Listen

Description

Fingerprinting SSH Identification Strings

https://isc.sans.edu/diary/Fingerprinting%20SSH%20Identification%20Strings/30520

Google OAUTH2 Exploited by Malware

https://www.cloudsek.com/blog/compromising-google-accounts-malwares-exploiting-undocumented-oauth2-functionality-for-session-hijacking

TsuKing DNS Amplification

https://lixiang521.com/publication/ccs23/ccs23-xu-tsuking.pdf