Added plugins

pull/3/head
Thorsten Sick 3 years ago
parent 9fc86e9a87
commit 1c03ac4dcf

@ -0,0 +1,39 @@
Plugin reasoning and planning. To be deleted later.
Which parts to make into plugins
================================
* Everything that could be contributed by external people
* Very specialized features
At the moment those are:
* kali attacks
* sensors
* vm_controllers
* post_processors
Parts of a plugin
=================
* Plugin specific configuration
* The plugin python code
* Additional files and tools to be used by the plugin
Therefore: We need a specific folder for every plugin
We want out own plugins plus external plugins to throw in. So we will have a default folder for plugins (ours) and additional folders with names chosen by external people. Plugins must be searched in those folders.
Picking and loading plugins
===========================
* the experiment.yaml config specifies the plugins to use
Found plugin interfaces
=======================
https://github.com/ironfroggy/straight.plugin
https://github.com/tibonihoo/yapsy ( -: not maintained anymore, sourceforge)
https://github.com/pytest-dev/pluggy/ ( -: not maintained anymore; +: used by tox and similar)

@ -0,0 +1 @@
The hydra plugin remote controls the hydra tool. Hydra is able to brute force a number of protocols. Where especially ssh is relevant.

@ -0,0 +1,68 @@
#!/usr/bin/env python3
# A plugin for hydra bruteforce attacks
from plugins.base.kali import KaliPlugin
class HydraPlugin(KaliPlugin):
# Boilerplate
name = "hydra"
description = "A plugin controlling the hydra brute forcing tool"
ttp = "T1110"
references = ["https://attack.mitre.org/techniques/T1110/"]
required_files = ["passwords.txt", "users.txt"] # Files shipped with the plugin which are needed by the kali tool. Will be copied to the kali share
def __init__(self):
super().__init__()
self.plugin_path = __file__
# print("Init hydra")
def process_config(self, config):
""" process config and use defaults if stuff is missing
@param config: The config dict
"""
# TODO Create kali specific config class, send this to the plugins
self.conf["protocols"] = config.get("protocols", ["ssh"])
self.conf["userfile"] = config.get("userfile", "users.txt")
self.conf["pwdfile"] = config.get("pwdfile", "passwords.txt")
def command(self, targets, config):
""" Generate the command (having a separate step assists on debugging)
@param targets: A list of targets, ip addresses will do
@param config: dict with command specific configuration
"""
# Set defaults if not present in config
self.process_config(config)
playground = self.machine_plugin.get_playground()
# Generate command
cmd = f"cd {playground};"
cmd += "sudo apt -y install hydra;"
for t in targets:
for p in self.conf['protocols']:
cmd += f"hydra -L {self.conf['userfile']} -P {self.conf['pwdfile']} {p}://{t};"
return cmd
def run(self, targets, config):
""" Run the command
@param targets: A list of targets, ip addresses will do
@param config: dict with command specific configuration
"""
# print("running hydra as plugin")
cmd = self.command(targets, config)
# res += str(self.run_cmd(cmd).stdout.strip())
res = self.run_cmd(cmd) or ""
# print("hydra done")
return res

@ -0,0 +1,8 @@
12345
qwert
qwertz
qwerty
password
passw0rd
swordfish
test

@ -0,0 +1,5 @@
test
root
password
nonexistend_user_1
nonexistend_user_2

@ -0,0 +1,79 @@
#!/usr/bin/env python3
# A plugin to nmap targets
from plugins.base.kali import KaliPlugin
# TODO All scan patterns need explicit logging into the attack log !
# TODO: Add config for subnet range for ping sweeps
# TODO: Add IP exclusion --exclude ip,ip,ip to not accidentially scan non-targets
# TODO: host discovery Ping scan: -sn
# TODO: host discovery PE/PP/PM
# TODO: host discovery PS/PA/PU/PY
# TODO: host discovery reverse DNS resolution
# TODO OS identification
# TODO service discovery
# TODO stealth scans
# TODO firewall evasion
# TODO service fingerprinting
# TODO udp scans -sU
# TODO TCP SYN scan: -sS
# TODO TCP connect scan: -sT
# TODO port scan without prior ping (this is to avoid triggering firewall logic): -Pn
class NmapPlugin(KaliPlugin):
# Boilerplate
name = "nmap"
description = "NMap scan the target"
ttp = "T1595"
references = ["https://attack.mitre.org/techniques/T1595/"]
required_files = [] # Files shipped with the plugin which are needed by the kali tool. Will be copied to the kali share
def __init__(self):
super().__init__()
self.plugin_path = __file__
def process_config(self, config):
""" process config and use defaults if stuff is missing
@param config: The config dict
"""
# TODO Create kali specific config class, send this to the plugins
# TODO: NMap specific config should be added. So far we only have the basic scan
def command(self, targets, config):
""" Generate the command (having a separate step assists on debugging)
@param targets: A list of targets, ip addresses will do
@param config: dict with command specific configuration
"""
# Set defaults if not present in config
self.process_config(config)
playground = self.machine_plugin.get_playground()
# Generate command
cmd = f"cd {playground};"
# cmd += "sudo apt -y install nmap;"
for t in targets:
cmd += f"nmap {t};"
return cmd
def run(self, targets, config):
""" Run the command
@param targets: A list of targets, ip addresses will do
@param config: dict with command specific configuration
"""
res = ""
cmd = self.command(targets, config)
res += self.run_cmd(cmd) or ""
return res

