K
K
KarolLun2017-05-25 13:22:18
SSH
KarolLun, 2017-05-25 13:22:18

How can an attacker use ssh by connecting to it?

If somehow an attacker has data for connecting to ssh, then what can he do there?
Can you recommend any literature on such post-exploitation for clarity?

Answer the question

In order to leave comments, you need to log in

3 answer(s)
A
Armenian Radio, 2017-05-25
@gbg

All. Including, take advantage of holes and elevate your privileges to superuser.

S
Saboteur, 2017-05-25
@saboteur_kiev

Specify what is the data for connecting to ssh?
Exploitation is actually the process of obtaining data or access, and if you already have access, then an attacker can do anything that you can do on your computer to which you have access.

A
Artem, 2017-05-26
@ulkoart

Maybe everything is enough rights, or a little more;)

Didn't find what you were looking for?

Ask your question

Ask a Question

731 491 924 answers to any question