex1
@Cuplex1 Ай бұрын
ECDSA an asymmetric cryptography algorithm I have always avoided because of security concerns. So no action needed. 🤓 EdDSA on the other hand is an Elliptic curve cryptography algorithm that I have used and are using. Much shorter keys than RSA 4096 and not potentially vulnerable to prime factorization using Shore's algorithm on potential future and practical quantum computers. Interesting video though! 👍
@darkman237
@darkman237 Ай бұрын
PHP had a venerability found as well!
@neptronix
@neptronix Ай бұрын
So glad i haven't been using ECDSA!
@ruchevsk3165
@ruchevsk3165 Ай бұрын
Your videos are addictive. I keep waiting for the new upload every single day.😂
@levvayner4509
@levvayner4509 Ай бұрын
I've never seen a 521 bit key, never even saw that as on option. I wonder if anyone is affected.
@ScriptureFirst
@ScriptureFirst Ай бұрын
Am watching ads for you Kenny 🎉
@sudoalex
@sudoalex Ай бұрын
Hi Kenny I love your videos
Ай бұрын
Wow, I thought this is just poor randomness. Cool vulnerability!
@andrewdunbar828
@andrewdunbar828 Ай бұрын
I started programming in 1979 and all the programming languages except assembly/machine code had random number functions and all the OSes have had random number APIs. But what does apply to "these days" is that the RNGs have been getting better and better and random number hardware has become more common since cryptography started getting more and more mainstream.
@chadyways8750
@chadyways8750 Ай бұрын
Well then... guess it's time to go back to banging rocks together, hope Grog doesn't steal my rock.
@dtibor5903
@dtibor5903 Ай бұрын
10-15 years ago there were wide open vulnerabilities on every software and nobody cared. Now every edgecase makes headlines.
@haythamkenway1561
@haythamkenway1561 Ай бұрын
tomorrow is the birthday of Austrian painter as well. can't wait to see what vulnerability will be discovered in Polish systems.
@wrathofainz
@wrathofainz Ай бұрын
I have had a lot of system updates this month
@imgladnotu9527
@imgladnotu9527 Ай бұрын
lol even tf2 wasnt safe this month, by doing some memory fudging you could upload a really large image onto a sign, photo badge, or badges, that nornally other clients wouldnt have to process, but are now forced to with this exploit, resulting in a texture OOM crash if you ever come into render distance of one of these signs
@log13_88
@log13_88 Ай бұрын
thats cool has it been patched?
@fixitman2174
@fixitman2174 Ай бұрын
I suppose I'm safe, since I only use PuTTY within my own network. I don't believe I'm using the exploitable key type anyhow. I'll update ASAP just to be safe though. Thanks for the heads-up.
@clxppy6971
@clxppy6971 Ай бұрын
Since the last weeks I only hear about vunerabilities what the ... is going on man
@szeptaczsprezarek
@szeptaczsprezarek Ай бұрын
Someone has to make an advent calendar with these. Every day IT admins and security specialists would open one and be like "Yaaaaay, this isn't our software!"
@dzuchun
@dzuchun Ай бұрын
wow double brimstone combination 😮
@c0d3warrior
@c0d3warrior Ай бұрын
Seems like some higher-ups finally understood just how dangerous software vulnerabilities are. But where one backdoor closes...
@TheOfficialOriginalChad
@TheOfficialOriginalChad Ай бұрын
Seriously though, I have NEVER seen an ECDSA PK used anywhere. Not to say someone out there doesn’t use one…but it’s definitely a fringe case.
@MrTubeBoi-jk2pv
@MrTubeBoi-jk2pv Ай бұрын
When do you drop your first DJ set?
@littlekato5825
@littlekato5825 Ай бұрын
I am currently studying cyber security but I do have a question. I’m not sure if it is silly but, How is it that these vulnerabilities are found? Are there people constantly hunting for vulnerabilities and bugs? Or are people exploiting these vulnerabilities which eventually raise alarms?
@mu11668B
@mu11668B Ай бұрын
I've been using built-in OpenSSH on Windows for years.
