关于
This skill provides a specialized methodology for security professionals to evaluate the robustness of SSH services. It guides users through the entire penetration testing lifecycle—from initial service discovery and banner grabbing to advanced techniques like SOCKS proxy pivoting, ProxyJump configurations, and automated brute-forcing using industry-standard tools like Hydra and Metasploit. Whether auditing internal configurations for weak ciphers or performing complex post-exploitation activities, this skill ensures a structured and thorough security review of SSH deployments.