SSH Penetration Testing
Installation
SKILL.md
SSH Penetration Testing
Purpose
Conduct comprehensive SSH security assessments including enumeration, credential attacks, vulnerability exploitation, tunneling techniques, and post-exploitation activities. This skill covers the complete methodology for testing SSH service security.
Prerequisites
🧠 Knowledge Modules (Fractal Skills)
1. Required Tools
2. Required Knowledge
3. Phase 1: SSH Service Discovery
4. Phase 2: SSH Enumeration
5. Phase 3: SSH Configuration Auditing
6. Phase 4: Credential Attacks
7. Phase 5: Key-Based Authentication Testing
8. Phase 6: Vulnerability Exploitation
9. Phase 7: SSH Tunneling and Port Forwarding
10. Phase 8: Post-Exploitation
11. Phase 9: Custom SSH Scripts with Paramiko
12. Phase 10: Metasploit SSH Modules
13. SSH Enumeration Commands
14. Brute-Force Options
15. Port Forwarding Types
16. Common SSH Ports
17. Legal Considerations
18. Technical Limitations
19. Evasion Techniques
Related skills
More from dokhacgiakhoa/antigravity-ide
ui-ux-pro-max-skill
Premium design and micro-interactions toolkit.
89notion-mcp
Official Notion Model Context Protocol Server for workspace interaction.
33filesystem-mcp
Official Filesystem Model Context Protocol Server for local file operations.
24puppeteer-mcp
Official Puppeteer Model Context Protocol Server for browser automation.
15postgres-mcp
Official PostgreSQL Model Context Protocol Server for database interaction.
14penetration-tester-master
Ultimate Offensive Security Master Skill.
13