SSH vulnerabilities (cont.) Echo processing easily discriminates password entry Inter-packet timing and packet sizes allow for inference of keystrokes and commands Discovery of password length narrows search space for dictionary attack