-
Notifications
You must be signed in to change notification settings - Fork 2.4k
Closed
Description
Description:
Running SSH in "Wide Compatibility Mode" causes hydra not to error out. This is enabled via kali-tweaks -> Hardening or adding the following to /etc/ssh/ssh_config. The + indicates append to default.
Host *
Ciphers +3des-cbc,aes128-cbc,aes192-cbc,aes256-cbc
KexAlgorithms +diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1,diffie-hellman-group14-sha1
HostKeyAlgorithms +ssh-rsa,[email protected],ssh-dss,[email protected]
PubkeyAcceptedAlgorithms +ssh-rsa,[email protected],ssh-dss,[email protected]
Versions
Kali Version 2022.3, Hydra v9.3
Error
$ hydra -l michael -P /usr/share/wordlists/rockyou.txt ssh://10.10.11.166
[INFO] Testing if password authentication is supported by ssh://[email protected]:22
[2022/09/28 00:41:59.494904, 1] socket_callback_connected: Socket connection callback: 1 (0)
[2022/09/28 00:41:59.526248, 1] ssh_client_select_hostkeys: List of allowed host key algorithms is empty or contains only unsupported algorithms
[ERROR] could not connect to ssh://10.10.11.166:22 - ssh_set_client_kex: Out of memory
Expected behavior
SSH bruteforcing should work correctly in Wide Compatibility mode. CrackMapExec works in the meantime:
cme ssh 10.10.11.166 -u michael -p /usr/share/wordlists/rockyou.txt