Categories: auth, intrusive
Returns authentication methods that a SSH server supports.
This is in the "intrusive" category because it starts an authentication with a username which may be invalid. The abandoned connection will likely be logged.
nmap -p 22 --script ssh-auth-methods --script-args="ssh.user=<username>" <target>
22/tcp open ssh syn-ack | ssh-auth-methods: | Supported authentication methods: | publickey |_ password
License: Same as Nmap--See https://nmap.org/book/man-legal.html