ssh-mitm VS BDFProxy

Compare ssh-mitm vs BDFProxy and see what are their differences.

Our great sponsors
  • WorkOS - The modern identity platform for B2B SaaS
  • InfluxDB - Power Real-Time Data Analytics at Scale
  • SaaSHub - Software Alternatives and Reviews
ssh-mitm BDFProxy
42 2
1,219 975
2.1% -
8.8 0.0
15 days ago over 2 years ago
Python Python
GNU General Public License v3.0 only -
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.

ssh-mitm

Posts with mentions or reviews of ssh-mitm. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2023-12-19.
  • Terrapin-Attack Style Vulnerability Likely Exploited for 2 Years
    1 project | news.ycombinator.com | 21 Dec 2023
    I wanted to share some insights into a security concern that echoes the Terrapin-Attack scenario, highlighting a similar vulnerability that has been observed in other tools.

    Recently, I came across a Pull Request on GitHub for the SSH-MITM tool, which sheds light on a critical aspect of SSH protocol security, specifically regarding RFC 4253 during the KEXINIT process. The Pull Request, available at GitHub https://github.com/ssh-mitm/ssh-mitm/pull/163, describes the necessity of discarding certain packages during the KEXINIT phase to prevent issues with intercepted clients.

    Moreover, a look into the GitHub Blame for SSH-MITM reveals that these crucial changes in the KEXINIT step were integrated into SSH-MITM about 1-2 years ago. You can see the specific changes at this link: https://github.com/ssh-mitm/ssh-mitm/blame/4fc3ef418847c35d17d0c427e2701b33a03c323c/sshmitm/workarounds/transport.py#L178-L188

    An important note to add is that this information suggests that a similar form of attack, akin to the Terrapin-Attack, could potentially have been exploited for the last two years. This raises significant concerns about the historical vulnerability of systems to such attack techniques and emphasizes the importance of retroactive security analysis in addition to ongoing vigilance.

  • Terrapin Attack for prefix injection in SSH
    3 projects | news.ycombinator.com | 19 Dec 2023
    There is now an issue ticket in ssh-mitm to discuss the similarities between ssh-mitm and terrapin attack: https://github.com/ssh-mitm/ssh-mitm/issues/165
  • Check if a publickey is known by GitHub or Gitlab without iterating all users
    1 project | news.ycombinator.com | 24 Feb 2023
    During some audits, it's likely that you find some ssh public keys laying around on some servers.

    If you want to verify if this key is known by other services, but you don't have access to those services, this task might be hard.

    SSH-MITM has an additional command, which allows to check if a public ssh key is known by GitHub, GitLab, and other code hosters. It's not limited to GitHub and other major platforms and even works with each service, which is accessible over SSH.

    First you must install SSH-MITM. It's recommended to use the AppImage, because this works out of the box on most Linux machines.

    $ wget https://github.com/ssh-mitm/ssh-mitm/releases/latest/download/ssh-mitm-x86_64.AppImage

  • Should SSH-MITM add a Codehoster user check as a default setting?
    1 project | /r/Pentesting | 13 Feb 2023
    SSH-MITM is a tool to audit ssh sessions and protocols, which uses SSH as the transport protocol: https://github.com/ssh-mitm/ssh-mitm
  • Python API Documentation created with ChatGPT
    1 project | /r/ChatGPT | 1 Feb 2023
    you can find the project on github: https://github.com/ssh-mitm/ssh-mitm
  • SSH-MitM has prebuilt windows executables
    1 project | news.ycombinator.com | 17 Jun 2022
  • SSH-MitM's new logo is a fish (OpenSSH's logo) on a hook
    1 project | news.ycombinator.com | 3 Apr 2022
  • SSH-MitM – Support for OpenSSH's Certificate Authority Planned
    1 project | news.ycombinator.com | 1 Apr 2022
  • SSH-MITM - Support for OpenSSH's certificate authority planned
    2 projects | /r/netsec | 1 Apr 2022
    You should check the Revisionhistory of the Readme file first.. https://github.com/ssh-mitm/ssh-mitm/commit/564028af25c395528446fbb679c7392469d59bfd
  • SSH-MitM 2.0.0 – Licence change to GPLv3
    3 projects | news.ycombinator.com | 1 Apr 2022
    The “customized wording” you’re seeing is “The LGPL”. It’s a different license from the GPL.

    The history on the repo shows that the original license was GPL (June 2020), the author changed the license to LGPL (December 2022), and now they’re changing it to GPL again. https://github.com/ssh-mitm/ssh-mitm/commits/master/LICENSE

BDFProxy

Posts with mentions or reviews of BDFProxy. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2023-02-26.
  • quicklisp security (or total lack of it)
    6 projects | /r/lisp | 26 Feb 2023
    for same sort of thing but not lisp, see backdoor factory that will backdoor any .exe you download over connection that attacker is MITMing. attacker doesn't need to know what specific library you will download from quicklisp, they write a mitmproxy script like that so for any download from quicklisp.org, it opens the .tar.gz, adds some malicious lisp to it (probably that just executes shell command to download and execute their normal malware, password stealer or whatever as I don't think they going to write full malware in lisp), repack it as .tar.gz you were requesting and serve it to you. It's not the same issue as phishing where they email saying please open and run attachment.exe and you click through all the warnings that you are doing something dangerous and about to run untrusted code. You just use quicklisp as you normally do, if you install any package, when an attacker can MITM your connection they can run code on your computer. Yes that is sometimes also possible with browser exploit but browsers have multiple layers of sandbox and protections against it, and when someone finds a vulnerability that gets through it is treated as a serious vulnerability to fix. some of this thread seems people saying well nothing is perfectly secure a sufficiently pacient, skilled, well-funded attacker can always get through somehow, so it doesn't matter raising the bar off the floor by not using http unverified to download code we run on people's computer
  • mitmproxy is a command-line tool for intercepting HTTPS traffic. Here is how you set up it.
    1 project | /r/commandline | 12 Feb 2021
    Have you seen this mitmproxy plugin: https://github.com/secretsquirrel/BDFProxy They use mitmproxy to capture and replace software auto-updates.

What are some alternatives?

When comparing ssh-mitm and BDFProxy you can also consider the following projects:

cowrie - Cowrie SSH/Telnet Honeypot https://cowrie.readthedocs.io

the-backdoor-factory - Patch PE, ELF, Mach-O binaries with shellcode new version in development, available only to sponsors

docker-sshd - Minimal Alpine Linux Docker image with sshd exposed and rsync installed

dit - DIT is a DTLS MitM proxy implemented in Python 3. It can intercept, manipulate and suppress datagrams between two DTLS endpoints and supports psk-based and certificate-based authentication schemes (RSA + ECC).

sftpretty - Provides multi-threaded routines and high level protocol abstractions for a pretty quick & simple file transfer experience. Drop in replacement for pysftp.

quicklisp-client - Quicklisp client.

super-auto-pets - A tool to allow for viewing of arbitrary Super Auto Pets replays

quicklisp-https

mitm - 👨🏼‍💻 ‎‎‎‏‏ A customizable man-in-the-middle TCP intercepting proxy.

openssh-portable - Portable OpenSSH

ql-https - HTTPS support for Quicklisp via curl