All Projects → jaksi → Sshesame

jaksi / Sshesame

Licence: apache-2.0
A fake SSH server that lets everyone in and logs their activity

Programming Languages

go
31211 projects - #10 most used programming language
golang
3204 projects

Projects that are alternatives of or similar to Sshesame

Chameleon
Customizable honeypots for monitoring network traffic, bots activities and username\password credentials (DNS, HTTP Proxy, HTTP, HTTPS, SSH, POP3, IMAP, STMP, RDP, VNC, SMB, SOCKS5, Redis, TELNET, Postgres and MySQL)
Stars: ✭ 230 (-78.34%)
Mutual labels:  ssh, honeypot
Hfish
安全、可靠、简单、免费的企业级蜜罐
Stars: ✭ 2,977 (+180.32%)
Mutual labels:  ssh, honeypot
Docker Cowrie
Cowrie Docker GitHub repository
Stars: ✭ 68 (-93.6%)
Mutual labels:  ssh, honeypot
Cowrie
Cowrie SSH/Telnet Honeypot https://cowrie.readthedocs.io
Stars: ✭ 3,810 (+258.76%)
Mutual labels:  ssh, honeypot
sshsyrup
A low-to-medium interaction SSH Honeypot with features to capture terminal activity and upload to asciinema.org
Stars: ✭ 84 (-92.09%)
Mutual labels:  ssh, honeypot
seahorse
ELKFH - Elastic, Logstash, Kibana, Filebeat and Honeypot (HTTP, HTTPS, SSH, RDP, VNC, Redis, MySQL, MONGO, SMB, LDAP)
Stars: ✭ 31 (-97.08%)
Mutual labels:  ssh, honeypot
Secure Wireguard Implementation
A guide on implementing a secure Wireguard server on OVH (or any other Debian VPS) with DNSCrypt, Port Knocking & an SSH-Honeypot
Stars: ✭ 200 (-81.17%)
Mutual labels:  ssh, honeypot
dystopia
Low to medium multithreaded Ubuntu Core honeypot coded in Python.
Stars: ✭ 59 (-94.44%)
Mutual labels:  ssh, honeypot
Honeypot
Low interaction honeypot that displays real time attacks
Stars: ✭ 348 (-67.23%)
Mutual labels:  ssh, honeypot
Fatt
FATT /fingerprintAllTheThings - a pyshark based script for extracting network metadata and fingerprints from pcap files and live network traffic
Stars: ✭ 490 (-53.86%)
Mutual labels:  ssh, honeypot
Ssh Agent Helper
Use SSH keys from CMD, PowerShell, etc. on Windows
Stars: ✭ 31 (-97.08%)
Mutual labels:  ssh
Awesome Tunneling
List of ngrok alternatives and other ngrok-like tunneling software and services. Focus on self-hosting.
Stars: ✭ 946 (-10.92%)
Mutual labels:  ssh
Webshell
Docker container which includes Shellinabox and enables SSH connections to arbitrary (not where installed) servers
Stars: ✭ 40 (-96.23%)
Mutual labels:  ssh
Ssh Shell Spring Boot
Spring shell in spring boot application over ssh
Stars: ✭ 43 (-95.95%)
Mutual labels:  ssh
Geofront Cli
It provides a CLI client for Geofront, a simple SSH key management server.
Stars: ✭ 30 (-97.18%)
Mutual labels:  ssh
Isometriksspambundle
Symfony3 Form Spam Protection
Stars: ✭ 38 (-96.42%)
Mutual labels:  honeypot
Wssh
WSSH Is a tool for brute forcing servers that has port 22 open via ssh, wssh is probably the fastest ssh brute forcer available
Stars: ✭ 21 (-98.02%)
Mutual labels:  ssh
Connect2ssh
Manage SSH and SSHFS connections via the command line using BASH!
Stars: ✭ 15 (-98.59%)
Mutual labels:  ssh
Switcher
Run SSH and HTTP(S) on the same port
Stars: ✭ 877 (-17.42%)
Mutual labels:  ssh
Sshd config
K4YT3X's Hardened OpenSSH Server Configuration
Stars: ✭ 49 (-95.39%)
Mutual labels:  ssh

sshesame

A fake SSH server that lets everyone in and logs their activity

Warning

This software, just like any other, might contain bugs. Given the popular nature of SSH, you probably shouldn't run it unsupervised as root on a production server on port 22. Use common sense.

