SSH Penetration Testing

This skill should be used when the user asks to "pentest SSH services", "enumerate SSH configurations", "brute force SSH credentials", "exploit SSH vulnerabilities", "perform SSH tunneling", or "audit SSH security". It provides comprehensive SSH penetration testing methodologies and techniques.

Author

zebbern

Category

Other Tools

Install

Hot:13

Download and extract to your skills directory

Copy command and send to OpenClaw for auto-install:

Download and install this skill https://openskills.cc/api/download?slug=sickn33-skills-ssh-penetration-testing&locale=en&source=copy

SSH Penetration Testing Skills - A Complete SSH Service Security Assessment Plan

Skill Overview

SSH Penetration Testing is a professional security assessment skill for SSH services. It provides an end-to-end penetration testing methodology—from service discovery, enumeration, and configuration auditing to credential testing, exploitation, and tunnel forwarding—helping security professionals comprehensively identify SSH service security weaknesses.

Applicable Scenarios

  • Enterprise Security Audits - Perform comprehensive security checks on an organization’s internal SSH servers to identify risks such as weak configurations, default credentials, and known vulnerabilities, and produce professional security assessment reports.
  • Penetration Testing Projects - In authorized penetration testing engagements, perform vulnerability research, credential cracking, lateral movement, and post-exploitation actions against target SSH services.
  • Red Team Training & Drills - Use SSH tunneling techniques for internal network penetration, port forwarding, and data exfiltration to simulate real attack scenarios.
  • Core Capabilities

  • SSH Service Enumeration and Auditing

  • - Use Nmap to discover SSH services and identify versions
    - Use the ssh-audit tool to analyze encryption algorithms, key exchange, and configuration weaknesses
    - Detect weak encryption algorithms, deprecated protocol versions, and known CVEs

  • Credential Attacks and Key Testing

  • - Integrate Hydra and Medusa for username/password brute-force attacks
    - Support Password Spraying attack modes
    - Detect exposed SSH private keys and misconfigured key-based authentication

  • SSH Tunneling and Post-Exploitation

  • - Local port forwarding, remote port forwarding, and dynamic SOCKS proxying
    - Support ProxyJump jump-host chains
    - Integration with Metasploit SSH modules and Paramiko automation scripts

    Common Questions

    Is SSH penetration testing legal?

    SSH penetration testing must only be conducted with explicit written authorization. Unauthorised scanning, cracking, or attacking constitutes illegal intrusion. Legitimate use cases include enterprise internal security audits, authorized penetration testing projects, CTF competitions, and security research.

    How can I avoid being detected during SSH brute-force attacks?

    Modern SSH servers typically deploy Fail2ban or similar protection mechanisms. It is recommended to use slow brute forcing (low threads, delay settings), distributed attacks, or testing from authorized IP addresses. The testing methods provided by this skill are intended only for use in authorized environments.

    What is the role of SSH tunneling in penetration testing?

    SSH tunneling is an important technique for internal network penetration: local port forwarding can access internal services; remote port forwarding can establish reverse connections; and dynamic forwarding (SOCKS proxy) can relay network traffic. These techniques are commonly used to bypass firewall restrictions and enable lateral movement.