Linux Privilege Escalation – Exploiting Misconfigured SSH Keys
Introduction
Secure Shell (SSH) is a cryptographic network protocol which allows users to securely perform a number of network services, such as remote authentication or file transfer, over an unsecured network. SSH keys provide a more secure way of logging into a server through SSH than via a password authentication.
If improperly configured, SSH keys could allow an attacker to authenticate as another user to escalate privilege, potentially even as root.
Read more