Module 9: Linux Server Side Attacks
Credential Abuse
Suspicious Logins
kali@attacker01:~$ ssh-keygen -t Ed25519
Generating public/private Ed25519 key pair.
Enter file in which to save the key (/home/kali/.ssh/id_ed25519):
/home/kali/.ssh/id_ed25519 already exists.
Overwrite (y/n)? y
Enter passphrase (empty for no passphrase):
Enter same passphrase again:
Your identification has been saved in /home/kali/.ssh/id_ed25519
Your public-key has been saved in /home/kali/.ssh/id_ed25519.pub
The key fingerprint is:
SHA256:KoewUv5gG6ti0d2zouJ8a9s3C3VjKDIy0tiYqYqd4+A kali@kali
The key's randomart image is:
+--[ED25519 256]--+
| |
| |
| |
| B . |
|*o*o...oS+ |
|o+o+ooo+o . |
|+ B o.o o |
|*B.X.+.+ |
|BEX==.o.o |
+----[SHA256]-----+Extra Mile I
Password Brute Forcing
Extra Mile II
Web Application Attacks
Command Injection
Extra Mile II
SQL Injection
Extra Mile IV
Last updated