diff options
Diffstat (limited to 'SSHAttackSummary')
-rw-r--r-- | SSHAttackSummary/Summary.tex | 8 |
1 files changed, 4 insertions, 4 deletions
diff --git a/SSHAttackSummary/Summary.tex b/SSHAttackSummary/Summary.tex index 405cd76..1322eaa 100644 --- a/SSHAttackSummary/Summary.tex +++ b/SSHAttackSummary/Summary.tex @@ -183,7 +183,7 @@ $ lxc-attach -n ssh-attack Now download OpenSSH 4.7\footnote{Although versions up to and including 5.1 are vulnerable to the attack, we used the same version as \cite{kp2009}, so that we could search in the source code for code snippets from the paper.}, patch it to ease the length check as described in \cite[sec.~4.1; 2.1.1]{kp2009}, and install: -\begin{minted}[fontsize=\footnotesize,breaklines=true]{bash} +\begin{minted}[fontsize=\footnotesize,breaklines=true]{shell-session} $ apt-get update $ apt-get install wget build-essential zlib1g-dev libssl-dev $ wget http://ftp.nluug.nl/pub/OpenBSD/OpenSSH/portable/openssh- 4.7p1.tar.gz @@ -200,7 +200,7 @@ You could change the \mintinline{bash}{0x000fffff} to ease the length check more Now add the \texttt{sshd} user and set the password for the \texttt{ubuntu} user to `\texttt{ubuntu}'. -\begin{minted}[fontsize=\footnotesize,breaklines=true]{bash} +\begin{minted}[fontsize=\footnotesize,breaklines=true]{shell-session} $ useradd -d /var/run/sshd -s /usr/sbin/nologin -r -U sshd $ usermod -p $(perl -e 'print crypt("ubuntu", "salt")') ubuntu \end{minted} @@ -208,7 +208,7 @@ $ usermod -p $(perl -e 'print crypt("ubuntu", "salt")') ubuntu You can now run the server with \mintinline{bash}{/opt/openssh/sbin/sshd}. See \texttt{/opt/openssh/share/man/cat8/sshd.8} manpage for command line arguments. Typically you would want to use debug logging and IPv4 only: - \begin{minted}[fontsize=\footnotesize,breaklines,autogobble]{bash} + \begin{minted}[fontsize=\footnotesize,breaklines,autogobble]{shell-session} $ /opt/openssh/sbin/sshd -d4 \end{minted} %stopzone @@ -229,7 +229,7 @@ You also need to replace `\texttt{10.0.0.2}' with `\texttt{alice}' on line 105. Then simply load the file in a python shell and start the attack: -\begin{minted}[fontsize=\footnotesize,breaklines=true]{bash} +\begin{minted}[fontsize=\footnotesize,breaklines=true]{shell-session} $ python -i ssh-attack.py >>> ssh_attack() \end{minted} |