Practical Guide explaining how to find hosts vulnerable to the libSSH Authentication Bypass (CVE-2018-10933) and how to exploit them to gain shell access.
Please refer to the following blog post for instructions: https://www.marcolancini.it/2018/blog-libssh-auth-bypass/