Motivation

I was just curious what all these guys were up to:

sshd[8128]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=<client>  user=root
sshd[8128]: Failed password for root from <client> port 37510 ssh2
sshd[8128]: Received disconnect from <client> port 37510:11:  [preauth]
sshd[8128]: Disconnected from <client> port 37510 [preauth]
sshd[8141]: Received disconnect from <client> port 59353:11:  [preauth]
sshd[8141]: Disconnected from <client> port 59353 [preauth]
sshd[8151]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=<client>  user=root
sshd[8151]: Failed password for root from <client> port 63785 ssh2
sshd[8159]: Received disconnect from <client> port 24889:11:  [preauth]
sshd[8159]: Disconnected from <client> port 24889 [preauth]

Details

sshesame accepts and logs

  • every password authentication request,
  • every SSH channel open request and
  • every SSH request

without actually executing anything on the host.

For more details, read the relevant RFC.

Installing

From source

  • Install go (version 1.4 or newer required)
  • go get -u github.com/jaksi/sshesame

Snap

snap install sshesame

Package created and maintained by chadmiller.

You can find the package here.

Usage

$ sshesame -h
Usage of sshesame:
  -host_key string
    	a file containing a private key to use
  -json_logging
    	enable logging in JSON
  -listen_address string
    	the local address to listen on (default "localhost")
  -port uint
    	the port number to listen on (default 2022)
  -server_version string
    	The version identification of the server (RFC 4253 section 4.2 requires that this string start with "SSH-2.0-") (default "SSH-2.0-sshesame")

Consider creating a private key to use with sshesame, for example using ssh-keygen.

Example output

Connection: client=<client>:45782
Login: client=<client>:45782, user="root", password="cisco"
Established SSH connection: client=<client>:45782
New channel: clinet=<client>:45782, type=direct-tcpip, payload={DestinationAddress:<something> DestinationPort:110 SourceAddress:192.168.0.1 SourcePort:0}
Failed to read from channel: EOF
New channel: clinet=<client>:45782, type=direct-tcpip, payload={DestinationAddress:<something> DestinationPort:143 SourceAddress:192.168.0.1 SourcePort:0}
Failed to read from channel: EOF
New channel: clinet=<client>:45782, type=direct-tcpip, payload={DestinationAddress:<something> DestinationPort:587 SourceAddress:192.168.0.1 SourcePort:0}
Failed to read from channel: EOF
New channel: clinet=<client>:45782, type=direct-tcpip, payload={DestinationAddress:<something> DestinationPort:587 SourceAddress:192.168.0.1 SourcePort:0}
Failed to read from channel: EOF
New channel: clinet=<client>:45782, type=session, payload=[]
Request: client=<client>:45782, channel=session, type=exec, payload={Command:/sbin/ifconfig}
Failed to read from terminal: EOF
New channel: clinet=<client>:45782, type=session, payload=[]
Request: client=<client>:45782, channel=session, type=exec, payload={Command:cat /proc/meminfo}
Failed to read from terminal: EOF
New channel: clinet=<client>:45782, type=session, payload=[]
Request: client=<client>:45782, channel=session, type=exec, payload={Command:2>/dev/null sh -c 'cat /lib/libdl.so* || cat /lib/librt.so* || cat /bin/cat || cat /sbin/ifconfig'}
Failed to read from terminal: EOF
New channel: clinet=<client>:45782, type=session, payload=[]
Request: client=<client>:45782, channel=session, type=exec, payload={Command:cat /proc/version}
Failed to read from terminal: EOF
New channel: clinet=<client>:45782, type=session, payload=[]
Request: client=<client>:45782, channel=session, type=exec, payload={Command:uptime}
Failed to read from terminal: EOF
Disconnect: client=<client>:45782

So what happened here?

  • A client logged in with the user "root" and the password "cisco"
  • Using TCP/IP forwarding over SSH, they tried to connect to a few remote mail servers over POP3 (port 110), IMAP (port 143) and Submission (port 587)
  • They tried to execute a few commands to get some information about the host

Again, if you're interested in the technical details of SSH, read the RFC.

Known issues

  • No exit-status request is sent in response to exec requests
  • A terminal is created on session channels even if no shell request is received
Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].