Dangerous Settings
Despite the SSH protocol being one of the most secure protocols available today, some misconfigurations can still make the SSH server vulnerable to easy-to-execute attacks. Let us take a look at the following settings:
Setting | Description |
| Allows password-based authentication. |
| Allows the use of empty passwords. |
| Allows to log in as the root user. |
| Uses an outdated version of encryption. |
| Allows X11 forwarding for GUI applications. |
| Allows forwarding of TCP ports. |
| Allows tunneling. |
| Displays a specific banner when logging in. |
Last updated