Skip to content
View manfred-kaiser's full-sized avatar

Organizations

@python-sifter @ssh-mitm
Block or Report

Block or report manfred-kaiser

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
manfred-kaiser/README.md

SSH-MITM is a man in the middle (mitm) server for security audits supporting public key authentication, session hijacking and file manipulation.

Installation SSH-MITM

The first step to using any software package is getting it properly installed.

To install SSH-MITM, simply run this simple command in your terminal of choice:

$ pip install ssh-mitm

Connect to the network

To start an intercepting mitm-ssh server on Port 10022, all you have to do is run a single command.

# start the mitm server
$ ssh-mitm server --remote-host 192.168.0.x

# connect to the mitm server
$ ssh -p 10022 user@proxyserver

Spoofing FIDO Tokens

SSH-MITM is able to spoof FIDO Tokens which can be used for 2 factor authentication.

The attack is called trivial authentication (CVE-2021-36367, CVE-2021-36368) and can be enabled with the command line argument --enable-trivial-auth.

ssh-mitm server --enable-trivial-auth

Using the trivial authentication attack does not break password authentication, because the attack is only performed when a publickey login is possible.

Video explaining the spoofing attack:
Click to view video on vimeo.com
Click to view video on vimeo.com

Downlaod presentation slides

Pinned

  1. ssh-mitm/ssh-mitm ssh-mitm/ssh-mitm Public

    SSH-MITM - ssh audits made simple

    Python 1.2k 130

  2. flathub/at.ssh_mitm.server flathub/at.ssh_mitm.server Public

    1 1