@jameskochie946
@jameskochie946 Ай бұрын
“wake up babe, Mental Outlaw just posted”
@M4DD4WG
@M4DD4WG Ай бұрын
very original, very cool
@dyanmill532
@dyanmill532 Ай бұрын
FUCK. I love your channel, especially the opsec stuff. But it makes me have to do all this extra stuff I never cared about before. As they say, ignorance is bliss XD
@immameme
@immameme Ай бұрын
Vulnerability and TechImma1st
@jsnotlout3312
@jsnotlout3312 Ай бұрын
yo what, Time to go check my stuff
@kwinzman
@kwinzman Ай бұрын
Does this also affect you if your key was stored in a Yubikey?
@teaandy369
@teaandy369 Ай бұрын
this is what i dreamed about whenever i roaming for pokemons
@eyephpmyadmin6988
@eyephpmyadmin6988 Ай бұрын
God im glad im not a security admin this month
@Ghostintheshell3551
@Ghostintheshell3551 Ай бұрын
King Puddy!
@MyHandleIsAplaceholder
@MyHandleIsAplaceholder Ай бұрын
Why did I think this was a video about Melee
@ernestoditerribile
@ernestoditerribile Ай бұрын
Luckily I always go directly to the different headless servers directly from the terminal of my MacBook or through Powershell, zsh or bash on Windows or Linux workstations. I really don't get why people still use putty while the ssh command is on any terminal.
@cyphersurf890
@cyphersurf890 Ай бұрын
that's kind of true... damn it IS true. You're absolutely right. I havn't seen PuTTY anywhere other than windows machines. Never saw it on Linux desktops, and NEVER saw it on Mac. I don't use Mac, but I know wat you're saying haha :) underrated comment
@karimcartelos5658
@karimcartelos5658 Ай бұрын
just as we taught cybersec is getting tighter these late years, this year comes with wild vulnerabilities and exploits !
@assmonkey9202
@assmonkey9202 Ай бұрын
Cyber sec is so un tight it’s not even funny
@Nik-rx9rj
@Nik-rx9rj Ай бұрын
They just keep coming OUT! What is happening
@jyudat4433
@jyudat4433 Ай бұрын
Good morning! 🙌😁
@chadwickemcphearson
@chadwickemcphearson Ай бұрын
Eliptic curve anything is vulnerable, right?
@iamlorddems3859
@iamlorddems3859 Ай бұрын
So is ai being used to discover vulnerabilities (and this is our first glimpse at the ai terror) or have things just been F'ed this month
@agg_ro
@agg_ro Ай бұрын
Windows Brothers use Powershell ssh
@bearwolffish
@bearwolffish Ай бұрын
Steady lads we only 4 months in.
@rekire___
@rekire___ Ай бұрын
Ahh yes it's all coming together
@Jp-ue8xz
@Jp-ue8xz Ай бұрын
I'm not entirely sure that having literally everyone just stick always to the "industry standard" is the best thing. If that were the case and a vulnerability were to be found in such industry standard method, that would mean *no one* would be safe and we would have little or no options to switch to asap 😐
@toxicwxste
@toxicwxste Ай бұрын
what about edcsa brainpool 521 curve???
@hvher
@hvher Ай бұрын
It actually is volnurability month
Ай бұрын
I used to use programs like PuTTY and WinSCP to transfer files, because they are well known and recommended everywhere. But at one point I thought: This is dumb. Why should I use a special file explorer just to access a different kind of file system? Now I only use software that acts as a filesystem driver and can mount directories to a drive letter. Thus, every other program on my system can access the files, not just one special program. It's a much more sensible approach in my view.
@AverageJoe46549
@AverageJoe46549 Ай бұрын
Does this go for PGP/GPG also?
@cyphersurf890
@cyphersurf890 Ай бұрын
what if dudes just use RSA with a VERY high number of bits?
@user-tp1jj9yx5o
@user-tp1jj9yx5o Ай бұрын
thats why i dont use private keys aka the honeypotkey
@darkman237
@darkman237 Ай бұрын
WINSCP just issued an update 6.3.3
@nicholaspetrunti
@nicholaspetrunti Ай бұрын
wow
@ArthurSchoppenweghauer
@ArthurSchoppenweghauer Ай бұрын
So many vulnerabilities, it's like the Bogdanoff twins are trolling us from beyond the grave.
@assmonkey9202
@assmonkey9202 Ай бұрын
Domp et
@H3cJP
@H3cJP Ай бұрын
the thing i dont get is, why would someone use putty instead of the 'ssh' cli tool?
