์Šคํ‚ฌ ssh-penetration-testing
๐Ÿ”’

ssh-penetration-testing

๋‚ฎ์€ ์œ„ํ—˜ โš™๏ธ ์™ธ๋ถ€ ๋ช…๋ น์–ด๐ŸŒ ๋„คํŠธ์›Œํฌ ์ ‘๊ทผ๐Ÿ“ ํŒŒ์ผ ์‹œ์Šคํ…œ ์•ก์„ธ์Šค

Test SSH Security with Professional Penetration Methods

Security professionals need comprehensive SSH assessment capabilities to identify vulnerabilities before attackers exploit them. This skill provides authorized penetration testing workflows for enumerating SSH configurations, testing credential strength, exploiting known vulnerabilities, and documenting tunneling techniques used in real-world attacks.

์ง€์›: Claude Codex Code(CC)
๐Ÿ“Š 69 ์ ์ ˆํ•จ
1

์Šคํ‚ฌ ZIP ๋‹ค์šด๋กœ๋“œ

2

Claude์—์„œ ์—…๋กœ๋“œ

์„ค์ • โ†’ ๊ธฐ๋Šฅ โ†’ ์Šคํ‚ฌ โ†’ ์Šคํ‚ฌ ์—…๋กœ๋“œ๋กœ ์ด๋™

3

ํ† ๊ธ€์„ ์ผœ๊ณ  ์‚ฌ์šฉ ์‹œ์ž‘

ํ…Œ์ŠคํŠธํ•ด ๋ณด๊ธฐ

"ssh-penetration-testing" ์‚ฌ์šฉ ์ค‘์ž…๋‹ˆ๋‹ค. Enumerate SSH services on 192.168.1.0/24 and identify weak configurations

์˜ˆ์ƒ ๊ฒฐ๊ณผ:

SSH service enumeration completed on 192.168.1.0/24. Found 3 SSH services: 192.168.1.10:22 (OpenSSH 8.4), 192.168.1.20:22 (OpenSSH 7.4), 192.168.1.30:2222 (OpenSSH 8.2). Weak configurations identified: diffie-hellman-group1-sha1 key exchange, arcfour cipher support on host 192.168.1.20. Recommendations: Upgrade OpenSSH on 192.168.1.20, disable weak algorithms, implement key-based authentication.

"ssh-penetration-testing" ์‚ฌ์šฉ ์ค‘์ž…๋‹ˆ๋‹ค. Test SSH credentials for admin user using Hydra with rockyou.txt

์˜ˆ์ƒ ๊ฒฐ๊ณผ:

Hydra SSH brute-force test completed for target 192.168.1.100, user: admin. Tested 14,344,321 passwords in 2 hours 15 minutes. No valid credentials found. Target appears to have strong password policy or rate limiting enabled. Recommendation: Verify account exists, consider key-based authentication testing, review authentication logs for lockout indicators.

"ssh-penetration-testing" ์‚ฌ์šฉ ์ค‘์ž…๋‹ˆ๋‹ค. Perform ssh-audit on 192.168.1.100 and provide hardening recommendations

์˜ˆ์ƒ ๊ฒฐ๊ณผ:

SSH audit completed for 192.168.1.100:22. Issues found: (1) Weak key exchange: diffie-hellman-group1-sha1, diffie-hellman-group14-sha1; (2) Weak ciphers: 3des-cbc, arcfour; (3) Weak MACs: hmac-md5, hmac-sha1-96; (4) RSA host key less than 2048 bits. Hardening recommendations: Add 'KexAlgorithms curve25519-sha256@libssh.org,diffie-hellman-group-exchange-sha256' to sshd_config; Set 'Ciphers aes256-gcm@openssh.com,chacha20-poly1305@openssh.com'; Remove 'MACs hmac-md5' line; Upgrade host key to 4096-bit RSA or Ed25519.

๋ณด์•ˆ ๊ฐ์‚ฌ

๋‚ฎ์€ ์œ„ํ—˜
v1 โ€ข 2/25/2026

This skill contains documentation and examples for authorized SSH penetration testing. All detected security patterns (external commands, network access, filesystem operations, Metasploit references) represent legitimate professional security tools and methodologies. The skill explicitly requires written authorization and is designed for security professionals conducting authorized assessments. Hardcoded IPs are private network examples (192.168.1.x), not actual targets. This is educational content for security testing, not executable attack code.

1
์Šค์บ”๋œ ํŒŒ์ผ
494
๋ถ„์„๋œ ์ค„ ์ˆ˜
8
๋ฐœ๊ฒฌ ์‚ฌํ•ญ
1
์ด ๊ฐ์‚ฌ ์ˆ˜
์ค‘๊ฐ„ ์œ„ํ—˜ ๋ฌธ์ œ (2)
Penetration Testing Tool Documentation
Skill documents professional penetration testing tools (Hydra, Medusa, Metasploit, Nmap). These are legitimate security assessment tools when used with authorization. All examples are educational documentation.
Network Pivoting and Tunneling Examples
Documents SSH tunneling techniques (local, remote, dynamic port forwarding, SOCKS proxy). These are standard network administration and authorized pentest techniques for accessing internal networks.
๋‚ฎ์€ ์œ„ํ—˜ ๋ฌธ์ œ (3)
Hardcoded Example IP Addresses
Uses private network IP ranges (192.168.1.x) for documentation examples. These are RFC 1918 private addresses, not public targets.
SSH Directory and Private Key References
References to ~/.ssh/, private keys, and SSH configuration files are standard reconnaissance activities during authorized security assessments. Skill includes legal authorization requirements.
Brute-Force Documentation
Documents credential testing techniques using Hydra and Medusa. Includes legal warnings and rate-limiting evasion techniques. Standard for authorized password security assessments.

