#1
So when you use a (I am using proxychains dont freak out)

"sudo nmap -A (network)"

you're given ssh-hostkeys, these keys are just the fingerprints of the actual hostkeys. Theoretically I should be able to pull the full hostkey and run it against a program such as hydra and attempt to reverse hash the password? 

I do not know how to pull the full hostkey from the fingerprint nor how to exploit it if I am able to hash the password. 

I recognize these questions may seem silly to an experienced user. I am attempting to learn - any help will be appreciated, hate will be ignored