Last updated 1 year ago
Test for vulnerabilities that could lead to MitM attacks, such as weak key exchange algorithms.
Attempt to intercept SSH traffic to gain unauthorized access or eavesdrop on connections.