File tree Expand file tree Collapse file tree 1 file changed +3
-2
lines changed
documentation/modules/exploit/linux/http Expand file tree Collapse file tree 1 file changed +3
-2
lines changed Original file line number Diff line number Diff line change @@ -57,7 +57,7 @@ This option is required and is the SSH port (default: 22) to establish a SSH ses
57
57
This option is optional and allows the use of your own SSH private key file in PEM format.
58
58
Generate your SSH private key with following command ` ssh-keygen -t rsa -b 2048 -m PEM -f <your_priv_key> ` or
59
59
convert your existing SSH private key to PEM format with ` ssh-keygen -p -N "" -m PEM -f /path/to/existing/private/key `
60
- If no key is provided, a private SSH key will be generated.
60
+ If no key is provided, a SSH private key will be generated for you .
61
61
62
62
## Scenarios
63
63
``` msf
@@ -242,4 +242,5 @@ ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCauf4JO4xGHWulsoHHOwTXztTvJ4FQz92RTicFIqqH
242
242
```
243
243
244
244
## Limitations
245
- No limitations.
245
+ When using your own SSH private key, be aware of the fact that you can not upload the same SSH public key twice via Acronis Web Portal.
246
+ Duplicate SSH public keys are not allowed and the exploit will fail if this occurs.
You can’t perform that action at this time.
0 commit comments