Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

SSH MITM #166

Open
ecthros opened this issue Dec 8, 2016 · 0 comments
Open

SSH MITM #166

ecthros opened this issue Dec 8, 2016 · 0 comments
Assignees

Comments

@ecthros
Copy link
Owner

ecthros commented Dec 8, 2016

Here's the idea:

Use tcpkiller to kill one of their current connections over ssh. They think that their internet is messed up or something, so they log back in.

In the time it takes, set up arp spoofing, so they send us the traffic.

Modify the traffic so that it sends the connection to us instead. this allows us to ask for a username and password, then we can create a ssh connection with the server to make it look like nothing is going wrong, allowing us to look at all their traffic on the ssh connection as well as the credentials.

I'm not sure how the process is gonna work but I think it's a cool idea - i havent been able to find anything anywhere about it

@ecthros ecthros self-assigned this Dec 9, 2016
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

1 participant