Recently during an internal penetration test, I was performing ARP spoofing and i discovered a SSH connection from the administrator computer to another box.
That sounds like the correct way to access remote hosts securely. However, the problem was that the company was using a network switch that was vulnerable to ARP spoofing.
more here.........http://milo2012.wordpress.com/2014/11/12/automating-man-in-the-middle-sshv2-attacks/
That sounds like the correct way to access remote hosts securely. However, the problem was that the company was using a network switch that was vulnerable to ARP spoofing.
more here.........http://milo2012.wordpress.com/2014/11/12/automating-man-in-the-middle-sshv2-attacks/