Log back into the target system and trigger the password and connection reset
Connect to the target using the downloaded private key
Reveal Flag: 🚩
689227a4f1b97afe1ff5ebaf85babc19
📌 Instead of using a user's private key, typically the attacker generates an SSH key pair on his system, keeps the private key on his system, transfers the public key onto the target system user's home .ssh directory and adds it in the authorized_keys file.