์œ„ํ—˜ ์š”์ธ

โš™๏ธ ์™ธ๋ถ€ ๋ช…๋ น์–ด (5)
๐ŸŒ ๋„คํŠธ์›Œํฌ ์ ‘๊ทผ (3)
๐Ÿ“ ํŒŒ์ผ ์‹œ์Šคํ…œ ์•ก์„ธ์Šค (2)

๊ฐ์ง€๋œ ํŒจํ„ด

System Command Execution DocumentationPost-Exploitation Activity Documentation
๊ฐ์‚ฌ์ž: claude

ํ’ˆ์งˆ ์ ์ˆ˜

38
์•„ํ‚คํ…์ฒ˜
100
์œ ์ง€๋ณด์ˆ˜์„ฑ
87
์ฝ˜ํ…์ธ 
50
์ปค๋ฎค๋‹ˆํ‹ฐ
74
๋ณด์•ˆ
91
์‚ฌ์–‘ ์ค€์ˆ˜

๋งŒ๋“ค ์ˆ˜ ์žˆ๋Š” ๊ฒƒ

Authorized Security Assessment

Penetration testers conducting authorized SSH security assessments for organizations. Use this skill to systematically enumerate SSH services, test credential strength, identify vulnerabilities, and document findings for security reports.

Internal Security Audit

Security teams auditing internal SSH infrastructure for compliance and vulnerabilities. Use this skill to assess SSH configuration hardening, test authentication mechanisms, and verify security controls across the enterprise.

Security Research and Education

Security researchers and students learning SSH penetration testing methodologies in controlled lab environments. Use this skill to understand attack techniques, practice with professional tools, and develop defensive strategies.

์ด ํ”„๋กฌํ”„ํŠธ๋ฅผ ์‚ฌ์šฉํ•ด ๋ณด์„ธ์š”

Basic SSH Enumeration
Scan the network 192.168.1.0/24 for SSH services and enumerate their configurations. Identify versions, algorithms, and any weak configurations.
SSH Credential Testing
Test SSH credentials for user 'admin' on target 192.168.1.100 using the password list at /usr/share/wordlists/rockyou.txt with Hydra. Use rate limiting to avoid detection.
SSH Vulnerability Assessment
Perform a comprehensive SSH audit on target 192.168.1.100 using ssh-audit. Identify weak algorithms, deprecated ciphers, and known vulnerabilities. Provide hardening recommendations.
SSH Tunneling and Pivoting
Establish a SOCKS proxy through SSH at 192.168.1.100 and use it to scan the internal network 192.168.2.0/24. Document the tunneling setup and internal findings.

๋ชจ๋ฒ” ์‚ฌ๋ก€

  • Always obtain written authorization before conducting any SSH penetration testing activities
  • Use private network IP ranges (192.168.x.x, 10.x.x.x, 172.16-31.x.x) for documentation and testing examples
  • Implement rate limiting in credential testing to avoid account lockouts and intrusion detection triggers
  • Document all findings thoroughly including timestamps, tools used, commands executed, and results obtained

ํ”ผํ•˜๊ธฐ

  • Never run penetration testing tools against systems without explicit written permission from owners
  • Avoid using default wordlists without filtering - remove common false positives and inappropriate content
  • Do not bypass rate limiting or intrusion detection systems without authorization - this may constitute unauthorized access
  • Never store or transmit discovered credentials insecurely - use encrypted storage and secure communication channels

์ž์ฃผ ๋ฌป๋Š” ์งˆ๋ฌธ

Is this skill safe to use?
Yes, this skill is safe for authorized security testing. It contains documentation and examples for legitimate penetration testing methodologies. All activities require explicit written authorization from system owners. The skill uses private network IP ranges (192.168.1.x) for examples and includes legal disclaimers.
What tools do I need to use this skill?
Required tools include Nmap with SSH scripts, Hydra or Medusa for credential testing, ssh-audit for configuration analysis, Metasploit Framework, and Python with Paramiko library. These are standard penetration testing tools available in security distributions like Kali Linux.
Can I automate attacks with this skill?
No, this skill provides documentation and command examples, not automated attack code. All commands must be manually executed by authorized users. The skill requires human judgment and authorization for each testing phase.
Why does the skill reference Metasploit and brute-force tools?
Metasploit, Hydra, and similar tools are industry-standard frameworks for authorized security testing. Security professionals use these tools to identify vulnerabilities before malicious actors exploit them. The skill documents their legitimate use in authorized assessments.
What are the legal requirements for using this skill?
You must have explicit written authorization from system owners before conducting any testing. Unauthorized access to computer systems is illegal. Document all testing activities, stay within authorized scope, and follow responsible disclosure practices for any vulnerabilities found.
Can this skill bypass SSH security controls?
This skill documents testing methods for identifying weak SSH configurations and credentials. It cannot bypass properly implemented security controls like key-based authentication, two-factor authentication, or modern intrusion prevention systems. Its purpose is to help assess and improve security posture, not bypass controls.

๊ฐœ๋ฐœ์ž ์„ธ๋ถ€ ์ •๋ณด

์ž‘์„ฑ์ž

sickn33

๋ผ์ด์„ ์Šค

MIT

์ฐธ์กฐ

main

ํŒŒ์ผ ๊ตฌ์กฐ

๐Ÿ“„ SKILL.md