mirror of
https://github.com/mgeeky/Penetration-Testing-Tools.git
synced 2024-11-22 10:31:38 +01:00
Updated README on malleable_redirector and proxy2 submodules.
This commit is contained in:
parent
875e521922
commit
ce9ae70957
@ -24,8 +24,9 @@ Use wisely, stay safe.
|
|||||||
|
|
||||||
### Example usage
|
### Example usage
|
||||||
|
|
||||||
|
All settings were moved to the external file:
|
||||||
```
|
```
|
||||||
$ python3 proxy2.py -P 80/http -P 443/https -p plugins/malleable_redirector.py --profile jquery-c2.3.14.profile --teamserver-url 1.2.3.4:8080 -v
|
$ python3 proxy2.py --config example-config.yaml
|
||||||
|
|
||||||
[INFO] 19:21:42: Loading 1 plugin...
|
[INFO] 19:21:42: Loading 1 plugin...
|
||||||
[INFO] 19:21:42: Plugin "malleable_redirector" has been installed.
|
[INFO] 19:21:42: Plugin "malleable_redirector" has been installed.
|
||||||
@ -54,6 +55,26 @@ $ python3 proxy2.py -P 80/http -P 443/https -p plugins/malleable_redirector.py -
|
|||||||
[...]
|
[...]
|
||||||
```
|
```
|
||||||
|
|
||||||
|
Where **example-config.yaml** contains:
|
||||||
|
|
||||||
|
```
|
||||||
|
plugin: malleable_redirector
|
||||||
|
verbose: True
|
||||||
|
|
||||||
|
port:
|
||||||
|
- 80/http
|
||||||
|
- 443/https
|
||||||
|
|
||||||
|
profile: jquery-c2.3.14.profile
|
||||||
|
|
||||||
|
# Let's Encrypt certificates
|
||||||
|
ssl_cacert: /etc/letsencrypt/live/attacker.com/fullchain.pem
|
||||||
|
ssl_cakey: /etc/letsencrypt/live/attacker.com/privkey.pem
|
||||||
|
|
||||||
|
teamserver_url:
|
||||||
|
- 1.2.3.4:8080
|
||||||
|
```
|
||||||
|
|
||||||
The above output contains a line pointing out that there has been an unauthorized, not compliant with our C2 profile inbound request, which got dropped due to incompatible User-Agent string presented:
|
The above output contains a line pointing out that there has been an unauthorized, not compliant with our C2 profile inbound request, which got dropped due to incompatible User-Agent string presented:
|
||||||
```
|
```
|
||||||
[...]
|
[...]
|
||||||
@ -61,6 +82,175 @@ The above output contains a line pointing out that there has been an unauthorize
|
|||||||
[...]
|
[...]
|
||||||
```
|
```
|
||||||
|
|
||||||
|
|
||||||
|
### Plugin options
|
||||||
|
|
||||||
|
Following options are supported:
