Yes, or SSH keys or any other means of user authentication. The cool thing in this technique is that it’s twofold and you (as an attacker) can cherry-pick the info given. If you walk up locally to someone’s running system, you could skip the first half and go with the ‘hey, can you resize this XFS image for me’ bit.
Yes, or SSH keys or any other means of user authentication. The cool thing in this technique is that it’s twofold and you (as an attacker) can cherry-pick the info given. If you walk up locally to someone’s running system, you could skip the first half and go with the ‘hey, can you resize this XFS image for me’ bit.