Sup, iam Wanetta Davis, Take it easy.
How Port 22 Can Be Exploited? [Solved]
An unauthenticated remote attacker with network access to port 22 can tunnel random TCP traffic to other hosts on the network via Ruckus devices. A remote attacker could exploit this vulnerability to bypass security restrictions and gain unauthorized access to the vulnerable application.
Hacking Metasploitable2 with Kali Linux - Exploiting Port 22 SSH
Learn how to perform a Penetration Test against a compromised system.
Port 22 OpenSSH exploit | What ssh And port 22 | Metasploitable 2 Vulnerable Machine Part 4 | Hindi
Port 22
Attack on open ports in Metasploitable | FTP server hack
Watch this video tutorial to learnt about how to execute payload on open