Compromise using SSH Key

The SSH key pair is used to authenticate the identity of a user or process that wants to access a remote system using the SSH protocol. The public key is used by both the user and the remote server to encrypt messages.

In TryHackMe: Overpass, we see that we have a private SSH key but it is password protected. So we can use "ssh2john" to convert it into a hash and crack it using john the ripper

Thereafter, we login using ssh -i id_rsa james@<ip> command

Last updated