>>Fabian+(OP)
Has anyone found which docs say how they attack SSH? The intro slides don't go into any detail. It could just be known SSH-1 vulnerabilities.
My overall impression is that this doesn't reveal any new attacks. They are most likely using known vulnerabilities. For example, they decrypt PSK IPSec by exploiting routers and getting the keys, not breaking the encryption.