Ssh Penetration Testing
Automates SSH vulnerability scanning and penetration testing using advanced techniques to identify potential security weaknesses.
Install on your platform
We auto-selected Claude Code based on this skill’s supported platforms.
Run in terminal (recommended)
claude mcp add hainamchung-ssh-penetration-testing npx -- -y @trustedskills/hainamchung-ssh-penetration-testing
Or manually add to ~/.claude/settings.json
{
"mcpServers": {
"hainamchung-ssh-penetration-testing": {
"command": "npx",
"args": [
"-y",
"@trustedskills/hainamchung-ssh-penetration-testing"
]
}
}
}Requires Claude Code (claude CLI). Run claude --version to verify your install.
About This Skill
What it does
This skill performs SSH penetration testing, identifying vulnerabilities in systems accessible via SSH. It can enumerate potential usernames and passwords using various techniques, and attempt to gain unauthorized access. The tool is designed for security assessments and ethical hacking purposes, helping identify weaknesses before malicious actors exploit them.
When to use it
- Security Audits: Evaluate the security posture of servers or network devices by testing SSH configurations.
- Vulnerability Assessment: Identify weak credentials or misconfigurations that could lead to unauthorized access.
- Red Teaming Exercises: Simulate real-world attacks to test incident response capabilities and identify gaps in security controls.
- Penetration Testing Engagements: As part of a broader penetration testing scope, assess SSH server vulnerabilities.
Key capabilities
- Username enumeration
- Password guessing/brute force
- SSH configuration analysis
- Vulnerability identification
Example prompts
- "Can you test the SSH security of 192.168.1.10?"
- "Perform an SSH penetration test on example.com and report any vulnerabilities."
- "Attempt to brute force credentials against ssh server at 10.0.0.5"
Tips & gotchas
This skill requires a solid understanding of ethical hacking principles and legal boundaries. Ensure you have explicit permission before performing tests on systems you do not own or manage.
Tags
TrustedSkills Verification
Unlike other registries that point to live repositories, TrustedSkills pins every skill to a verified commit hash. This protects you from malicious updates — what you install today is exactly what was reviewed and verified.
Security Audits
| Gen Agent Trust Hub | Pass |
| Socket | Pass |
| Snyk | Pass |
🌐 Community
Passed automated security scans.