sidedoor maintains a reverse tunnel to provide a backdoor. sidedoor can be used to remotely control a device behind a NAT.
sidedoor is packaged for Debian-based systems with systemd or upstart. It has been used on Debian 8 (jessie) and Ubuntu 14.04 LTS (trusty).
The sidedoor user has full root access configured in /etc/sudoers.d.
Installation
If sidedoor is in your package repositories, simply install it, e.g.,
sudo apt-get install sidedoor . Otherwise, you will need to build a Debian package and install it. First, install build dependencies.
sudo apt-get install debhelper dh-systemd
Then, from the directory containing this README file, build and install a package. rm -f ../sidedoor*.deb # remove old package build
dpkg-buildpackage -us -uc -b
sudo dpkg -i ../sidedoor*.debConfiguration
The remote server and tunnel port are configured in
/etc/default/sidedoor . SSH configuration files are located in the /etc/sidedoor directory. ~sidedoor/.ssh is a symlink to /etc/sidedoor . - Configure
REMOTE_SERVERandTUNNEL_PORTin/etc/default/sidedoor. - Create SSH configuration files under
/etc/sidedoor.-
authorized_keys: SSH public key(s) to control access to the local sidedoor user. -
id_rsa: SSH private key to access the remote server. Can be generated withsudo ssh-keygen -t rsa -f /etc/sidedoor/id_rsa(press enter when prompted for passphrase to leave empty). Needs read permission by the sidedoor user or group, e.g.,sudo chown root:sidedoor /etc/sidedoor/id_rsaandsudo chmod 640 /etc/sidedoor/id_rsa. The corresponding public keyid_rsa.pubwill need to be included in the remote user's~/.ssh/authorized_keysfile. -
known_hosts: SSH host key of the remote server. -
config(optional): Additional SSH config, seeman ssh_config.
-
sudo service sidedoor restart Recommendations
- Lock down the local SSH server by editing
/etc/ssh/sshd_config.- Disable password authentication (
ChallengeResponseAuthentication noandPasswordAuthentication no). - Limit daemon to only listen on localhost. (
ListenAddress ::1andListenAddress 127.0.0.1). - To apply changes, restart or reload sshd, e.g.,
sudo service ssh reload.
- Disable password authentication (
- Modify the
ssh_client_config_examplefile and include it in a client's~/.ssh/configfile to easily access the tunneled backdoor withssh,scp,rsync, etc.
0Day to Buy


0 comentários:
Post a Comment
Note: Only a member of this blog may post a comment.