SSH
Theory
The SSH protocol (Secure Shell) is used to login from one machine to another securely. It offers several options for strong authentication, as it protects the connections and communications security and integrity with strong encryption. This connection can be used for terminal access, file transfers, and for tunneling other applications.
Enumeration
Authentication type
It is possible to enumerate the allowed authentication types with the following command:
Banner Grabbing
Useful to get basic information about the SSH server such as its type and version.
Server's public SSH key
Weak Cipher Algorithms
Some auditing tools can help to quikly find the target version and which algorithms are available on the server in order to give recommendations to the customer.
SSH fuzzing
Attacks
Weak cryptographic keys
Authentication bruteforcing
User enumeration
Password Bruteforcing
Private key Bruteforcing
Resources
Last updated
Was this helpful?