Nytro Posted November 13, 2014 Report Posted November 13, 2014 Automating Man-in-the-Middle SSHv2 attacksRecently during an internal penetration test, I was performing ARP spoofing and i found a SSH connection from the administrator computer to another box. That sounds like the correct way to access remote hosts securely. However, the problem here was that the company was using a network switch that was vulnerable to ARP spoofing. I came across the below article about performing ARP spoofing and MITM SSH connections to steal credentials. The victim does get an alert message saying that there is a key mismatch but most people just ignore them anyway. SSH2 "MITM" like attack with JMITM2 | woFF In the article, he uses a software called JMITM2 (david-guembel.de: jmitm2) which is sort of like a honey pot that proxies SSH connections between the victim and the target SSH server. However, there are a number of steps to be done manually to execute this attack during an internal penetration test. 1. Check if network is vulnerable to ARP spoofing2. Check if there are any active SSH connections in the network2. Identify the victim computer and SSH server3. Modify the configuration files of JMITM24. Modifying iptables5. ARP spoofing6. Checking JMITM2 console for credentials7. Re-arp the router and victim host with the correct MAC addresses of each.It would save a great amount of time to automate these steps. I wrote a script that does just that. Running the command below checks the network for active SSH connections (via ARP spoofing) and then automates the whole attack to outputs any credentials captured to the console. python2.7 mitmSSH.py -analyzeIf you know the victim host IP and SSH server, you can use the below commandpython2.7 mitmSSH.py -host victims -ssh sshServerIPThis script has only been tested on Kali Linux. There are a couple of things that are still in the works to improve the script.1. Switching from intercepter-ng for ARP spoofing to scapy. The script can be grabbed from the below linkhttps://github.com/milo2012/pentest_automation/blob/master/mitmSSH.pySursa: Automating Man-in-the-Middle SSHv2 attacks | Milo2012's Security Blog 1 Quote