RSA
If we have a permission in rsa authorized keys in victim's machine we can input our own ssh public key
Tryhackme - Linux File System Analysis
Last updated
If we have a permission in rsa authorized keys in victim's machine we can input our own ssh public key
Tryhackme - Linux File System Analysis
Last updated