summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
-rw-r--r--SSHAttackSummary/Summary.tex8
1 files changed, 4 insertions, 4 deletions
diff --git a/SSHAttackSummary/Summary.tex b/SSHAttackSummary/Summary.tex
index 405cd76..1322eaa 100644
--- a/SSHAttackSummary/Summary.tex
+++ b/SSHAttackSummary/Summary.tex
@@ -183,7 +183,7 @@ $ lxc-attach -n ssh-attack
Now download OpenSSH 4.7\footnote{Although versions up to and including 5.1 are vulnerable to the attack, we used the same version as \cite{kp2009}, so that we could search in the source code for code snippets from the paper.}, patch it to ease the length check as described in \cite[sec.~4.1; 2.1.1]{kp2009}, and install:
-\begin{minted}[fontsize=\footnotesize,breaklines=true]{bash}
+\begin{minted}[fontsize=\footnotesize,breaklines=true]{shell-session}
$ apt-get update
$ apt-get install wget build-essential zlib1g-dev libssl-dev
$ wget http://ftp.nluug.nl/pub/OpenBSD/OpenSSH/portable/openssh- 4.7p1.tar.gz
@@ -200,7 +200,7 @@ You could change the \mintinline{bash}{0x000fffff} to ease the length check more
Now add the \texttt{sshd} user and set the password for the \texttt{ubuntu} user to `\texttt{ubuntu}'.
-\begin{minted}[fontsize=\footnotesize,breaklines=true]{bash}
+\begin{minted}[fontsize=\footnotesize,breaklines=true]{shell-session}
$ useradd -d /var/run/sshd -s /usr/sbin/nologin -r -U sshd
$ usermod -p $(perl -e 'print crypt("ubuntu", "salt")') ubuntu
\end{minted}
@@ -208,7 +208,7 @@ $ usermod -p $(perl -e 'print crypt("ubuntu", "salt")') ubuntu
You can now run the server with \mintinline{bash}{/opt/openssh/sbin/sshd}. See \texttt{/opt/openssh/share/man/cat8/sshd.8} manpage for command line arguments. Typically you would want to use debug logging and IPv4 only:
- \begin{minted}[fontsize=\footnotesize,breaklines,autogobble]{bash}
+ \begin{minted}[fontsize=\footnotesize,breaklines,autogobble]{shell-session}
$ /opt/openssh/sbin/sshd -d4
\end{minted}
%stopzone
@@ -229,7 +229,7 @@ You also need to replace `\texttt{10.0.0.2}' with `\texttt{alice}' on line 105.
Then simply load the file in a python shell and start the attack:
-\begin{minted}[fontsize=\footnotesize,breaklines=true]{bash}
+\begin{minted}[fontsize=\footnotesize,breaklines=true]{shell-session}
$ python -i ssh-attack.py
>>> ssh_attack()
\end{minted}