Bypassing OpenSSH’s 6‑Try Limit: How Attackers Can Get 10,000 Password Attempts

OpenSSH’s default six‑attempt password limit can be circumvented using the KingCope tool, allowing attackers to script up to ten thousand login attempts, which dramatically raises the risk of successful brute‑force attacks despite existing mitigation measures.

MaGe Linux Operations
MaGe Linux Operations
MaGe Linux Operations
Bypassing OpenSSH’s 6‑Try Limit: How Attackers Can Get 10,000 Password Attempts

Only six password attempts are allowed by default in OpenSSH; what if an attacker could make ten thousand attempts?

OpenSSH contains a vulnerability that lets attackers bypass the single‑login password‑attempt limit.

Normally, after six incorrect passwords the server imposes a two‑minute grace period before the connection is closed, preventing rapid brute‑force attacks. However, this defense can be easily evaded.

A hacker using the KingCope tool claims OpenSSH can be controlled and modified so that the maximum number of password attempts can be set arbitrarily.

This means an attacker can write a script to perform thousands of password attempts without any server‑side restriction, turning the vulnerability into a serious threat where any password can eventually be guessed.

KingCope’s proof‑of‑concept exploit is a simple parameter‑passing command that looks more like a special feature than a bug:

ssh -lusername -oKbdInteractiveDevices=`perl -e 'print "pam," x 10000'` targethost

In a recent email, KingCope fully disclosed the flaw, stating that the method allows up to ten thousand password attempts within a single login session.

He added that if an attacker sends ten thousand interactive requests to a keyboard‑interactive device, OpenSSH will process them in a loop until the device’s internal limit is reached.

The latest OpenSSH versions still contain this issue, but programs and devices that use key‑based authentication are not affected because the bug only impacts keyboard‑interactive password entry. Administrators using fail2ban or pam‑shield can detect failed login events and block offending IPs. Reducing the grace period to 20 or 30 seconds also mitigates the risk.

This article is translated from 360 Security Broadcast; please credit the source when republishing.

Original article: http://www.theregister.co.uk/2015/07/23/openssh_brute_force_bug/

Original Source

Signed-in readers can open the original source through BestHub's protected redirect.

Sign in to view source
Republication Notice

This article has been distilled and summarized from source material, then republished for learning and reference. If you believe it infringes your rights, please contactadmin@besthub.devand we will review it promptly.

OpenSSHbrute forceSecurity VulnerabilityKingCopepassword attempts
MaGe Linux Operations
Written by

MaGe Linux Operations

Founded in 2009, MaGe Education is a top Chinese high‑end IT training brand. Its graduates earn 12K+ RMB salaries, and the school has trained tens of thousands of students. It offers high‑pay courses in Linux cloud operations, Python full‑stack, automation, data analysis, AI, and Go high‑concurrency architecture. Thanks to quality courses and a solid reputation, it has talent partnerships with numerous internet firms.

0 followers
Reader feedback

How this landed with the community

Sign in to like

Rate this article

Was this worth your time?

Sign in to rate
Discussion

0 Comments

Thoughtful readers leave field notes, pushback, and hard-won operational detail here.