22 - Pentesting SSH
Resources :
Secure Shell (SSH) enables two computers to establish an encrypted and direct connection within a possibly insecure network on the standard port TCP 22.
Default Configuration
Footprinting SSH
One of the tools we can use to fingerprint the SSH server is ssh-audit. It checks the client-side and server-side configuration and shows some general information and which encryption algorithms are still used by the client and server.
For potential brute-force attacks, we can specify the authentication method with the SSH client option PreferredAuthentications.
Nmap Scripts
Last updated