As we know ,the OpenSSH prior 3.4 have a vul for remote attacker to get a shell.But where would i go to find the exploiting program?Thanks.