Sup, iam Wanetta Davis, Take it easy.

How Port 22 Can Be Exploited? [Solved]

An unauthenticated remote attacker with network access to port 22 can tunnel random TCP traffic to other hosts on the network via Ruckus devices. A remote attacker could exploit this vulnerability to bypass security restrictions and gain unauthorized access to the vulnerable application.

Hacking Metasploitable2 with Kali Linux - Exploiting Port 22 SSH

Learn how to perform a Penetration Test against a compromised system.

Port 22 OpenSSH exploit | What ssh And port 22 | Metasploitable 2 Vulnerable Machine Part 4 | Hindi

Port 22

Attack on open ports in Metasploitable | FTP server hack

Watch this video tutorial to learnt about how to execute payload on open