-
-
Notifications
You must be signed in to change notification settings - Fork 952
Description
While reviewing the SSH brute force module, I noticed a logic issue that may lead to false positive results.
In modules/brute/ssh.yaml, the successful_login condition is defined with an empty regex:
response:
condition_type: or
conditions:
successful_login:
regex: ''
reverse: falseAn empty regex matches any response, meaning failed authentication attempts, errors, or banners could be interpreted as successful logins.
Impact:
• False positives in SSH brute force scans
• Misleading output for users
• Unreliable detection of successful authentication
Suggestions:
• Define a proper success pattern (if exposed by the SSH library)
• Or remove/disable the success condition until a reliable indicator is available
• Or document the limitation explicitly
Environment:
• OS: macOS
• Module: modules/brute/ssh.yaml
Related issues:
- Nettacker ssh_brute module detects SSH port but no success output despite valid credentials #1165 (ssh_brute does not report successful login)
- ssh_brute module detects target but shows no success events despite valid credentials #1166 (ssh_brute detects SSH but no success events)
This issue focuses specifically on a logic/configuration problem in the module definition that may contribute to unreliable results.
Found during manual review of modules.