You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
<palign="center">ssh man-in-the-middle (ssh-mitm) server for security audits supporting<br> <b>publickey authentication</b>, <b>session hijacking</b> and <b>file manipulation</b></p>
24
+
<palign="center">
25
+
<ahref="https://snapcraft.io/ssh-mitm">
26
+
<imgalt="Get it from the Snap Store"src="https://snapcraft.io/static/images/badges/en/snap-store-black.svg" />
27
+
</a>
28
+
<br />
29
+
<br />
30
+
31
+
</p>
32
+
</p>
33
+
34
+
Installation
35
+
------------
36
+
37
+
This part of the documentation covers the installation of SSH-MITM.
38
+
The first step to using any software package is getting it properly installed.
39
+
40
+
To install SSH-MITM, simply run one of those commands in your terminal of choice:
41
+
42
+
Install as snap
43
+
"""""""""""""""
44
+
45
+
.. code-block:: bash
46
+
47
+
sudo snap install ssh-mitm
10
48
11
-
Let’s get started with some simple examples.
12
49
50
+
Install with pip
51
+
""""""""""""""""
52
+
53
+
.. code-block:: bash
54
+
55
+
$ python -m pip install ssh-mitm
13
56
14
57
Start ssh-mitm proxy server
15
58
---------------------------
16
59
60
+
Let’s get started with some simple examples.
61
+
17
62
Starting an intercepting mitm-ssh server with password authentication is very simple.
18
63
19
64
All you have to do is run this command in your terminal of choice.
20
65
21
66
.. code-block:: bash
22
-
:linenos:
23
67
24
68
$ ssh-mitm --remote-host 192.168.0.x
25
69
26
70
Now let's try to connect to the ssh-mitm server.
27
71
The ssh-mitm server is listening on port 10022.
28
72
29
73
.. code-block:: bash
30
-
:linenos:
31
74
32
75
$ ssh -p 10022 user@proxyserver
33
76
@@ -61,7 +104,6 @@ This server is used to hijack the session.
61
104
To hijack the session, you can use your favorite ssh client. This connection does not require authentication.
62
105
63
106
.. code-block:: bash
64
-
:linenos:
65
107
66
108
$ ssh -p 34463 127.0.0.1
67
109
@@ -70,3 +112,18 @@ After you are connected, your session will only be updated with new responses, b
70
112
Try to execute somme commands in the hijacked session or in the original session.
71
113
72
114
The output will be shown in both sessions.
115
+
116
+
117
+
Publickey authentication
118
+
------------------------
119
+
120
+
SSH-MITM is able to verify, if a user is able to login with publickey authentication on the remote server.
121
+
If publickey authentication is not possible, SSH-MITM falls back to password authentication.
122
+
This step does not require a forwarded agent.
123
+
124
+
For a full login on the remote server agent forwarding is still required. When no agent was forwarded,
125
+
SSH-MITM can redirect the connection to a honeypot.
0 commit comments