@tonysolar284
@tonysolar284 Ай бұрын
😱
@tellmeagoodname8864
@tellmeagoodname8864 Ай бұрын
Normies might be screwed
@dimitralex1892
@dimitralex1892 Ай бұрын
i don't think normis use putty or even know you can use different algorithms...
@assmonkey9202
@assmonkey9202 Ай бұрын
@@dimitralex1892normgroids don’t know what an algorithm is
@user-eh8oo4uh8h
@user-eh8oo4uh8h Ай бұрын
Nonces means something else where I'm from.
@user-fp7fs9xl2t
@user-fp7fs9xl2t Ай бұрын
Like this kind of content ... 🎉
@NicholasMaietta
@NicholasMaietta Ай бұрын
At the beginning of your video, you showed a website that is not actually affiliated with the creator's website.
@realcartoongirl
@realcartoongirl Ай бұрын
there wont be any vulnerability if you dont notice it 💀
@vfeuer9236
@vfeuer9236 Ай бұрын
The KZbinr Pudi is way more random than the Putty algorithm haha
@ladvargleinad7566
@ladvargleinad7566 Ай бұрын
Did someone leak the source code for Pegasus?
@YouMe-mf7ed
@YouMe-mf7ed Ай бұрын
Bro I was gonna install putty for my raspberry pi. What should I use instead? I’m trying access it but don’t know what to do… 😢
@incandescentwithrage
@incandescentwithrage Ай бұрын
The new version of PuTTY
@bearcub125
@bearcub125 Ай бұрын
I love the videos man 👍
@seanmoran6683
@seanmoran6683 Ай бұрын
Ruh roh
@derram0k
@derram0k Ай бұрын
How the fuck does windows not have bundled ssh capabilities yet?
@Sypaka
@Sypaka Ай бұрын
It does. Only Client though - unless I miss the sshd somewhere.
Ай бұрын
​@@Sypaka You can activate OpenSSH server as an optional feature.
@RetroComputingwithMike
@RetroComputingwithMike Ай бұрын
Copying random code from the internet are worse than doing it yourself, the only real solution is to use a well maintained library, preferably one that gets updated automatically by the operating system.
@UNcommonSenseAUS
@UNcommonSenseAUS Ай бұрын
Whats that first line you typed ?
Hacking Windows Recall To See Everything
12:37
Mental Outlaw
Рет қаралды 142 М.
the new PS4 jailbreak is sort of hilarious
12:21
Low Level Learning
Рет қаралды 537 М.
КАКОЙ ВАШ ЛЮБИМЫЙ ЦВЕТ?😍 #game #shorts
00:17
Poopigirl
Рет қаралды 10 МЛН
Make me the happiest man on earth... 🎁🥹
00:34
A4
Рет қаралды 7 МЛН
AMD ZEN 6 - Next-gen Chiplets & Packaging
16:37
High Yield
Рет қаралды 174 М.
SuperTuxKart - 4 Minutes Of Nostalgia (Old SuperTuxKart)
4:03
researchers find unfixable bug in apple computers
8:32
Low Level Learning
Рет қаралды 696 М.
How not to Pirate: Malware in cracks on Github
8:08
The PC Security Channel
Рет қаралды 139 М.
Apple Updates iMessage with Post Quantum Encryption
14:53
Mental Outlaw
Рет қаралды 136 М.
SSH Keys
10:12
RobEdwards
Рет қаралды 98 М.
School Of Basics | What is SSH | How SSH works
10:43
Automation Step by Step
Рет қаралды 104 М.
i cant stop thinking about this exploit
8:40
Low Level Learning
Рет қаралды 337 М.
you need to learn Ansible RIGHT NOW!! (Linux Automation)
21:21
NetworkChuck
Рет қаралды 844 М.
iPhone 12 socket cleaning #fixit
0:30
Tamar DB (mt)
Рет қаралды 19 МЛН
ПК с Авито за 3000р
0:58
ЖЕЛЕЗНЫЙ КОРОЛЬ
Рет қаралды 1,8 МЛН
#miniphone
0:18
Miniphone
Рет қаралды 12 МЛН
What model of phone do you have?
0:16
Hassyl Joon
Рет қаралды 75 М.