Short guide to setup an intercepting SSH-MITM server with a single command
SSH Fingerprints
Description of host fingerprints and how to detect if a client already knows a host fingerprint
SSH authentication methods explained and how to use them during audits
SSH Agent
SSH agent and agent forwarding explained and security considerations discussed
Trivial Authentication
Spoofing FIDO2 Tokens and SSH-Askpass
SCP/SFTP Filetransfers
Description of the SCP/SFTP protocols and how to manipulate files during audits
Port Forwarding
Introduction to port forwarding features of SSH-MITM
Advanced usage cases
Guide on how to setup a SSH-MITM server for advanced security audits in large networks and special use cases
SSH Vulnerabilities
Explanation of vulnerabilities related to the ssh protocol

SSH-MITM is open source

and developed by the community. Be a part of this community and...