Home 0P3N Blog How To Succeed A Pentesting Using SSH Keys (RSA And DSA) Of The Target ???
Ready to Start Your Career?
Create Free Account
authors profile image
January 1, 2016

How To Succeed A Pentesting Using SSH Keys (RSA And DSA) Of The Target ???

January 1, 2016
authors profile image
January 1, 2016
Hello. I train to do a pentesting starting first with my scanner vulnerable web application installed locally (localhost). After scanned with NMAP, I notice a scan result that display "**ssh-hostkey (DSA)** and **(RSA)**" above: ```22/tcp open ssh OpenSSH 5.3 (protocol 2.0) | ssh-hostkey: | 1024 26:87:9b:.........48:7e:83 (DSA) |_ 2048 08:76:66.......95:59:92:d0 (RSA)``` **1 - So, how to continue my penetration test using those keys (DSA) and (RSA) provided by NMAP on my target ??? 2 - How to successfully access the Shell of my target (localhost) using Metasploit and SSH port 22 which is open ???**Thank you to explain.Hello. I train to do a pentesting starting first with my scanner vulnerable web application installed locally (localhost). After scanned with NMAP, I notice a scan result that display "**ssh-hostkey (DSA) and (RSA)**" above: ```22/tcp open ssh OpenSSH 5.3 (protocol 2.0) | ssh-hostkey: | 1024 26:87:9b:.........48:7e:83 (DSA) |_ 2048 08:76:66.......95:59:92:d0 (RSA)``` **1 - So I'd like your help, how to continue my penetration test by serving me those keys (DSA) and (RSA) provided by NMAP on my target ??? 2 - How to successfully access the Shell my target (localhost) using Metasploit and SSH port 22 which is open ???**Thank you to explain.Hello. I train to do a pentesting starting first with my scanner vulnerable web application installed locally (localhost). After scanned with NMAP, I notice a scan result that display "**ssh-hostkey (DSA) and (RSA)**" above: ```22/tcp open ssh OpenSSH 5.3 (protocol 2.0) | ssh-hostkey: | 1024 26:87:9b:.........48:7e:83 (DSA) |_ 2048 08:76:66.......95:59:92:d0 (RSA)``` **1 - So, how to continue my penetration test using those keys (DSA) and (RSA) provided by NMAP on my target ??? 2 - How to successfully access the Shell of my target (localhost) using Metasploit and SSH port 22 which is open ???**Thank you to explain.Hello. I train to do a pentesting starting first with my scanner vulnerable web application installed locally (localhost). After scanned with NMAP, I notice a scan result that display "**ssh-hostkey (DSA)** and **(RSA)**" above: ```22/tcp open ssh OpenSSH 5.3 (protocol 2.0) | ssh-hostkey: | 1024 26:87:9b:.........48:7e:83 (DSA) |_ 2048 08:76:66.......95:59:92:d0 (RSA)``` **1 - So, how to continue my penetration test using those keys (DSA) and (RSA) provided by NMAP on my target ??? 2 - How to successfully access the Shell of my target (localhost) using Metasploit and SSH port 22 which is open ???**Thank you to explain.You can't. All it's telling you is what kind of host keys the system has. It's sort of like knowing they have Schlage lock on their front door. Nice to know but doesn't help you break into the house.
Schedule Demo

Build your Cybersecurity or IT Career

Accelerate in your role, earn new certifications, and develop cutting-edge skills using the fastest growing catalog in the industry