| description | This guide covers best-practices for SSH scanning, understanding the different types of SSH scanning techniques, and how to securely use them in a penetration testing environment. |
|---|---|
| cover | ../.gitbook/assets/SSH Penetration Testing.png |
| coverY | 0 |
nmap -p22 <ip> --script ssh-auth-methods --script-args="ssh.user=root
nmap -p22 <ip> -sC
nmap -p22 <ip> -sV
auxiliary/scanner/ssh/ssh_version
msf auxiliary(ssh_version) > set rhosts 192.168.1.17
msf auxiliary(ssh_version) > set rport 22
msf auxiliary(ssh_version) > exploit
nmap -p22 <ip> --script ssh2-enum-algos
nmap -p22 <ip> --script ssh-hostkey --script-args ssh_hostkey=full
{% embed url="https://cli-ck.me/haiku" %}