This repository has been archived by the owner on Jan 2, 2023. It is now read-only.
-
Notifications
You must be signed in to change notification settings - Fork 71
/
users.cfg.default
42 lines (42 loc) · 1.51 KB
/
users.cfg.default
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
# User Definition Config File
#
# https://github.com/tnich/honssh/wiki/Password-Spoofing
#
# User authentication spoofing can be defined with two ways - fixed and/or random.
#
# For the fixed mode, you must supply a list of valid passwords that will be accepted.
# For the random mode, you must supply a random chance. In this mode, every password entered has a random chance of being correct.
#
# General note:
# Access is always granted if supplied password matches real_password of corresponding user.
#
# Special note for random mode:
# Random mode will first consider successful user/pass combinations from the past (contained in spoof.log)
# and then do the chance algorithm.
#
#
# Fixed User Example
# [root]
# real_password = toor
# fake_passwords = fakePass1, fakePass2, fakePass3
#
# This will allow a user to login with root:fakePass1, root:fakePass2, root:fakePass3
# real_password is the real password for HonSSH to substitute in.
#
#
# Random User Example
# [peg]
# real_password = 123456
# random_chance = 25
#
# This will allow a user to login as peg, and 25% of the passwords attempted will be accepted as valid.
# real_password is the real password for HonSSH to substitute in.
#
# Fixed and Random User Example
# [root]
# real_password = toor
# fake_passwords = fakePass1, fakePass2, fakePass3
# random_chance = 25
#
# This will allow a user to login with root:fakePass1, root:fakePass2, root:fakePass3 and 25% of the passwords attempted will be accepted as valid
# real_password is the real password for HonSSH to substitute in.