Feb. 13, 2023, 9:43 p.m. | IppSec

IppSec www.youtube.com

00:00 - Intro
00:55- Generating our SSH Key and Base64 Decoding it
02:15 - Opening the SSH Key in Bless
03:45 - Showing information from the SSH RFC which will tell us what we are parsing
04:25 - Start of parsing the SSH Key
07:00 - Opening an Encrypted Key and showing the slight changes
10:15 - Back to the unencrypted SSH Key and showing the private key does contain the private key
12:10 - Extracting the Exponent and N …

back base64 decoding deep dive dive encrypted exploit information key keys parsing private key rfc screenshots ssh ssh keys start unencrypted

Social Engineer For Reverse Engineering Exploit Study

@ Independent study | Remote

SITEC- Systems Security Administrator- Camp HM Smith

@ Peraton | Camp H.M. Smith, HI, United States

Cyberspace Intelligence Analyst

@ Peraton | Fort Meade, MD, United States

General Manager, Cybersecurity, Google Public Sector

@ Google | Virginia, USA; United States

Cyber Security Advisor

@ H&M Group | Stockholm, Sweden

Engineering Team Manager – Security Controls

@ H&M Group | Stockholm, Sweden