22 - SSH

Usage

ssh user1@10.10.10.10 -p 2222 'ls /home/user1/'

Auth Methods

Supported authentication methods.

nmap -p22 -script=ssh-auth-methods <IP>

Audit

$ ssh-audit 192.168.0.24
# general
(gen) banner: SSH-1.99-OpenSSH_2.9p2
(gen) protocol SSH1 enabled
(gen) software: OpenSSH 2.9p2
(gen) compatibility: OpenSSH 2.5.0-6.6, Dropbear SSH 0.47-0.52
(gen) compression: enabled (zlib)

<SNIP>

Brute Force

PPK to PEM

Convert a Putty user key file (.ppk) to an SSH .pem file.

For an example of the above process check Keeper.

Private Keys

Key Types

SSH supports multiple key types, each with a default filename, thus, when trying to exfiltrate one don't just search for id_rsa!

Key Type
Private Key File
Public Key File

RSA

~/.ssh/id_rsa

~/.ssh/id_rsa.pub

ECDSA

~/.ssh/id_ecdsa

~/.ssh/id_ecdsa.pub

ED25519

~/.ssh/id_ed25519

~/.ssh/id_ed25519.pub

DSA (old)

~/.ssh/id_dsa

~/.ssh/id_dsa.pub

  • ECDSA and ED25519 are newer and generally faster/smaller than RSA.

  • ED25519 is currently the recommended default for many systems (ssh-keygen defaults to it now).

  • RSA is still widely supported, but 4096-bit keys are preferred now due to security standards.

Last updated

Was this helpful?