Simulating an Attack on an SSH Protocol
SUMMARY Simulate attacks on your network such as a network attack on an SSH protocol.
A list of assets that have SSH vulnerabilities is displayed in the results, which allows network administrators to approve SSH connections that are allowed or expected in your network. The communications that are not approved can be monitored for events or offenses.
The results that are displayed provide your network administrators or security professionals with a visual representation of the attack path. For example, the first step provides a list of the directly connected assets that are affected by the simulation. The second step lists assets in your network that can communicate to first-level assets in your simulation.
The information that is provided in the attack helps you to strengthen and test your network against thousands of possible attack scenarios.