[rwth-security] SSH Pentesting Guide