jmitm2 is a SSH2 man-in-the-middle-attack program based on the SSH2 client/server implementation J2SSH
2009-11-01 13:04
741 查看
Features
handles as many connections as you want simultaneously (configurable, default is 10)
uses log4j for flexible logging
speaks SSH2, which all ssh-mitm-attackers I have seen to date don't
is easy to extend, e.g. for taking over a session, injecting commands, statistical purposes, new ciphers,...
Much of this is owed to the great J2SSH API, which is available under the LGPL.
jmitm2 has already successfully used for training by ASAP-COM GmbH.
Architecture
Basically, it is constructed as follows:it extends most server classes to contain a reference to a new object:
that object (called MitmGlue) keeps track of each session, looping it through to the remote target host
for authentication, a new MitmFakeAuthenticationProvider is created, that passes username and password to the MitmGlue object, which can log them and use them for authentication at the target host
Documentation
You can browse the javadoc online. All classes starting with "Mitm" are part of jmitm2.
You can download a copy of the presentation of jmitm2 held at Tübingen university. That presentation was held in german.
The Studienarbeit (in german) is also available.
There is a brief description of the usage of jmitm2 available.
You can download a binary package of jmitm2 that should contain everything neccessary to run the program, as well as a copy of the source of J2SSH 0.1.0, extended by the MitmFakeAuthenticationProvider.java (in the platforms/ directory) and the com.sshtools.jmitm2 Java package which contains all other jmitm2 classes as source. I developed and built this using eclipse, so as far as compiling is concerned, you'll certainly need log4j, maybe ant or eclipse, and a bit of twiddling. Contact me if you have problems.
The classes using code from J2SSH are of course LGPL'ed, and so is the jmitm2 code itself. If you have any questions, contact me.
jmitm2-0.1.0-source.tar.gz source code | 239 K |
jmitm2-0.1.0-source.tar.gz.asc signature | 234 |
jmitm2-0.1.0.tar.gz binary package | 1.5 M |
jmitm2-0.1.0.tar.gz.asc signature | 234 |
相关文章推荐
- ssh另一台机器时,报Password authentication is disabled to avoid man-in-the-middle attacks.
- my First Blood~~ Arp attrack and man in the middle in LAN...
- (转载)代理中的中间人攻击(Man-in-the-middle-attacks,简称:MITM攻击)
- UDP Server Client Implementation in C for Unix/Linux
- ssh开发中插入数据时遇到 You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right
- cas错误:org.jasig.cas.client.validation.TicketValidationException: No principal was found in the response from the CAS server.
- 浅析ARP中的man in the middle
- Man Left in the Middle Attack Method中间人攻击
- Does the RTSP implementation (client and/or server) support 'trick mode' operations
- On a new installed FreeBSD server, when you try to SSH to the server as root, you will end up in the
- [HTTPS] MAN IN THE MIDDLE (MITM)
- 回射客户端服务器中僵尸进程的处理( the solution of zombie process in the echo client && server )
- Strip SSL via Ettercap Man in the Middle Attack
- Using the Intel® MPI Library in a server/client setup
- 中间人攻击(Man-In-The-Middle)&&Cain使用简介
- how to config the tftpd-hpa server in the ubuntu using for remote tftp client '-p' and '-r' command
- 对Man-In-The-Middle攻击的一点理解
- White Paper: Understanding the Relative Costs of Client Access Server Workloads in Exchange Server
- 转载:Character data is represented incorrectly when the code page of the client computer differs from the code page of the database in SQL Server 2005