Quickstart
Short guide to setup an intercepting SSH-MITM server with a single command
SSH Fingerprints
Description of host fingerprints and how to detect if a client already knows a host fingerprint
Authentication
SSH authentication methods explained and how to use them during audits
SSH Agent
SSH agent and agent forwarding explained and security considerations discussed
SCP/SFTP Filetransfers
Description of the SCP/SFTP protocols and how to manipulate files during audits
Port Forwarding
Introduction to port forwarding features of SSH-MITM
Advanced usage cases
Guide on how to setup a SSH-MITM server for advanced security audits in large networks and special use cases
SSH Vurnabilities
Explanation of vulnerabilities related to the ssh protocol

SSH-MITM is open source

and developed by the community. Be a part of this community and...