3snake

Tool for extracting information from newly spawned processes

  • 所有者: blendin/3snake
  • 平台:
  • 許可證: Other
  • 分類:
  • 主題:
  • 喜歡:
    0
      比較:

Github星跟蹤圖

About

Targeting rooted servers, reads memory from sshd and sudo system calls that handle password based authentication. Doesn't write any memory to the traced processes. Spawns a new process for every sshd and sudo command that is run.

Listens for the proc event using netlink sockets to get candidate processes to trace. When it receives an sshd or sudo process ptrace is attached and traces read and write system calls, extracting strings related to password based authentication.

Don't really like the solution of backdooring openssh or installing a kernel module on target servers so I made this.

3snake

Build

make
./3snake -h
./3snake

Usage

Run in current terminal
./3snake

Daemonize and dump output to file
./3snake -d -o "/tmp/output_file.txt"

Configuration

Located in config.h

  • ROOT_DIR - root directory when daemonized (relative file paths for -o option will end up here)
  • ENABLE_SSH - OpenSSH server password auth
  • ENABLE_SUDO - sudo password auth
  • ENABLE_SU (experimental) - su password auth
  • ENABLE_SSH_CLIENT (experimental) - ssh client password auth

Limitations

Linux, ptrace enabled, /proc filesystem mounted

Todo
---, Features, X, ---------------------------------------------------, -----, OpenSSH server password auth, X, sudo, X, su, X, regex strings from processes, ~, ssh client, X, * Make the process of adding tracers more fluid

  • Yubikey: Ask for second yubikey from end users, OpenSSH
  • Output mode that only shows usernames/passwords

License

MIT

主要指標

概覽
名稱與所有者blendin/3snake
主編程語言C
編程語言Makefile (語言數: 3)
平台
許可證Other
所有者活动
創建於2018-02-07 21:03:15
推送於2025-05-11 19:15:04
最后一次提交2025-05-11 15:15:03
發布數0
用户参与
星數759
關注者數24
派生數111
提交數39
已啟用問題?
問題數8
打開的問題數1
拉請求數6
打開的拉請求數0
關閉的拉請求數1
项目设置
已啟用Wiki?
已存檔?
是復刻?
已鎖定?
是鏡像?
是私有?