You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+5-18Lines changed: 5 additions & 18 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -23,6 +23,7 @@ Of course, the victim's SSH client will complain that the server's key has chang
23
23
The following list tracks areas to improve:
24
24
25
25
* Support SFTP MITM'ing.
26
+
* Print hostname, username, and password at the top of session logs.
26
27
* Add port forwarding support.
27
28
* Regex substitute the output of *ssh-keygen* when a user tries to check the host key hash. >:]
28
29
* Create wrapper script that detects when user is trying to use key authentication only, and de-spoof them automatically.
@@ -58,35 +59,21 @@ The above output shows that two devices on the LAN have created SSH connections
58
59
59
60
## Running The Attack
60
61
61
-
0.) Run the *install.sh*script, as mentioned above (this only needs to be done once).
62
+
1.) Once you've completed the initial setup and found a list of potential victims (see above), execute *run.sh*as root. This will execute *sshd_mitm*, enable IP forwarding, and set up SSH packet interception through *iptables*.
4.) ARP spoof a target(s) (**Protip:** do NOT spoof all the things! Your puny network interface won't likely be able to handle an entire network's traffic all at once. Only spoof a couple IPs at a time):
64
+
2.) ARP spoof the target(s) (**Protip:** do NOT spoof all the things! Your puny network interface won't likely be able to handle an entire network's traffic all at once. Only spoof a couple IPs at a time):
0 commit comments