This document discusses penetration testing of the Secure Shell (SSH) protocol. It covers the basics of SSH including how it provides a secure channel over unsecured networks as a replacement for insecure remote shell protocols. It then discusses various attacks that can be performed against SSH such as banner grabbing, brute forcing credentials, stealing PGP key pairs to set up backdoors, and using remote port forwarding to evade firewalls. The document also includes resources for further information on securing SSH and penetration testing techniques against it.