Description:
I am using OWASP Nettacker v0.4.0 to perform SSH brute force on a target system with IP 192.168.29.62. The ports 22 and 2222 are detected as running OpenSSH 10.2p1 Debian 2. Attempts to brute force with valid credentials do not produce success logs. Manual SSH login works with these credentials.
Steps to Reproduce:
- Run Nettacker command:
python3.11 nettacker.py -i 192.168.29.62 -m ssh_brute -U ssh_users.txt -P ssh_passwords.txt -o result.html -vvv --timeout 15 --max-retries 10 --threads 1
Observe no success conditions despite valid username test and password password.
Manual SSH login succeeds:
ssh [email protected] -p 22
Target SSH config allows password authentication. No fail2ban service running, firewall temporarily disabled during tests.
Target logs show MaxStartups drops and pam_winbind errors.
Expected behavior:
Nettacker should report valid login success with provided credentials.
Actual behavior:
No success conditions reported, scan incomplete despite open SSH ports detected.
Additional Information:
- Nettacker version: 0.4.0
- Target OS: Debian-based Linux
- SSH version on target: OpenSSH 10.2p1 Debian 2
- Authentication logs include MaxStartups drops and PAM winbind errors.
Automated Log Collection and Testing Script
#!/bin/bash
# Variables
TARGET_IP="192.168.29.62"
USERS_FILE="ssh_users.txt"
PASSWORDS_FILE="ssh_passwords.txt"
NETTACKER_LOG="nettacker_debug.log"
echo "[*] Testing SSH manual login (port 22)..."
ssh -o BatchMode=yes -o ConnectTimeout=5 -p 22 test@$TARGET_IP echo "SSH login success" || echo "SSH login failed"
echo "[*] Collecting SSH auth logs..."
if [ -f /var/log/auth.log ]; then
sudo tail -n 50 /var/log/auth.log > ssh_auth.log
elif [ -f /var/log/secure ]; then
sudo tail -n 50 /var/log/secure > ssh_auth.log
else
sudo journalctl -u ssh.service -n 50 > ssh_auth.log
fi
echo "[*] SSH auth logs saved to ssh_auth.log"
echo "[*] Running Nettacker ssh_brute scan with verbose output..."
python3.11 nettacker.py -i $TARGET_IP -m ssh_brute -U $USERS_FILE -P $PASSWORDS_FILE -o result.html -vvv --timeout 15 --max-retries 10 --threads 1 | tee $NETTACKER_LOG
echo "[*] Nettacker logs saved to $NETTACKER_LOG"
echo "[*] Done. Please review ssh_auth.log and $NETTACKER_LOG for details."