About
This skill provides a comprehensive framework for assessing the security posture of SSH services within a target environment. It guides users through the entire penetration testing lifecycle, including service enumeration, configuration auditing for weak encryption algorithms, brute-force credential attacks, and the exploitation of known vulnerabilities like CVE-2018-15473. Beyond initial access, it offers detailed methodologies for lateral movement using local, remote, and dynamic tunneling, as well as post-exploitation tasks such as privilege escalation and establishing persistence. It is an essential resource for security professionals and system administrators looking to harden their infrastructure using industry-standard tools like Nmap, Hydra, and Paramiko.