All of know that we can authenticate to a box without password if you have the SSH keys.
The Kali images have known ssh keys and must be changed.
Here is how you can do this:
Move the default Kali ssh keys to a new folder:
cd /etc/ssh/
mkdir default_kali_keys
mv ssh_host_* default_kali_keys/
This will move your default keys to the new folder...
Regenerate the keys:
dpkg-reconfigure openssh-server
Creating SSH2 RSA key; this may take some time ...
Creating SSH2 DSA key; this may take some time ...
Creating SSH2 ECDSA key; this may take some time ...
insserv: warning: current start runlevel(s) (empty) of script `ssh' overrides LSB defaults (2 3 4 5).
insserv: warning: current stop runlevel(s) (2 3 4 5) of script `ssh' overrides LSB defaults (empty).
Verify ssh key hashes are different:
md5sum ssh_host_*
Compare new key hashes to the hashes below)
cd default_kali_keys/
md5sum *
b9419ea3a8fff086c258740e89ca86b8 ssh_host_dsa_key
f9a5b57d7004e3740d07c5b037d15730 ssh_host_dsa_key.pub
58e49e0d7b24249c38db0c9cf595751b ssh_host_ecdsa_key
597c83fabf3c1e4f2c7af74af05ac671 ssh_host_ecdsa_key.pub
cc0d92036bb86797bed354338faa7223 ssh_host_rsa_key
cc9ddc90b891b5251ed4ea8341495e84 ssh_host_rsa_key.pub
pretty simple to secure !
By Default the Kali has ssshd config as PermitRootLogin without-password
This will disallow user to login with root password remotely. If you want to accesss your kali box
remotely over ssh and login using the root password then do nano /etc/ssh/sshd_config
and change "PermitRootLogin without-password" to "PermitRootLogin yes".
However, this is a less preferred option as this can allow anyone to login who has your root passworrd.
A more preferred option is to change the SSH keys as shown above and then add your public key to the/root/.ssh/authorized_keys file.
I would also go ahead and change the default ssh port from 22 to something different like 2224 or something.
With the above config even if someone tries to attack your Kali box with brute force to gain access to the root password there is little use....The ssh login using password is disabled. The attacker will need to try and brute force the ssh keys - heaps of effort and patience required.
Comments
Post a Comment