# What? This is a backdoor for servers in NAT networks. One server on the public internet acts as a backdoor server, where other computers connect, creating reverse tunnels to their ports 22. The program manages random ports that are then available at the server localhost. # install configure config.env and run `make install` - ssh-backdoor will go to ~/bin/ssh-backdoor - Servers behind NAT should access the ssh-backdoor-open script over a http(s) server - Clients that want to connect to the backdoored servers should be able to access ssh-backdoor-connect script - use the 'ad-hoc-www-server' if no proper http server available # running - NATted servers must copy their `id_rsa.pub` to backdoor server's `authorized_keys` - Clients should do the same, for ease of access - Have NATted servers run `ssh-backdoor-open` at boot (in cron or otherwise) - Use the ssh-backdoor command directly, or ssh-backdoor-connect from client machines to connect # utils - `ssh-list` lists all processes with ssh and backdoor - `ssh-kill-all` kills all ssh connections (except the current parent), and all python processes