- Notifications
You must be signed in to change notification settings - Fork2
Simple Probing Tool for Corporate Walled Garden Networks
License
DCSO/mauerspecht
Folders and files
Name | Name | Last commit message | Last commit date | |
---|---|---|---|---|
Repository files navigation
+(*-> | | <-*)+())| | Mauerspecht | |(()+ \"| | thcepsreuaM | |"/
The Problem: Network sensors such asSuricata orZeekhave been successfully deployed in a large network, but the rate ofalarms or other useful information is suspiciously low -- not even theusual background noise can be seen. Can we be sure that our sensorsare fed all the relevant traffic?
An attempt at a solution: Let's generate some network traffic and seeif we can transmit some magic strings to and from the outside worldbeyond our walled garden network -- and if we are able to detect thoseusing our sensors.
From a user perspective:
- Generate a server configuration file that defines TCP ports andmagic strings to exchange (see below for an example). Configurematching alerting rules in the network sensors.
- Start the server on a publicly accessible host.
- Start clients with the
-server
parameter pointing to one of theHTTP ports served by the server. - Analyze logs generated by the server and the network sensors.
The server writes its log output to standard error.
What happens behind the scenes:
- On startup, both server and client generate private/public NaCL keypairs.
- The client posts its public key to the server and receives theserver's public key
- The client requests the server's configuration. The configurationis signed/encrypted to circumvent tampering by middleboxes.
- The client runs a few experiments, expecting every configured magicstrings to be correctly transmitted via a special header, a CookieorSet-Cookie header, the message body.
- The client posts its findings to the server.
{ "hostname": "mauerspecht.example.com", "http-ports": [8080, 18080], "magic-strings": [ "unique-match-string-18475910", "START_KEYLOGGER", "X5O!P%@AP[4\\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*" ]}
Client:
-server string Server URL (default "http://localhost:8080") -proxy string Proxy URL
Server:
-config string Config file (default "mauerspecht.json")
For recent Go versions, simply runningmake all
from the Git checkout issufficient.
The following binaries will be generated:
mauerspecht-server
: The server component, a Linux/x86-64 binarymauerspecht-client-$ARCH
: The clients, for various architectures
- HTTPS -- self-signed server certificates, possible use of client certificates
- Non-HTTP protocols (IRC?)
- The server stores session keys submitted by clients in memory and doesnot expire them yet. This is a denial-of-service vector.
- Bundled client configuration for easy single-binary deployment (seealso:spyre)
Sascha Steinbiss <sascha.steinbiss@dcso.de>
Original Author: Hilko Bengen
Copyright 2019, 2024 Deutsche Cyber-Sicherheitsorganisation GmbH
This program is free software: you can redistribute it and/or modifyit under the terms of the GNU General Public License as published bythe Free Software Foundation, either version 3 of the License, or(at your option) any later version.
This program is distributed in the hope that it will be useful,but WITHOUT ANY WARRANTY; without even the implied warranty ofMERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See theGNU General Public License for more details.
You should have received a copy of the GNU General Public Licensealong with this program. If not, seehttp://www.gnu.org/licenses/.
About
Simple Probing Tool for Corporate Walled Garden Networks
Resources
License
Uh oh!
There was an error while loading.Please reload this page.
Stars
Watchers
Forks
Packages0
Uh oh!
There was an error while loading.Please reload this page.
Contributors4
Uh oh!
There was an error while loading.Please reload this page.