By comparison, with a prior TCP/IP level, such a | request would cause an FTP user to be prompted to supply a Read/Write (or | Multiple Read) password through use of the ACCT subcommand in order to | first gain
An at- tacker could exploit this through a man-in-the-middle attack. Another example would be the use of SSH. SSHv1 has known vulnerabilities. If the administrators decide to deploy SSH for the control of the remote in- frastructure devices, they should first decide if they should be ...