The left side of the screen shows the attacker and the right side shows the victim. Victim starts SSH session. The attacker measures ring buffer activity and sets a profile. Victim starts typing The ...