OP 13 April, 2021 - 09:23 PM
So when you use a (I am using proxychains dont freak out)
"sudo nmap -A (network)"
you're given ssh-hostkeys, these keys are just the fingerprints of the actual hostkeys. Theoretically I should be able to pull the full hostkey and run it against a program such as hydra and attempt to reverse hash the password?
I do not know how to pull the full hostkey from the fingerprint nor how to exploit it if I am able to hash the password.
I recognize these questions may seem silly to an experienced user. I am attempting to learn - any help will be appreciated, hate will be ignored
"sudo nmap -A (network)"
you're given ssh-hostkeys, these keys are just the fingerprints of the actual hostkeys. Theoretically I should be able to pull the full hostkey and run it against a program such as hydra and attempt to reverse hash the password?
I do not know how to pull the full hostkey from the fingerprint nor how to exploit it if I am able to hash the password.
I recognize these questions may seem silly to an experienced user. I am attempting to learn - any help will be appreciated, hate will be ignored