Restoring secure SSH access, repairing user permissions, and enforcing least‑privilege principles during a controlled system recovery.
This project demonstrates hands‑on experience recovering a Linux system after access failure caused by broken SSH key configurations and misaligned user permissions. The focus was on restoring secure authentication, enforcing least‑privilege access, and ensuring operational safety throughout the recovery workflow.
~/.ssh directories.
authorized_keys, validated sshd_config, and tested authentication using non‑privileged accounts.
"Recovery isn’t luck — it’s understanding how a system fails and bringing it back safely."