|
||||||
|
|
||||||
|
```
|
||||||
|
#
|
||||||
|
# ====================================================
|
||||||
|
# malleable_redirector plugin related settings
|
||||||
|
# ====================================================
|
||||||
|
#
|
||||||
|
|
||||||
|
#
|
||||||
|
# (Required) Path to the Malleable C2 profile file.
|
||||||
|
#
|
||||||
|
profile: cs.example.profile
|
||||||
|
|
||||||
|
#
|
||||||
|
# (Required) Address where to redirect legitimate inbound beacon requests.
|
||||||
|
# A.k.a. TeamServer's Listener bind address, in a form of:
|
||||||
|
# [inport:][http(s)://]host:port
|
||||||
|
#
|
||||||
|
# If proxy2 was configured to listen on more than one port, specifying "inport" will
|
||||||
|
# help the plugin decide to which teamserver's listener redirect inbound request.
|
||||||
|
#
|
||||||
|
# If 'inport' values are not specified in the below option (teamserver_url) the script
|
||||||
|
# will pick destination teamserver at random.
|
||||||
|
#
|
||||||
|
# Having proxy2 listening on only one port does not mandate to include the "inport" part.
|
||||||
|
# This field can be either string or list of strings.
|
||||||
|
#
|
||||||
|
teamserver_url:
