![]() Let's see connections to this process id. Srwxr-xr-x 1 bastion bastion 0 Sep 7 17:35 agent.10507 Let's open the temporary file tmp]# cd ssh-mKX88v0Vlo]# ll In /tmp directory you may see something like that: tmp]# llĭrwx- 2 bastion bastion 4096 Sep 7 17:35 ssh-mKX88v0Vlo How to hack servers if you compromised bastion host? Track Target But do you really want to the risk when you have other options like Prox圜ommand? Hence, just use Prox圜ommand! I know the window of compromise is very small because it depends on how much time you are connected to the bastion host. As a result, all your server can be accessed. Imagine that your bastion server is compromised, If someone has sufficient permissions on your Linux server he/she will just use your socket info. It means that the socket will be set up so that someone may use this socket data to access your servers.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |