Terrapin-Scanner
This repository contains a simple vulnerability scanner for the Terrapin attack present in the paper "Terrapin Attack: Breaking SSH Channel Integrity By Sequence Number Manipulation". (by RUB-NDS)
docker
Docker containers of the ImageBuilder and SDK (by openwrt)
Terrapin-Scanner | docker | |
---|---|---|
4 | 2 | |
889 | 434 | |
1.7% | 2.5% | |
8.4 | 6.8 | |
about 2 months ago | 30 days ago | |
Go | Dockerfile | |
Apache License 2.0 | GNU General Public License v3.0 only |
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Terrapin-Scanner
Posts with mentions or reviews of Terrapin-Scanner.
We have used some of these posts to build our list of alternatives
and similar projects. The last one was on 2024-03-14.
-
Tell HN: Ubiquiti APs likely vulnerable to Terrapin
For more details visit our website available at https://terrapin-attack.com
-
Terrapin-Scanner VS CryptoLyzer - a user suggested alternative
2 projects | 14 Jan 2024
-
Terrapin SSH Attack: An Overview
For in-depth information and updates on the Terrapin attack, consult the official Terrapin Attack website.
-
Terrapin attack on SSH: what do you need to know
We will show how to disable the affected ciphers on the example of Debian. We will use Docker to make this reproducible. Then we will verify our configuration using vulnerability scanner provided by the authors of the paper.
docker
Posts with mentions or reviews of docker.
We have used some of these posts to build our list of alternatives
and similar projects. The last one was on 2023-12-27.
-
Terrapin attack on SSH: what do you need to know
For this Linux distribution you need cross compiler to recompile Dropbear. The easiest way to get it is to use official Docker image.
-
Openwrt as docker container (not openwrt as host)
I have looked at the github docker repository! but I havent been able to successfully build an .tar.gz to convert into a docker image.
What are some alternatives?
When comparing Terrapin-Scanner and docker you can also consider the following projects:
scan4all - Official repository vuls Scan: 15000+PoCs; 23 kinds of application password crack; 7000+Web fingerprints; 146 protocols and 90000+ rules Port scanning; Fuzz, HW, awesome BugBounty( ͡° ͜ʖ ͡°)...
docker - Docker official jenkins repo
cli - 🧰 A zero trust swiss army knife for working with X509, OAuth, JWT, OATH OTP, etc.
vulhub - Pre-Built Vulnerable Environments Based on Docker-Compose
dropbear - Dropbear SSH
dockerfiles - Various Dockerfiles I use on the desktop and on servers.
CryptoLyzer - CryptoLyzer is a fast, flexible and comprehensive server cryptographic protocol (TLS, SSL, SSH, DNSSEC) and related setting (HTTP headers, DNS records) analyzer and fingerprint (JA3, HASSH tag) generator with Python API and CLI/.