How to Locate & Exploit Devices Vulnerable to the Libssh Security Flaw

Computers all over the world rely on a program called “libssh" to use the SSH communications protocol, which allows trusted users to log in and administer computers remotely. Due to a flaw in libssh, fooling a computer into granting SSH access is as easy as telling it you already have permission. The vulnerability can lead to an attacker gaining complete control over a device.
What SSH Is & Why We Have a Big Problem
Computers underpin many of the essential systems in our society, and these systems need to be periodically accessed and updated. For network admins and other IT professionals… more

Link: https://null-byte.wonderhowto.com/how-to/locate-exploit-devices-vulnerable-libssh-security-flaw-0189883/