SSH MITM v2.3-dev Logo

SSH MITM v2.3-dev

A penetration testing tool that intercepts SSH connections by patching OpenSSH source code to act as a proxy and log plaintext passwords and sessions.

1,732
Visit website
Compare
Compare
0
MCPThe entire cybersecurity market, one prompt awayTry MCP Access

SSH MITM v2.3-dev Description

SSH MITM is a penetration testing tool that intercepts SSH connections by modifying the OpenSSH source code to function as a proxy server. The tool captures and logs plaintext passwords and session data to disk during SSH communications. It operates by patching critical regions of the OpenSSH codebase to enable man-in-the-middle attacks against SSH protocols. The tool is designed specifically for security auditing and penetration testing scenarios where intercepting SSH traffic is required. Due to the security vulnerabilities introduced by the ad-hoc modifications to OpenSSH sources, it should only be executed within isolated environments such as virtual machines or containers. SSH MITM provides auditors with the capability to analyze SSH communications and credential usage patterns during security assessments.

SSH MITM v2.3-dev FAQ

Common questions about SSH MITM v2.3-dev including features, pricing, alternatives, and user reviews.

SSH MITM v2.3-dev is A penetration testing tool that intercepts SSH connections by patching OpenSSH source code to act as a proxy and log plaintext passwords and sessions.. It is a Vulnerability Management solution designed to help security teams with SSH, Passwords, Proxy.

Have more questions? Browse our categories or search for specific tools.

ALTERNATIVES

Burp Suite Professional Logo

A web application security testing platform that combines manual and automated testing tools for conducting comprehensive security assessments and penetration testing.

0
xsshunter_client Logo

A correlated injection proxy tool that integrates with XSS Hunter for automated cross-site scripting vulnerability testing and payload tracking.

0
SauronEye Logo

SauronEye helps in identifying files containing sensitive data such as passwords through targeted directory searches.

0
MITM SOCKS Proxy for Java Logo

Intercepts and examines mobile app connections by stripping SSL/TLS layer.

0
PETEP (PEnetration TEsting Proxy) Logo

Open-source Java application for creating proxies for traffic analysis & modification.

0

Stay Updated with Mandos Brief

Get strategic cybersecurity insights in your inbox