SSH Pentesting Notes
Protocol Overview
Basic Information
Protocol Versions
Initial Enumeration
Port Scanning
Banner Grabbing
Authentication Methods
Testing Different Auth Methods
Key-Based Authentication Check
Brute Force Attacks
Using Hydra
Using Medusa
Using Ncrack
Common NSE Scripts
SSH Auditing
Using SSH-Audit
File Operations
SCP (Secure Copy)
SFTP Operations
Configuration Files
Server Configuration
User Configuration
Common Vulnerabilities
Post Exploitation
Information Gathering
Privilege Escalation
Common SSH Response Codes
Message
Meaning
Best Practices for Pentesting
Common Dangerous Settings
Setting
Risk