@ -0,0 +1,44 @@
#!/usr/bin/env python3
# Some users are created (with weak passwords) and sshd is set to allow password-based access
from plugins.base.vulnerability_plugin import VulnerabilityPlugin
class SshdVulnerability(VulnerabilityPlugin):
# Boilerplate
name = "sshd_config_vul"
description = "Allowing passwords based sshd access"
ttp = "T1110"
references = ["https://attack.mitre.org/techniques/T1110/"]
required_files = [] # Files shipped with the plugin which are needed by the machine. Will be copied to the share
def __init__(self):
super().__init__()
self.plugin_path = __file__
def start(self):
# allow password access via ssh
cmd = "sudo sed -i 's/PasswordAuthentication no/PasswordAuthentication yes/g' /etc/ssh/sshd_config"
print(cmd)
self.run_cmd(cmd)
# Restart ssh
cmd = "sudo service ssh restart"
print(cmd)
self.run_cmd(cmd)
def stop(self):
# Re-configure sshd to stable state
cmd = "sudo sed -i 's/PasswordAuthentication yes/PasswordAuthentication no/g' /etc/ssh/sshd_config"
print(cmd)
self.run_cmd(cmd)
# Restart ssh
cmd = "sudo service ssh restart"
print(cmd)
self.run_cmd(cmd)

@ -0,0 +1,93 @@
#!/usr/bin/env python3
# Some users are created (with weak passwords) and sshd is set to allow password-based access
from plugins.base.vulnerability_plugin import VulnerabilityPlugin
class WeakPasswordVulnerabilityVulnerability(VulnerabilityPlugin):
# Boilerplate
name = "weak_user_passwords"
description = "Adding users with weak passwords"
ttp = "T1110"
references = ["https://attack.mitre.org/techniques/T1110/"]
required_files = [] # Files shipped with the plugin which are needed by the machine. Will be copied to the share
def __init__(self):
super().__init__()
self.plugin_path = __file__
def start(self):
if self.machine_plugin.config.os() == "linux":
# Add vulnerable user
# mkpasswd -m sha-512 # To calc the passwd
# This is in the debian package "whois"
# user with password "test"
cmd = "useradd -m -p '$6$bc4k4Tq2.1GW$0ysyuxyfyds2JkfVEf9xHy39MhpS.hhnAo4sBLprNfIHqcpaa9GJseRJJsrq0cSOWwYlOPrdHQNHp10E1ekO81' -s /bin/bash test"
print(cmd)
self.run_cmd(cmd)
# user with password "passw0rd"
cmd = "useradd -m -p '$6$q5PAnDI5K0uv$hMGMJQleeS9F2yLOiHXs2PxZHEmV.ook8jyWILzDGDxSTJmTTZSe.QgLVrnuwiyAl5PFJVARkMsSnPICSndJR1' -s /bin/bash password"
print(cmd)
self.run_cmd(cmd)
elif self.machine_plugin.config.os() == "windows":
# net user username password /add
cmd = "net user test test /add"
print(cmd)
self.run_cmd(cmd)
cmd = "net user password passw0rd /add"
print(cmd)
self.run_cmd(cmd)
# Adding the new users to RDP (just in case we want to test RDP)
cmd = """NET LOCALGROUP "Remote Desktop Users" password /ADD"""
print(cmd)
self.run_cmd(cmd)
cmd = """NET LOCALGROUP "Remote Desktop Users" test /ADD"""
print(cmd)
self.run_cmd(cmd)
else:
raise NotImplementedError
def stop(self):
if self.machine_plugin.config.os() == "linux":
# Remove user
cmd = "sudo userdel -r test"
print(cmd)
self.run_cmd(cmd)
# Remove user
cmd = "sudo userdel -r password"
print(cmd)
self.run_cmd(cmd)
elif self.machine_plugin.config.os() == "windows":
# net user username /delete
cmd = "net user test /delete"
print(cmd)
self.run_cmd(cmd)
cmd = "net user password /delete"
print(cmd)
self.run_cmd(cmd)
# Remove the new users to RDP (just in case we want to test RDP)
cmd = """NET LOCALGROUP "Remote Desktop Users" password /DELETE"""
print(cmd)
self.run_cmd(cmd)
cmd = """NET LOCALGROUP "Remote Desktop Users" test /DELETE"""
print(cmd)
self.run_cmd(cmd)
else:
raise NotImplementedError

@ -0,0 +1,45 @@
#!/usr/bin/env python3
# Enable RDP for users
# https://pureinfotech.com/enable-remote-desktop-command-prompt-windows-10/
from plugins.base.vulnerability_plugin import VulnerabilityPlugin
class RDPVulnerability(VulnerabilityPlugin):
# Boilerplate
name = "rdp_config_vul"
description = "Allowing rdp access"
ttp = "T1110"
references = ["https://attack.mitre.org/techniques/T1110/"]
required_files = [] # Files shipped with the plugin which are needed by the machine. Will be copied to the share
def __init__(self):
super().__init__()
self.plugin_path = __file__
def start(self):
# allow password access via rdp
cmd = r"""reg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server" /v fDenyTSConnections /t REG_DWORD /d 0 /f"""
print(cmd)
self.run_cmd(cmd)
# Open Firewall
cmd = """netsh advfirewall firewall set rule group="remote desktop" new enable=Yes"""
print(cmd)
self.run_cmd(cmd)
def stop(self):
# Re-configure sshd to stable state
cmd = r"""reg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server" /v fDenyTSConnections /t REG_DWORD /d 1 /f"""
print(cmd)
self.run_cmd(cmd)
# Reset firewall
cmd = """netsh advfirewall firewall set rule group="remote desktop" new enable=No"""
print(cmd)
self.run_cmd(cmd)
Loading…
Cancel
Save