Loopus

Pro Content

This lesson requires Loopus Pro access. Upgrade to unlock all courses, labs, and challenges.

Network Penetration TestingSSH & Telnet Attacks

SSH Enumeration

20 min
lab
+50 XP

Learning Objectives

  • Enumerate SSH service information
  • Identify SSH misconfigurations
  • Gather intelligence from SSH banners

SSH Enumeration

SSH (Secure Shell) provides encrypted remote access to systems. During penetration tests, SSH services offer valuable reconnaissance opportunities and potential attack vectors.

SSH Service Detection

Basic SSH discovery and version detection uses Nmap with version detection flags. Detailed enumeration uses Nmap SSH scripts. Banner grabbing with netcat reveals version information.

Information from SSH Banners

SSH banners reveal valuable information including protocol version, implementation (OpenSSH), version number (potential CVE matches), and distribution/patch level.

Authentication Method Enumeration

Discover what authentication methods are accepted using Nmap ssh-auth-methods script or manual connection with verbose output. Common methods include password, publickey, keyboard-interactive, and gssapi-with-mic.

Host Key Analysis

SSH host keys can reveal system information. Key exchange algorithm enumeration identifies weak configurations. Weak algorithms indicate vulnerability: DSA keys, MD5 integrity, CBC mode ciphers, small Diffie-Hellman groups.

Known Vulnerabilities

Historical SSH vulnerabilities include CVE-2016-0777/8 (Roaming), CVE-2018-15473 (User enumeration), and CVE-2019-6111 (SCP client vulnerabilities).

Information for Attack Planning

Enumeration data guides next steps: Password auth enabled means brute force opportunity, old version means check for CVEs, key-only auth means need to find/steal keys.

Answer the Questions0 / 4 completed

📚 KnowledgeQuestion 1

What secures remote connection?

Format: ***(3 chars)
Exact match required
⌨️ Hands-OnQuestion 2

What port does SSH use?

Format: **(2 chars)
Exact match required
📚 KnowledgeQuestion 3

What exposes weak cryptography?

Format: **********(10 chars)
Exact match required
⌨️ Hands-OnQuestion 4

What script audits SSH?

Format: *********(9 chars)
Exact match required
Answer all questions correctly to unlock the next lesson

Interactive Sandbox

Loading sandbox...

Submit Flag

Found the flag? Submit it below to complete this lesson.
Format: LOOPUS{...}

Previous
Answer all questions to continue