PuTTY is a software tool for Windows which allows you to connect to a remote terminal using the SSH or Telnet protocols. It is most useful for connecting to Linux / Unix host.
Questions tagged [putty]
17 questions
48
votes
2 answers
What to do when using your private key from another computer?
I'm going to be connecting to one of my servers from my boss' computer (Win 10) using PuTTY. In order to do so, I'll be using my private key. Is there anything I should do before/after to prevent my key from being stolen?
My plan was:
Install…
sysfiend
- 2,364
- 4
- 14
- 22
7
votes
2 answers
Putty store cleartext credentials in the Windows Registry; isn't that a very insecure approach?
I have been astonished when I've found that one of the most popular SSH client Putty stores cleartext credentials in Windows Registry:
HKEY_CURRENT_USER\Software\SimonTatham\PuTTY\Sessions\
Passwords, or even ssh-key paths are disclosed, making it…
T.Todua
- 2,677
- 4
- 19
- 28
7
votes
3 answers
Is PuttyGen secure?
I'm using PuttyGen to generate ssh keys for various windows computers. It requires a lot of manual user input, specifically in the form of swirling the mouse around in the window pane. I understand this to be necessary because Windows either doesn't…
mas
- 297
- 2
- 9
4
votes
1 answer
Putty settings - Protocols and Algorithms to warn about
I specify "Putty" as otherwise I feel the question would be too broad.
What are the algorithm (as of March 2016) that one needs to be warned about (ie, those that no longer are considered safe enough) when logging on a ssh server...
For Putty, I…
Olivier Dulac
- 405
- 1
- 4
- 11
3
votes
1 answer
Crack Putty Private Key (PPK)
I found a private key which seems to be in the putty private key format.
The key has the following header:
---- BEGIN SSH2 ENCRYPTED PRIVATE KEY ----
Subject:
Comment:
P2/56wAAA/MAAAA3a...
...Yhp
---- END SSH2 ENCRYPTED…
Silver
- 1,824
- 11
- 23
3
votes
1 answer
Verifying SSH fingerprint of a public server
I have read somewhere that servers which have SSH access for users in the public can have their public key posted publicly (e.g., on a website), so that people who access such a server using SSH can use this key to verify the server's…
Minaj
- 1,536
- 2
- 14
- 23
2
votes
1 answer
Why is a password saved putty private key 48byte and a non password protected private key 36byte of length
I'm currently working on a library with secure authentication process. I wanted to support ppk file loading for ed25519 private keys. I used the original source code of putty to determine how the decoding of password protected files worked. I…
Richard Burkhardt
- 135
- 6
1
vote
1 answer
Do ssh logs (from plink) contain secret information?
I asked a question on superuser about plink rejecting server keys. Someone previously asked about logs. Does the output I get from plink -sshlog contain any secret information I should not be sharing? When I look at the file it looks like a packet…
kutschkem
- 666
- 5
- 11
1
vote
1 answer
Is it possible for ssh app on Android to collect my credentials?
I have a condition that I am far away from my laptop that I use to work. All I have is my Android Samsung J2. Sometimes I need to work remotely on my server, checking some stuff like traffic data, logs, and such.
I try using putty on my Android.…
gagantous
- 193
- 12
1
vote
0 answers
Are the interactive methods of credential gathering listed here actually secure, since they dont store the credentials on disk?
I found an article about different ways to collect and pass credentials in powershell. The author states that some of these methods are 100% secure (which is obviously an exaderation) but for purposes of running a short interactive powershell…
leeand00
- 1,297
- 1
- 13
- 21
1
vote
1 answer
Wireshark trafic from router
I have a very old router and in my routers admin page there is no option to write any commands or view traffic in any way, i tried using Putty to get inside it with port 22 and I get a connection with a command line but when I type the right…
John Bro Doe
- 11
- 2
1
vote
5 answers
Why forward a virtual machine with SSH to Putty
I have watched a tutorial from Udemy where a guy is show how to crack wireless network.
The person in the video set up a virtual machine Oracle VM VirtualBox
network type NAT
then he forward the Port for the Virtual machine with…
XsiSec
- 133
- 7
1
vote
2 answers
How do I encrypt a private key before sending it to another person?
I have a private key for SSL certificate that I need to send to another person to install it in their server. How do I encrypt it before sending? I use PuTTY. Can I simply load the raw key in PuTTY and then go to Conversions > Export OpenSSH key and…
user1448031
- 111
- 2
1
vote
0 answers
How does text that is displayed with cat end up trying to execute in the Linux terminal?
Sometimes you accidentally "cat" a binary... only for your terminal to become utterly corrupted, ending up in another code page where all characters are unrecognizable, while your shell spits back at you "Command not found" "Command not found" as if…
Dagelf
- 111
- 5
0
votes
1 answer
Need a test vector for the putty ssh-2 file mac validation
I'm trying to implement the putty file format in one of my dart packages. Implementing the actual key loading was ok, but I'm struggeling with the mac validation. I'm not shure what I'm doing wrong here
The putty code is quite clear about how to…
Richard Burkhardt
- 135
- 6