aboutsummaryrefslogtreecommitdiffstats
path: root/ssh-for-hacking.html
blob: 01ed9dc0b9d6c3ed8ccb25c1aed46bf3d35be71f (plain)
1
2
3
<!DOCTYPE html><head><meta charset="utf-8" /><meta name="description" content="C.C.M. personal website" /><meta name="viewport" content="width=device-width, initial-scale=1" /><title>SSH for Hacking — C.C.M. Homepage</title><link rel="stylesheet" href="/css/default.css" /></head><body><header><div id="block"><p>+&gt;---------------------------&lt;+</p><p>[<a href="/about.html">About</a>]--[<a href="/research.html">Research</a>]--[<a href="/projects.html">Projects</a>]</p><p>+&gt;---------------------------&lt;+</p><br /></div></header><div id="block"><h1>SSH for Hacking</h1><div>February 18, 2024</div><div><h2>SSH usage with high level of security and obfuscation.</h2><h1>My first paper</h1><p>That's my first paper with [<a href="10.5281/zenodo.10676824">DOI</a>] and i talk some
about ssh for hacking.
<div style="text-align: center"><img src="/images/print.png" /></div></p><h1>Download</h1><h2>[<a href="/download/ssh.tex">TeX</a>] [<a href="/download/ssh.pdf">PDF</a>]</h2><h1>Mirrors:</h1><h2>[<a href="https://www.researchgate.net/publication/378301449_SSH_FOR_HACKING">Research Gate</a>]</h2><h2>[<a href="https://zenodo.org/records/10676824">Zenodo</a>]</h2></div></div><footer><div id="block"><br /><p>+&gt;---------------------------&lt;+</p><div>[<a href="https://github.com/cristiancmoises">GitHub</a>]--[<a href="https://www.linkedin.com/in/cristiancezarmoises">LinkedIn</a>]</div><div>[<a href="https://orcid.org/0000-0001-9533-4916">ORCID</a>]--[<a href="https://arxiv.org/search/?">ArXiv</a>]--[<a href="https://youtube.com/@securityops">Youtube</a>]</div><p>© 2024 Cristian Cezar Moises</p><p>[<a href="https://creativecommons.org/licenses/by-sa/4.0/">CC BY-SA 4.0</a>]</p><p>Built with [<a href="http://haunt.dthompson.us">Haunt</a>] in [<a href="https://www.gnu.org/software/guile/guile.html">Scheme</a>]</p><p>+&gt;---------------------------&lt;+</p></div></footer></body>