SSH Penetration Testing
This skill should be used when the user asks to "pentest SSH services", "enumerate SSH configurations", "brute force SSH credentials", "exploit SSH vulnerabilities", "perform SSH tunneling", or "audit SSH security". It provides comprehensive SSH penetration testing methodologies and techniques.
Author
zebbern
Category
Other ToolsInstall
Download and extract to your skills directory
Copy command and send to OpenClaw for auto-install:
SSH Penetration Testing Skills - A Complete SSH Service Security Assessment Plan
Skill Overview
SSH Penetration Testing is a professional security assessment skill for SSH services. It provides an end-to-end penetration testing methodology—from service discovery, enumeration, and configuration auditing to credential testing, exploitation, and tunnel forwarding—helping security professionals comprehensively identify SSH service security weaknesses.
Applicable Scenarios
Core Capabilities
- Use Nmap to discover SSH services and identify versions
- Use the ssh-audit tool to analyze encryption algorithms, key exchange, and configuration weaknesses
- Detect weak encryption algorithms, deprecated protocol versions, and known CVEs
- Integrate Hydra and Medusa for username/password brute-force attacks
- Support Password Spraying attack modes
- Detect exposed SSH private keys and misconfigured key-based authentication
- Local port forwarding, remote port forwarding, and dynamic SOCKS proxying
- Support ProxyJump jump-host chains
- Integration with Metasploit SSH modules and Paramiko automation scripts
Common Questions
Is SSH penetration testing legal?
SSH penetration testing must only be conducted with explicit written authorization. Unauthorised scanning, cracking, or attacking constitutes illegal intrusion. Legitimate use cases include enterprise internal security audits, authorized penetration testing projects, CTF competitions, and security research.
How can I avoid being detected during SSH brute-force attacks?
Modern SSH servers typically deploy Fail2ban or similar protection mechanisms. It is recommended to use slow brute forcing (low threads, delay settings), distributed attacks, or testing from authorized IP addresses. The testing methods provided by this skill are intended only for use in authorized environments.
What is the role of SSH tunneling in penetration testing?
SSH tunneling is an important technique for internal network penetration: local port forwarding can access internal services; remote port forwarding can establish reverse connections; and dynamic forwarding (SOCKS proxy) can relay network traffic. These techniques are commonly used to bypass firewall restrictions and enable lateral movement.