IT professionals often configure remote access services on networking devices, security appliances, and systems within their network to facilitate remote management. **Secure Shell (SSH)** is one of the most commonly used protocols for secure remote access. Operating in a client-server model, SSH ensures that all data exchanged between the client and the server is encrypted, offering a layer of security for remote connections.
As a penetration tester, you can identify whether a target system is running an SSH service—typically on port 22, the default port—by performing a port scan. If SSH is active, you can attempt an **online password-based attack** to discover valid user credentials, enabling access to the remote device via an SSH session.
While many organizations use the default port 22 for SSH, others opt for a non-standard port. This is a common practice within the industry to minimize the risk of threat actors easily identifying the SSH service on a targeted system using automated scanning tools. Changing the default port adds an additional layer of obscurity, though it should not be relied upon as the sole security measure.