SSH (22)
Secure remote shell access
Attack Phases
Choose the attack phase you want to work in.
Reconnaissance
Open →Gather public and internal context on the target. Build a clear map of the attack surface.
Enumeration
Open →Turn discovery into specifics: services, users, and exposed resources. Confirm what’s reachable.
Vulnerability Discovery
Open →Identify weaknesses and misconfigurations that matter. Prioritize findings by likelihood and impact.
Exploitation
Open →Leverage a weakness to gain access or execute actions. Validate control safely and deliberately.
Post-Exploitation
Open →Understand what you have and what it enables. Enumerate internally and plan next steps.
Privilege Escalation
Open →Increase permissions to unlock restricted actions. Aim for roles, tokens, or admin-level access.
Lateral Movement
Open →Move across accounts or systems to expand reach. Use trust paths to access new assets.
Persistence
Open →Maintain access across reboots and cleanup attempts. Establish durable footholds and recovery paths.
Data Exfiltration
Open →Collect and export data from the environment. Minimize detection while tracking scope and impact.