This skill should be used when the user asks to "pentest SSH services", "enumerate SSH configurations", "brute force SSH credentials", "exploit SSH vulnerabilities", "perform SSH tunneling", or "audit SSH security". It provides comprehensive SSH penetration testing methodologies and techniques.
8.7
Rating
0
Installs
Security
Category
Excellent SSH penetration testing skill with comprehensive coverage of enumeration, credential attacks, vulnerability exploitation, tunneling, and post-exploitation. The description clearly identifies use cases (pentest, enumerate, brute force, exploit, tunneling, audit). Task knowledge is outstanding with detailed commands, code examples, and a complete 10-phase methodology covering discovery through Metasploit modules. Structure is clear with logical progression, quick reference tables, and troubleshooting sections. Novelty is strong as SSH pentesting requires specialized knowledge of protocols, tools (Hydra, Medusa, ssh-audit, Paramiko), exploitation techniques, and complex tunneling scenarios that would consume many CLI agent tokens. Minor improvement could be splitting some phases into separate files for very large deployments, but current structure is well-organized and not cluttered. This skill meaningfully reduces token cost and provides expert-level penetration testing guidance.
Loading SKILL.md…