https://www.exploitone.com/cyber-security/hacking-ssh-connections-by-exploiting-ssh-protocol-vulnerabilities-different-terrapin-attack-vectors/
Hacking SSH Connections by exploiting SSH Protocol Vulnerabilities: Different Terrapin Attack Vectors