MMM MMM KKK TTTTTTTTTTT KKK
MMMM MMMM KKK TTTTTTTTTTT KKK
MMM MMMM MMM III KKK KKK RRRRRR OOOOOO TTT III KKK KKK
MMM MM MMM III KKKKK RRR RRR OOO OOO TTT III KKKKK
MMM MMM III KKK KKK RRRRRR OOO OOO TTT III KKK KKK
MMM MMM III KKK KKK RRR RRR OOOOOO TTT III KKK KKK
MikroTik RouterOS 6.27 (c) 1999-2015 https://www.mikrotik.com/
[?] Gives the list of available commands
command [?] Gives help on the command and list of arguments
[Tab] Completes the command/word. If the input is ambiguous,
a second [Tab] gives possible options
/ Move up to base level
.. Move up one level
/command Use command at the base level
[root@Mikrotik] > system ssh address=192.168.100.4 user=root port=22
password:
Welcome back!
[root@Mikrotik] > system ssh address=192.168.100.4 user=root port=22
Welcome back!
[root@Mikrotik] > system ssh address=192.168.100.4 user=root port=22
Welcome back!
root@kali:~# /etc/init.d/ssh status
● ssh.service - OpenBSD Secure Shell server
Loaded: loaded (/lib/systemd/system/ssh.service; enabled)
Active: active (running) since mié 2015-07-08 20:55:32 CEST; 54s ago
Main PID: 32542 (sshd)
CGroup: /system.slice/ssh.service
└─32542 /usr/sbin/sshd -D
jul 08 20:55:32 kali sshd[32542]: Server listening on 0.0.0.0 port 22.
jul 08 20:55:32 kali sshd[32542]: Server listening on :: port 22.
jul 08 20:55:37 kali sshd[32496]: Connection closed by 192.168.100.5 [preauth]
jul 08 20:55:38 kali sshd[32564]: fatal: no matching cipher found: client aes192-cbc,aes128-cbc,aes256-cbc,blowfish-cbc,3des-cbc serv...preauth]
jul 08 20:56:10 kali sshd[32595]: fatal: no matching cipher found: client aes192-cbc,aes128-cbc,aes256-cbc,blowfish-cbc,3des-cbc serv...preauth]
Hint: Some lines were ellipsized, use -l to show in full.
root@kali:~# grep -v ^# /etc/ssh/sshd_config
Port 22
Protocol 2
HostKey /etc/ssh/ssh_host_rsa_key
HostKey /etc/ssh/ssh_host_dsa_key
HostKey /etc/ssh/ssh_host_ecdsa_key
UsePrivilegeSeparation yes
KeyRegenerationInterval 3600
ServerKeyBits 1024
SyslogFacility AUTH
LogLevel INFO
LoginGraceTime 120
PermitRootLogin yes
StrictModes yes
RSAAuthentication yes
PubkeyAuthentication yes
IgnoreRhosts yes
RhostsRSAAuthentication no
HostbasedAuthentication no
PermitEmptyPasswords no
ChallengeResponseAuthentication no
X11Forwarding yes
X11DisplayOffset 10
PrintMotd no
PrintLastLog yes
TCPKeepAlive yes
AcceptEnv LANG LC_*
Subsystem sftp /usr/lib/openssh/sftp-server
UsePAM yes
root@kali:~# vi /etc/ssh/sshd_config
root@kali:~# grep -v ^# /etc/ssh/sshd_config
Port 22
Protocol 2
HostKey /etc/ssh/ssh_host_rsa_key
HostKey /etc/ssh/ssh_host_dsa_key
HostKey /etc/ssh/ssh_host_ecdsa_key
UsePrivilegeSeparation yes
KeyRegenerationInterval 3600
ServerKeyBits 1024
SyslogFacility AUTH
LogLevel INFO
LoginGraceTime 120
PermitRootLogin yes
StrictModes yes
RSAAuthentication yes
PubkeyAuthentication yes
IgnoreRhosts yes
RhostsRSAAuthentication no
HostbasedAuthentication no
PermitEmptyPasswords no
ChallengeResponseAuthentication no
X11Forwarding yes
X11DisplayOffset 10
PrintMotd no
PrintLastLog yes
TCPKeepAlive yes
AcceptEnv LANG LC_*
Subsystem sftp /usr/lib/openssh/sftp-server
UsePAM yes
Ciphers aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com,chacha20-poly1305@openssh.com,blowfish-cbc,aes128-cbc,3des-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc
root@kali:~# /etc/init.d/ssh restart
[ ok ] Restarting ssh (via systemctl): ssh.service.
root@kali:~# /etc/init.d/ssh status
● ssh.service - OpenBSD Secure Shell server
Loaded: loaded (/lib/systemd/system/ssh.service; enabled)
Active: active (running) since mié 2015-07-08 20:56:55 CEST; 5s ago
Main PID: 32661 (sshd)
CGroup: /system.slice/ssh.service
└─32661 /usr/sbin/sshd -D
jul 08 20:56:55 kali sshd[32661]: Server listening on 0.0.0.0 port 22.
jul 08 20:56:55 kali sshd[32661]: Server listening on :: port 22.
[root@Mikrotik] > system ssh address=192.168.100.4 user=root port=22
password: