Deep Dive into Parsing SSH Keys To Exploit Improperly Sanitized Screenshots

00:00 - Intro
00:55- Generating our SSH Key and Base64 Decoding it
02:15 - Opening the SSH Key in Bless
03:45 - Showing information from the SSH RFC which will tell us what we are parsing
04:25 - Start of parsing the SSH Key
07:00 - Opening an Encrypted Key and showing the slight changes
10:15 - Back to the unencrypted SSH Key and showing the private key does contain the private key
12:10 - Extracting the Exponent and N our of the Public Key portion
14:30 - Start of Private Key Information in the Private Key
16:00 - Extracting the variables from the Private Key Field
18:15 - Extracting Q, which is the big prime that we used in Response to rebuild the key
19:00 - Showing the comment which contains the username and hostname of the person that generated the key
20:40 - Extracting E/N from the Public Key
23:00 - Extracting Q from the Private Key again and using RsaCtfTool to generate the key

Support the originator by clicking the read the rest link below.