TCP 22: SSH
Secure Shell is a cryptographic network protocol for operating network services securely over an unsecured network. Typical applications include remote command-line, login, and remote command execution, but any network service can be secured with SSH.
-- Wikipedia
Basic commands
Authenticate with key file
Generate key (to file)
Conventions
Naming
Default key: id_rsa
User key: <user>_key
SSH package version
SSH key fingerprint
Now what happens if you see multiple SSH services on different ports which have the same key? What could it mean if they are different? Why would you see the same key on another box? All questions to think about... As this is not the case here, we will not answer that (cough but it is in the labs cough). On this subject: A useful resource ~ https://github.com/rapid7/ssh-badkeys
SSH banner
But we DO get a password prompt, so the machine may accept SOME users with a password, rather than keys (or both!). Example of a banner (able to get some information from it too - domain name!).
Nmap Scripts
-> Automate fingerprinting and banner grabbing
SSH "Konami Code"
The Konami Code is a cheat code that appears in many Konami video games, and some non-Konami games. In the original code, the player can press the following sequence of buttons on the game controller to enable a cheat or other effects: ↑↑↓↓←→←→BA
SANS Penetration Testing | Using the SSH "Konami Code" (SSH Control Sequences) | SANS Institute
Last updated