Home SSH Pentesting
Post
Cancel

SSH Pentesting

SSH

SSH stands for Secure Shell or Secure Socket Shell, is a protocol for secure remote login from one computer to another.It provides users with a secure way to access and manage a computer over an unsecured network.

Technigues

These are techniques that can be used to leverage ssh protocol during pentesting.

  • Enumeration
  • Bruteforce
  • Pivoting
  • Persistence
  • Exfiltration

Enumeration

Enumeration: Is a technigue of discovering potential attack vectors in a target system.

Bruteforce

Bruteforce: A brute force attack is a technigue that uses trial-and-error to guess login credentials.

Pivoting

Pivoting: Is a technique of routing network traffic from a compromised system to another system or networks. Is a technigue that adversary uses to move from one compromised system to another system or to access resources(networks, ports, etc..) that are not accessible.

Persistence

Persistence: Is a technigue that allows adversary to maintain access to a compromised system for a period of time.

Exfiltration

Exfiltration: Is a technigue of removing/transfering data from a compromsied system.

References

This post is licensed under CC BY 4.0 by the author.