00 — Overview
SSH Attacks
SSH is on nearly every Linux server. Learn how attackers find it, brute-force it, steal keys, and exploit misconfigurations — and what defenders get wrong.
Intermediate·45 min·5 tasks
// By the end of this module
→Fingerprint SSH versions and identify vulnerable builds
→Bruteforce SSH credentials with Hydra using targeted username lists
→Find and use exposed SSH private keys, crack passphrases with ssh2john
→Identify dangerous sshd_config settings and abuse agent forwarding
// Prerequisites
Complete these before starting this module for the best experience.