Skip to main content

ssh mitm server for security audits supporting publickey authentication, session hijacking and file manipulation

Project description

SSH-MITM - ssh audits made simple


SSH-MITM intercepting password login

ssh man-in-the-middle (ssh-mitm) server for security audits supporting
publickey authentication, session hijacking and file manipulation

Get it from the Snap Store

Explore the docs »

Table of Contents

Introduction

CodeFactor Documentation Status PyPI downloads GitHub PRs Welcome

SSH-MITM is a man in the middle SSH Server for security audits and malware analysis.

Password and publickey authentication are supported and SSH-MITM is able to detect, if a user is able to login with publickey authentication on the remote server. This allows SSH-MITM to acccept the same key as the destination server. If publickey authentication is not possible, the authentication will fall back to password-authentication.

When publickey authentication is possible, a forwarded agent is needed to login to the remote server. In cases, when no agent was forwarded, SSH-MITM can rediredt the session to a honeypot.

Features

  • publickey authentication
    • accept same key as destination server
  • hijacking and logging of terminal sessions
  • store and replace files during SCP/SFTP file transferes
  • port porwarding
  • audit clients against known vulnerabilities
  • plugin support

Installation

SSH-MITM can be installed as a Ubuntu Snap, PIP-Package or AppImage

# install ssh-mitm as snap package
$ sudo snap install ssh-mitm

# install ssh-mitm as python pip package
$ pip install ssh-mitm

Quickstart

To start SSH-MITM, all you have to do is run this command in your terminal of choice.

$ ssh-mitm --remote-host 192.168.0.x

Now let's try to connect. SSH-MITM is listening on port 10022.

$ ssh -p 10022 testuser@proxyserver

You will see the credentials in the log output.

INFO     Remote authentication succeeded
    Remote Address: 127.0.0.1:22
    Username: testuser
    Password: secret
    Agent: no agent

Session hijacking

Getting the plain text credentials is only half the fun. When a client connects, the ssh-mitm starts a new server, which is used for session hijacking.

INFO     ℹ created mirrorshell on port 34463. connect with: ssh -p 34463 127.0.0.1

To hijack the session, you can use your favorite ssh client.

$ ssh -p 34463 127.0.0.1

Try to execute somme commands in the hijacked session or in the original session.

The output will be shown in both sessions.

Publickey authentication

SSH-MITM is able to verify, if a user is able to login with publickey authentication on the remote server. If publickey authentication is not possible, SSH-MITM falls back to password authentication. This step does not require a forwarded agent.

For a full login on the remote server agent forwarding is still required. When no agent was forwarded, SSH-MITM can redirect the connection to a honeypot.

ssh-mitm --fallback-host username:password@hostname:port

Contributing

Pull requests are welcome.

For major changes, please open an issue first to discuss what you would like to change.

See also the list of contributors who participated in this project.

Project details


Release history Release notifications | RSS feed

Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

ssh-mitm-0.6.1.tar.gz (44.3 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

ssh_mitm-0.6.1-py3-none-any.whl (59.5 kB view details)

Uploaded Python 3

File details

Details for the file ssh-mitm-0.6.1.tar.gz.

File metadata

  • Download URL: ssh-mitm-0.6.1.tar.gz
  • Upload date:
  • Size: 44.3 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/3.4.2 importlib_metadata/4.8.1 pkginfo/1.7.1 requests/2.26.0 requests-toolbelt/0.9.1 tqdm/4.62.3 CPython/3.9.7

File hashes

Hashes for ssh-mitm-0.6.1.tar.gz
Algorithm Hash digest
SHA256 a00821bd7225ae04aeb6e3038a45ea7041813c48c62edaa1a8130447570e553e
MD5 19d4d47f1dac145354e521ab62e369ec
BLAKE2b-256 b61993840e5956423da6d71ade0786a3cca248bcbde46902cc45c498106c924f

See more details on using hashes here.

File details

Details for the file ssh_mitm-0.6.1-py3-none-any.whl.

File metadata

  • Download URL: ssh_mitm-0.6.1-py3-none-any.whl
  • Upload date:
  • Size: 59.5 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/3.4.2 importlib_metadata/4.8.1 pkginfo/1.7.1 requests/2.26.0 requests-toolbelt/0.9.1 tqdm/4.62.3 CPython/3.9.7

File hashes

Hashes for ssh_mitm-0.6.1-py3-none-any.whl
Algorithm Hash digest
SHA256 68fa69f6058321290555b2d5bb753cd6178c6e9ddccb4d9ea0d1351e16089dfd
MD5 808a3897e1b55cca36d908562d241834
BLAKE2b-256 2df88b8516c519e5fc6f00d7c88bdeba8fff3b3b2e8aec8edc72955914dd9811

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page