This document summarizes various techniques for attacking SSH clients and servers by exploiting insecure configurations and options. It begins with an introduction explaining the goals of understanding practical attacks beyond typical secure configuration advice. It then covers attacks using X11 forwarding, disabling strict host key checking, agent forwarding, and stream local binding. Specific examples are provided for man-in-the-middle attacks using ARP spoofing, capturing credentials by impersonating SSH servers, and escalating privileges by reusing SSH agent sockets. The document aims to demonstrate real-world risks of deviating from default secure configurations.