ssh mitm server for security audits supporting public key authentication, session hijacking and file manipulation
ssh-mitm - intercept ssh traffic
man in the middle (mitm) server for security audits supporting public key authentication, session hijacking and file manipulation
Installation of SSH-MITM
The first step to using any software package is getting it properly installed.
To install SSH-MITM, simply run this simple command in your terminal of choice:
$ pip install ssh-mitm
Starting an intercepting mitm-ssh server with password authentication and session hijacking is very simple.
All you have to do is run this command in your terminal of choice.
$ ssh-mitm --remote-host 192.168.0.x
Now let's try to connect to the ssh-mitm server. The ssh-mitm server is listening on port 10022.
$ ssh -p 10022 user@proxyserver
You will see the credentials in the log output.
2021-01-01 11:38:26,098 [INFO] Client connection established with parameters:
Remote Address: 192.168.0.x
Getting the plain text credentials is only half the fun. When a client connects, the ssh-mitm starts a new server, which is used for session hijacking.
2021-01-01 11:42:43,699 [INFO] created injector shell on port 34463. connect with: ssh -p 34463 127.0.0.1
To hijack the session, you can use your favorite ssh client. This connection does not require authentication.
$ ssh -p 34463 127.0.0.1
After you are connected, your session will only be updated with new responses, but you are able to execute commands.
Try to execute somme commands in the hijacked session or in the original session.
The output will be shown in both sessions.
Release history Release notifications | RSS feed
Reason this release was yanked:
This version is unable to run because of missing packages
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Hashes for ssh_mitm-0.3.15-py3-none-any.whl