|
||||||
|
- 1.2.3.4:5555
|
||||||
|
|
||||||
|
#
|
||||||
|
# What to do with the request originating from anyone else than the beacon:
|
||||||
|
# - redirect (HTTP 301),
|
||||||
|
# - reset TCP connection
|
||||||
|
# - proxy to act as a reverse-proxy (dangerous!)
|
||||||
|
# Valid values: 'reset', 'redirect', 'proxy'.
|
||||||
|
#
|
||||||
|
# Defaults to: redirect
|
||||||
|
#
|
||||||
|
drop_action: redirect
|
||||||
|
|
||||||
|
#
|
||||||
|
# If someone who is not a beacon hits the proxy, or the inbound proxy does not meet
|
||||||
|
# malleable profile's requirements - where we should proxy/redirect his requests.
|
||||||
|
#
|
||||||
|
# Default: https://google.com
|
||||||
|
#
|
||||||
|
action_url: https://google.com
|
||||||
|
|
||||||
|
#
|
||||||
|
# Log full bodies of dropped requests.
|
||||||
|
#
|
||||||
|
# Default: False
|
||||||
|
#
|
||||||
|
log_dropped: False
|
||||||
|
|
||||||
|
#
|
||||||
|
# Ban peers based on their IPv4 address. The blacklist with IP address to check against is specified
|
||||||
|
# in 'ip_addresses_blacklist_file' option.
|
||||||
|
#
|
||||||
|
# Default: True
|
||||||
|
#
|
||||||
|
ban_blacklisted_ip_addresses: True
|
||||||
|
|
||||||
|
#
|
||||||
|
# Specifies external list of CIDRs with IPv4 addresses to ban. Each entry in that file
|
||||||
|
# can contain a single IPv4, a CIDR or a line with commentary in following format:
|
||||||
|
# 1.2.3.4/24 # Super Security System
|
||||||
|
#
|
||||||
|
# Default: plugins/malleable_banned_ips.txt
|
||||||
|
#
|
||||||
|
ip_addresses_blacklist_file: plugins/malleable_banned_ips.txt
|
||||||
|
|
||||||
|
#
|
||||||
|
# Ban peers based on their IPv4 address' resolved ISP/Organization value or other details.
|
||||||
|
# Whenever a peer connects to our proxy, we'll take its IPv4 address and use one of the specified
|
||||||
|
# APIs to collect all the available details about the address. Whenever a banned word
|
||||||
|
# (of a security product) is found in those details - peer will be banned.
|
||||||
|
# List of API keys for supported platforms are specified in ''. If there are no keys specified,
|
||||||
|
# only providers that don't require API keys will be used (e.g. ip-api.com, ipapi.co)
|
||||||
|
#
|
||||||
|
# Default: True
|
||||||
|
#
|
||||||
|
verify_peer_ip_details: True
|
||||||
|
|
||||||
|
#
|
||||||
|
# Specifies a list of API keys for supported API details collection platforms.
|
||||||
|
# If 'verify_peer_ip_details' is set to True and there is at least one API key given in this option, the
|
||||||
|
# proxy will collect details of inbound peer's IPv4 address and verify them for occurences of banned words
|
||||||
|
# known from various security vendors. Do take a note that various API details platforms have their own
|
||||||
|
# thresholds for amount of lookups per month. By giving more than one API keys, the script will
|
||||||
|
# utilize them in a random order.
|
||||||
|
#
|
||||||
|
# To minimize number of IP lookups against each platform, the script will cache performed lookups in an
|
||||||
|
# external file named 'ip-lookups-cache.json'
|
||||||
|
#
|
||||||
|
# Supported IP Lookup providers:
|
||||||
|
# - ip-api.com: No API key needed, free plan: 45 requests / minute
|
||||||
|
# - ipapi.co: No API key needed, free plan: up to 30000 IP lookups/month and up to 1000/day.
|
||||||
|
# - ipgeolocation.io: requires an API key, up to 30000 IP lookups/month and up to 1000/day.
|
||||||
|
#
|
||||||
|
# Default: empty dictionary
|
||||||
|
#
|
||||||
|
ip_details_api_keys:
|
||||||
|
ipgeolocation_io:
|
||||||
|
|
||||||
|
|
||||||
|
#
|
||||||
|
# Restrict incoming peers based on their IP Geolocation information.
|
||||||
|
# Available only if 'verify_peer_ip_details' was set to True.
|
||||||
|
# IP Geolocation determination may happen based on the following supported characteristics:
|
||||||
|
# - organization,
|
||||||
|
# - continent,
|
||||||
|
# - continent_code,
|
||||||
|
# - country,
|
||||||
|
# - country_code,
|
||||||
|
# - city,
|
||||||
|
# - timezone
|
||||||
|
#
|
||||||
|
# The Peer will be served if at least one geolocation condition holds true for him
|
||||||
|
# (inclusive/alternative arithmetics).
|
||||||
|
#
|
||||||
|
# If no determinants are specified, IP Geolocation will not be taken into consideration while accepting peers.
|
||||||
|
# If determinants are specified, only those peers whose IP address matched geolocation determinants will be accepted.
|
||||||
|
#
|
||||||
|
# Each of the requirement values may be regular expression. Matching is case-insensitive.
|
||||||
|
#
|
||||||
|
# Following (continents_code, continent) pairs are supported:
|
||||||
|
# ('AF', 'Africa'),
|
||||||
|
# ('AN', 'Antarctica'),
|
||||||
|
# ('AS', 'Asia'),
|
||||||
|
# ('EU', 'Europe'),
|
||||||
|
# ('NA', 'North america'),
|
||||||
|
# ('OC', 'Oceania'),
|
||||||
|
# ('SA', 'South america)'
|
||||||
|
#
|
||||||
|
# Proper IP Lookup details values can be established by issuing one of the following API calls:
|
||||||
|
# $ curl -s 'https://ipapi.co/TARGET-IP-ADDRESS/json/'
|
||||||
|
# $ curl -s 'http://ip-api.com/json/TARGET-IP-ADDRESS'
|
||||||
|
#
|
||||||
|
# The organization/isp/as/asn/org fields will be merged into a common organization list of values.
|
||||||
|
#
|
||||||
|
ip_geolocation_requirements:
|
||||||
|
organization:
|
||||||
|
- Some\s+organization
|
||||||
|
continent:
|
||||||
|
continent_code:
|
||||||
|
country:
|
||||||
|
country_code:
|
||||||
|
city:
|
||||||
|
-
|
||||||
|
timezone:
|
||||||
|
|
||||||
|
|
||||||
|
#
|
||||||
|
# List of whitelisted IP addresses/CIDR ranges.
|
||||||
|
# Inbound packets from these IP address/ranges will always be passed towards specified TeamServer without
|
||||||
|
# any sort of verification or validation.
|
||||||
|
#
|
||||||
|
whitelisted_ip_addresses:
|
||||||
|
- 127.0.0.0/24
|
||||||
|
|
||||||
|
```
|
||||||
|
|
||||||
|
|
||||||
### TODO:
|
### TODO:
|
||||||
|
|
||||||
- Add some unique beacons tracking logic to offer flexilibity of refusing staging and communication processes at the proxy's own discretion
|
- Add some unique beacons tracking logic to offer flexilibity of refusing staging and communication processes at the proxy's own discretion
|
||||||
|
@ -1 +1 @@
|
|||||||
Subproject commit d367e28c4928544793580a5a381d49699f0752e6
|
Subproject commit 088ae5c18ff8b9a86d2f9496dce6b14018d32897
|
@ -1 +1 @@
|
|||||||
Subproject commit d367e28c4928544793580a5a381d49699f0752e6
|
Subproject commit 088ae5c18ff8b9a86d2f9496dce6b14018d32897
|
Loading…
Reference in New Issue
Block a user