Skip to content
View manfred-kaiser's full-sized avatar

Organizations

@python-sifter @ssh-mitm

Block or report manfred-kaiser

Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
manfred-kaiser/README.md

SSH-MITM is a man in the middle (mitm) server for security audits supporting public key authentication, session hijacking and file manipulation.

Installation SSH-MITM

The first step to using any software package is getting it properly installed.

To install SSH-MITM, simply run this simple command in your terminal of choice:

$ pip install ssh-mitm

Connect to the network

To start an intercepting mitm-ssh server on Port 10022, all you have to do is run a single command.

# start the mitm server
$ ssh-mitm server --remote-host 192.168.0.x

# connect to the mitm server
$ ssh -p 10022 user@proxyserver

Spoofing FIDO Tokens

SSH-MITM is able to spoof FIDO Tokens which can be used for 2 factor authentication.

The attack is called trivial authentication (CVE-2021-36367, CVE-2021-36368) and can be enabled with the command line argument --enable-trivial-auth.

ssh-mitm server --enable-trivial-auth

Using the trivial authentication attack does not break password authentication, because the attack is only performed when a publickey login is possible.

Video explaining the spoofing attack:
Click to view video on vimeo.com
Click to view video on vimeo.com

Downlaod presentation slides

Pinned Loading

  1. ssh-mitm/ssh-mitm ssh-mitm/ssh-mitm Public

    SSH-MITM - ssh audits made simple

    Python 1.4k 152

  2. ssh-mitm/appimage ssh-mitm/appimage Public

    AppImage start scripts

    Python 2 1