34 lines
1.1 KiB
Markdown
34 lines
1.1 KiB
Markdown
# What?
|
|
|
|
This is a backdoor for servers in NAT networks.
|
|
|
|
One server on the public internet acts as a backdoor server, where other
|
|
computers connect, creating reverse tunnels to their ports 22.
|
|
|
|
The program manages random ports that are then available at the server localhost.
|
|
|
|
# install
|
|
|
|
configure config.env and run `make install`
|
|
|
|
- ssh-backdoor will go to ~/bin/ssh-backdoor
|
|
- Servers behind NAT should access the ssh-backdoor-open script over a http(s) server
|
|
- Clients that want to connect to the backdoored servers should be able to access
|
|
ssh-backdoor-connect script
|
|
- use the 'ad-hoc-www-server' if no proper http server available
|
|
|
|
# running
|
|
|
|
- NATted servers must copy their `id_rsa.pub` to backdoor server's `authorized_keys`
|
|
- Clients should do the same, for ease of access
|
|
- Have NATted servers run `ssh-backdoor-open` at boot (in cron or otherwise)
|
|
- Use the ssh-backdoor command directly, or ssh-backdoor-connect from client machines
|
|
to connect
|
|
|
|
|
|
# utils
|
|
|
|
- `ssh-list` lists all processes with ssh and backdoor
|
|
- `ssh-kill-all` kills all ssh connections (except the current parent), and all python processes
|
|
|