The ps command is used before the kill command to discover the PID for the specific process.
Reconnaissance – The threat actor performs research, gathers intelligence, and selects targets. The Cyber Kill Chain specifies seven steps (or phases) and sequences that a threat actor must complete to accomplish an attack:
The SSH server generates a pair of public/private keys for the connections. The SSH protocol uses an asymmetric key algorithm to authenticate users and encrypt data transmitted.