© 2018 IEEE. This research presents a penetration testing approach to help secure OpenSSH service on Raspberry Pi 2. The study discusses a technique for penetrating Debian v7.1p2, installed on Raspberry Pi 2, using Kali Linux. We exploit the vulnerability found in SSH protocol exchange keys, which causes multiple CRLF injections in Raspberry Pi 2 Model B, allowing remote authenticated users to bypass intended shell-command restrictions via well crafted X11 data forwarding. We propose an innovative security model to solve the issues of allowing remote authentication access using SSH protocol exchange keys without affecting the encrypted protocols transmissions. We conclude with recommendations on how to securely mitigate MITM attacks using o...
Copyright © 2018 Inderscience Enterprises Ltd. Mobile ad hoc networks (MANETs) are infrastructureles...
© 2020 Like any emerging and disruptive technology, multiple obstacles are slowing down the Internet...
© IFIP International Federation for Information Processing 2019. Internet of Things (IoT) products b...
EMV (Europay MasterCard Visa) is the protocol implement-ed to secure the communication between a cli...
© 2018 IEEE. In the current age of digitalization, the increasing rate of cybercrimes has become a g...
Internet‐of‐Thing (IoT) is a rapid‐emerging technology that exploits the concept of internetwork to ...
© 2018 IEEE. This research aims to identify some vulnerabilities of advanced persistent threat (APT)...
© 2020, Institut Mines-Télécom and Springer Nature Switzerland AG. EMV is the protocol implemented t...
© 2016 Global IT Research Institute (GiRI). Business enterprises are competing to get their applicat...
© 2016 IEEE. Any information system using encryption tends to have its own key management infrastruc...
These days, almost everyone has been entirely relying on mobile devices and mobile related applicati...
The Internet of Things (IoT), which has accelerated the digital transformation technology revolution...
© 2019 IEEE. Secure communication is a necessity that must be considered in any smart application to...
Over the past few years, Internet-enabled business, or e-business, has drastically improved efficien...
© 2016 IEEE. Internet of things (IoT) or Web of Things (WoT) is a wireless network between smart pro...
Copyright © 2018 Inderscience Enterprises Ltd. Mobile ad hoc networks (MANETs) are infrastructureles...
© 2020 Like any emerging and disruptive technology, multiple obstacles are slowing down the Internet...
© IFIP International Federation for Information Processing 2019. Internet of Things (IoT) products b...
EMV (Europay MasterCard Visa) is the protocol implement-ed to secure the communication between a cli...
© 2018 IEEE. In the current age of digitalization, the increasing rate of cybercrimes has become a g...
Internet‐of‐Thing (IoT) is a rapid‐emerging technology that exploits the concept of internetwork to ...
© 2018 IEEE. This research aims to identify some vulnerabilities of advanced persistent threat (APT)...
© 2020, Institut Mines-Télécom and Springer Nature Switzerland AG. EMV is the protocol implemented t...
© 2016 Global IT Research Institute (GiRI). Business enterprises are competing to get their applicat...
© 2016 IEEE. Any information system using encryption tends to have its own key management infrastruc...
These days, almost everyone has been entirely relying on mobile devices and mobile related applicati...
The Internet of Things (IoT), which has accelerated the digital transformation technology revolution...
© 2019 IEEE. Secure communication is a necessity that must be considered in any smart application to...
Over the past few years, Internet-enabled business, or e-business, has drastically improved efficien...
© 2016 IEEE. Internet of things (IoT) or Web of Things (WoT) is a wireless network between smart pro...
Copyright © 2018 Inderscience Enterprises Ltd. Mobile ad hoc networks (MANETs) are infrastructureles...
© 2020 Like any emerging and disruptive technology, multiple obstacles are slowing down the Internet...
© IFIP International Federation for Information Processing 2019. Internet of Things (IoT) products b...