Compromise using SSH Key
Last updated
Last updated
The SSH key pair is used to authenticate the identity of a user or process that wants to access a remote system using the SSH protocol. The public key is used by both the user and the remote server to encrypt messages.
In TryHackMe: Overpass, we see that we have a private SSH key but it is password protected. So we can use "ssh2john" to convert it into a hash and crack it using john the ripper
Thereafter, we login using ssh -i id_rsa james@<ip> command