Acerca de
This skill provides a battle-tested framework for auditing and testing Secure Shell (SSH) services. It guides AI agents through the entire penetration testing lifecycle, from initial service discovery and banner grabbing to sophisticated configuration auditing using tools like ssh-audit. Users can leverage detailed methodologies for credential attacks with Hydra and Medusa, explore known CVEs, and implement complex network pivoting strategies through local, remote, and dynamic port forwarding. It is an essential toolkit for security researchers and system administrators aiming to harden remote access infrastructure or conduct authorized Red Team operations.