Secure Shell SSH PORT 22 Penetration testing
Introduction: SSH (Secure Shell) is a network protocol that allows secure remote access to another computer over an unsecured network.
Think of it like a secure way to log into a remote machine and control it using a terminal — just like you're sitting in front of it.
What is SSH Used For?
- Remotely managing servers
- Transferring files securely (scp, sftp)
- Running remote commands
- Creating tunnels and proxies
- Securely accessing Git repositories (e.g., GitHub)
How Does It Work?
SSH uses public-key cryptography to establish a secure, encrypted connection.
It operates over TCP port 22 by default.
Once connected, you can execute commands as if you were on the remote machine.
Authentication Methods
Username + Password
SSH Key Pair (Public/Private Keys) – more secure!
Key Features
Feature Description
🔒 Encryption - All communication is encrypted
🗝️ Key-based Auth - More secure than passwords
📁 File Transfer - Tools like scp and sftp
🛡️ Tunneling - Forward ports securely (e.g., for DB access)
Reference - https://www.hackingarticles.in/ssh-penetration-testing-port-22/
my blog : https://scrollunlock.com/
#SSH #ssh #secureShell #linux #hacking #pentesting #oscp #scrollunlock