Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

SSH-key checking #3

Closed
0x27 opened this issue Apr 10, 2016 · 6 comments
Closed

SSH-key checking #3

0x27 opened this issue Apr 10, 2016 · 6 comments

Comments

@0x27
Copy link

0x27 commented Apr 10, 2016

A lot of hidden services (close to 3% in my last big scan) are configured so that the .onion address serves all ports.

If SSH is being served, you can grab the key fingerprint and sometimes uncloak the HS by checking it against Shodan or your own database of scans.

Example code (in Python) to do this is here: https://github.com/0x27/ssh_keyscanner

@s-rah
Copy link
Owner

s-rah commented Apr 10, 2016

Looks like there are two new rulesets here:

  1. Onion configured to serve more than 1 port - not a terrible idea, but certainly leaves open the possibility of a misconfiguration.
  2. SSH Key checking

@s-rah
Copy link
Owner

s-rah commented Apr 20, 2016

Have a working prototype for this, will be up soon

@s-rah
Copy link
Owner

s-rah commented Apr 25, 2016

Fingerprinting added in 44e6d5c - still would be cool to lookup the fingerprint in a DB.

@0x27
Copy link
Author

0x27 commented Apr 25, 2016

@s-rah - Its possible to search ssh keys on Shodan, with the Shodan API. There is even a Go library: https://github.com/ns3777k/go-shodan

Still getting to grips with Go, slowly, coming up to exams here though so its slow going.

Hypothetically, an imaginary friend was able to deanonymize a good number of services by doing that (Shodanning the fingerprints)...

@PeterTonoli
Copy link

Might help to look at #26 too, when implementing..

@0x27 0x27 mentioned this issue Apr 25, 2016
@s-rah s-rah modified the milestone: Version 0.1 May 5, 2016
@s-rah
Copy link
Owner

s-rah commented Oct 4, 2016

Closing this in favor of #73

@s-rah s-rah closed this as completed Oct 4, 2016
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

3 participants