Skip to content

Commit abdbffb

Browse files
Create README.md
1 parent 686035d commit abdbffb

File tree

1 file changed

+50
-0
lines changed

1 file changed

+50
-0
lines changed

profile/README.md

Lines changed: 50 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,50 @@
1+
2+
# [SSH-MITM Server](https://github.com/ssh-mitm/ssh-mitm) - ssh audits made simple
3+
4+
5+
**SSH-MITM is a man in the middle (mitm) server for security audits supporting public key authentication, session hijacking and file manipulation.**
6+
7+
## Installation SSH-MITM
8+
9+
<img src="https://www.ssh-mitm.at/assets/images/streamline-free/monitor-loading-progress.svg" align="left" width="138">
10+
11+
The first step to using any software package is getting it properly installed.
12+
13+
To install SSH-MITM, simply run this simple command in your terminal of choice:
14+
15+
$ pip install ssh-mitm
16+
17+
## Connect to the network
18+
19+
<img src="https://www.ssh-mitm.at/assets/images/streamline-free/programmer-male.svg" align="left" width="138">
20+
21+
To start an intercepting mitm-ssh server on Port 10022, all you have to do is run a single command.
22+
23+
```bash
24+
# start the mitm server
25+
$ ssh-mitm server --remote-host 192.168.0.x
26+
27+
# connect to the mitm server
28+
$ ssh -p 10022 user@proxyserver
29+
```
30+
## Spoofing FIDO Tokens
31+
32+
SSH-MITM is able to spoof FIDO Tokens which can be used for 2 factor authentication.
33+
34+
The attack is called [trivial authentication](https://docs.ssh-mitm.at/trivialauth.html) ([CVE-2021-36367](https://docs.ssh-mitm.at/CVE-2021-36367.html), [CVE-2021-36368](https://docs.ssh-mitm.at/CVE-2021-36368.html)) and can be enabled with the command line argument `--enable-trivial-auth`.
35+
36+
ssh-mitm server --enable-trivial-auth
37+
38+
Using the trivial authentication attack does not break password authentication, because the attack is only performed when a publickey login is possible.
39+
40+
<p align="center">
41+
<b>Video explaining the spoofing attack:</b><br/>
42+
<i>Click to view video on vimeo.com</i><br/>
43+
<a href="https://vimeo.com/showcase/9059922/video/651517195">
44+
<img src="https://github.com/ssh-mitm/ssh-mitm/raw/master/doc/images/ds2021-video.png" alt="Click to view video on vimeo.com">
45+
</a>
46+
</p>
47+
48+
<p align="center">
49+
<b><a href="https://github.com/ssh-mitm/ssh-mitm/files/7568291/deepsec.pdf">Downlaod presentation slides</a></b>
50+
</p>

0 commit comments

Comments
 (0)