An ssh server that never authenticates. It grabs the attackers IP address once, so that action may be taken by the user.
1. Generate an RSA public key for use by the server: > ssh-keygen -t rsa 2. Edit config.h to set the desired options. In particular, you must set RSA_KEYFILE to the path to the public key generated in step one. LOGFILE must be set to a location where the user running sshpot can write. 3. Compile the software: > make # make install (optional, but necessary to listen on ports < 1024.)
sshpot [-h] [-p <port>] -h --help Display this usage information. -p --port <port> Port to listen on; defaults to 22.