I read about a new tool called SSH-Snake, which looks for SSH private keys and remote SSH hosts on the current system and tries to see if the keys work on found remote systems by trying to SSH into them.
SSH-Snake is a powerful tool designed to perform automatic network traversal using SSH private keys discovered on systems, with the objective of creating a comprehensive map of a network and its dependencies, identifying to what extent a network can be compromised using SSH and SSH private keys starting from a particular system.
*** ****** ******* *** **** *** tool ** * ******* **** *** also **** ** *** **** ********* map ************* ******* ********* *******.
******** **** **** ** ******** *** hacking ********, ********* *** **** *** it ** ****** ********** ***** ************** and *******.
*****, ****** **** *******, * ******* this **** *** ******* ****** **** not-so-good ******.
**'* ********** ****-*********** *** ****-*********** -- and ********** ********. ** **** ****, SSH-Snake ** ******** *****: ** ********** ****** *** ******* itself **** *** ****** ** ******* as *** ** ** ***.
* ***** **** ****** ************ ******* SSH **** ** * ****** ** helpful *** ********* ****** *****, *** I **** **** ** *** **** purpose. *****, ** *** ****** ******** me ******* ***** ** ** ********** to ****** *** ****** ****** ** case ** ********** ** ***** ***** the ************ *** **** ******.
********?
*** *** **** ** *** *** will ***********. *** ***, ****** ******* will *** **** ***-********* *** *******.