UNCLASSIFIED

Skip to content
Snippets Groups Projects
Commit 7f1f1be3 authored by Preston Keel's avatar Preston Keel
Browse files

Resolve "Post Exploit slide rework"

parent 6c6b02f6
1 merge request!88Resolve "Post Exploit slide rework"
......@@ -131,6 +131,26 @@ netsh interface portproxy reset
image::slide_title_fade.png[background, size=100%]
== SSH Keys
* SSH keys are asymetric(public/private) key pairs that can be used to authenticate a user to a system in combination with or to replace the use of a password
* If you are able to find a users private ssh key it can potentially be used to gain access to other systems
{empty} +
.Using Stolen SSH Keys
* Bring private key to your own box
* On your box:
[source,bash]
----
chmod 600 /home/student/stolenkey
ssh -i /home/student/stolenkey jane@1.2.3.4
----
NOTE: ssh as the user who is the original key owner
image::slide_title_fade.png[background, size=100%]
== Control Sockets
Benefits Provided Include:
......@@ -298,4 +318,4 @@ image::slide_title_fade.png[background, size=100%]
== Questions?
image::slide_title_fade.png[background, size=100%]
\ No newline at end of file
image::slide_title_fade.png[background, size=100%]
0% or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment