The OpenSSH project is a widely available tool for| re.factorcode.org
I did not find a clear modern description of this set-up so have written this post to help others. S...| DEV Community
Reference syntax for the tailnet policy file.| Tailscale
Many people use some form of manual fumbling configuration management to create or manage content of remote machines’ ~/.ssh/authorized_keys files, and whether it’s the likes of Chef, Puppet, Ansib...| jpmens.net
Use Tailscale SSH to manage the authentication and authorization of SSH connections in your tailnet.| Tailscale
CozyHosting is a web hosting company with a website running on Java Spring Boot. I’ll find a Spring Boot Actuator path that leaks the session id of a logged in user, and use that to get access to the site. Once there, I’ll find command injection in a admin feature to get a foothold. I’ll pull database creds from the Java Jar file and use them to get the admin’s hash on the website from Postgres, which is also the user’s password on the box. From there, I’ll abuse sudo ssh with the...| 0xdf hacks stuff
I won't go into specific cases in this blog post. This is a general guide on how to gather the necessary information that will help you to get your problem fixed. In this post, I'll use a Linux client| ITTavern.com
Summary| Vin01’s Blog
Abusing ssh_config's ProxyCommand| jonwillia.ms