Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Pentesting ssh

175 views

Published on

Slides used for my presentation on pentesting SSH

Published in: Technology
  • Be the first to comment

Pentesting ssh

  1. 1. Pentesting
  2. 2. Boring stuffs • TCP-22 • a secure channel over an unsecured network • as a replacement for Telnet and for other unsecured remote shell protocols • Latest version:7.7 Released on: 2018/April/02
  3. 3. SSH Setup
  4. 4. SSH Attacks • Banner grabbing • Brute forcing SSH username/password pair • PGP key pair stealing and setting up a permanent backdoor • Evading Firewall with Remote port forwarding
  5. 5. SSH Cheat sheet
  6. 6. Demo
  7. 7. Resources • http://www.valencynetworks.com/articles/securing-ssh-service.html • http://www.hackingarticles.in/ssh-penetration-testing-port-22/ • https://www.pentestpartners.com/security-blog/how-to-abuse-ssh- keys/ • https://infosecaddicts.com/make-ssh-connection-get-secured/ • https://helpdeskgeek.com/how-to/tunnel-vnc-over-ssh/ • https://stribika.github.io/2015/01/04/secure-secure-shell.html

×