Documentation

A comprehensive guide to using SSH0 for analyzing SSH server security.

SSH0 is a project by wss.sh,

Getting Started

To scan your SSH server:

  1. Enter your server's hostname or IP address in the scan form
  2. Click "Start Security Scan"
  3. Wait for the analysis to complete
  4. Review the detailed security report

Understanding Results

Security Grade

  • A Excellent security configuration
  • B Good security with minor improvements needed
  • C Significant security improvements recommended

Security Issues

Critical Issues

Security vulnerabilities that require immediate attention

Warnings

Potential security risks that should be addressed

Recommendations

Suggestions for improving security configuration

Analyzed Components

Protocol & Software

  • SSH protocol version
  • Software version
  • Protocol compatibility

Cryptography

  • Key exchange algorithms
  • Encryption algorithms
  • MAC algorithms

Security Best Practices

  • • Regularly update your SSH server software
  • • Disable weak or deprecated algorithms
  • • Use strong key exchange methods
  • • Implement proper access controls
  • • Monitor and audit SSH access regularly

API Access

Coming soon...