This penetration testing tool allows an auditor to intercept SSH connections. A patch applied to the OpenSSH v7.5p1 source code causes it to act as a proxy between the victim and their intended SSH server; all plaintext passwords and sessions are logged to disk. Of course, the victim's SSH client will complain that the server's key has changed. But because 99.99999% of the time this is caused by a legitimate action (OS re-install, configuration change, etc), many/most users will disregard the warning and continue on. NOTE: Only run the modified sshd_mitm in a VM or container! Ad-hoc edits were made to the OpenSSH sources in critical regions, with no regard to their security implications. Its not hard to imagine these edits introduce serious vulnerabilities.

Features

  • The quickest & easiest way to get started is to use the Docker image with SSH MITM pre-built
  • Find targets on the LAN, and ARP spoof them
  • Shell and SFTP sessions will be logged in the ssh_mitm_logs directory
  • To test out changes to the OpenSSH source code, use the dev/redeploy.sh script
  • To re-generate a full patch to the OpenSSH sources, use the dev/regenerate_patch.sh script
  • Only run the modified sshd_mitm in a VM or container

Project Samples

Project Activity

See All Activity >

License

MIT License

Follow SSH MITM

SSH MITM Web Site

You Might Also Like
Business Continuity Solutions | ConnectWise BCDR Icon
Business Continuity Solutions | ConnectWise BCDR

Build a foundation for data security and disaster recovery to fit your clients’ needs no matter the budget.

Whether natural disaster, cyberattack, or plain-old human error, data can disappear in the blink of an eye. ConnectWise BCDR (formerly Recover) delivers reliable and secure backup and disaster recovery backed by powerful automation and a 24/7 NOC to get your clients back to work in minutes, not days.
Rate This Project
Login To Rate This Project

User Reviews

Be the first to post a review of SSH MITM!

Additional Project Details

Programming Language

C

Related Categories

C MiTM (Man-in-The-Middle) Attack Tool

Registered

2023-08-14