-
Notifications
You must be signed in to change notification settings - Fork 83
/
sshow.8
41 lines (41 loc) · 987 Bytes
/
sshow.8
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
.TH SSHOW 8
.ad
.fi
.SH NAME
sshow
\-
SSH traffic analysis tool
.SH SYNOPSIS
.na
.nf
.fi
\fBsshow\fR [\fB-d\fR] [\fB-i \fIinterface\fR | \fB-p \fIpcapfile\fR] [\fIexpression\fR]
.SH DESCRIPTION
.ad
.fi
\fBsshow\fR analyzes encrypted SSH-1 and SSH-2 traffic, identifying
authentication attempts, the lengths of passwords entered in
interactive sessions, and command line lengths.
.LP
The following advisory describes the attacks implemented by
\fBsshow\fR in detail:
.LP
.RS
.I http://www.openwall.com/advisories/OW-003-ssh-traffic-analysis.txt
.RE
.SH OPTIONS
.IP \fB-d\fR
Enable verbose debugging output.
.IP "\fB-i \fIinterface\fR"
Specify the interface to listen on.
.IP "\fB-p \fIpcapfile\fR"
Process packets from the specified PCAP capture file instead of the network.
.IP "\fIexpression\fR"
Specify a tcpdump(8) filter expression to select traffic to sniff.
.SH "SEE ALSO"
dsniff(8), sshmitm(8)
.SH AUTHORS
.na
.nf
Solar Designer <[email protected]>
Dug Song <[email protected]>