jeudi 29 décembre 2016

BLUTO - DNS RECON, DNS ZONE TRANSFER, AND EMAIL ENUMERATION

BLUTO - DNS RECON, DNS ZONE TRANSFER, AND EMAIL ENUMERATION

BLUTO DNS recon | Brute forcer | DNS Zone Transfer | Email Enumeration

The target domain is queried for MX and NS records. Sub-domains are passively gathered via NetCraft. The target domain NS records are each queried for potential Zone Transfers. If none of them gives up their spinach, Bluto will brute force subdomains using parallel sub processing on the top 20000 of the 'The Alexa Top 1 Million subdomains'. NetCraft results are presented individually and are then compared to the brute force results, any duplications are removed and particularly interesting results are highlighted.

Bluto now does email address enumeration based on the target domain, currently using Bing and Google search engines. It is configured in such a way to use a randomUser Agent: on each request and does a country look up to select the fastest Google server in relation to your egress address. Each request closes the connection in an attempt to further avoid captchas, however exsesive lookups will result in captchas (Bluto will warn you if any are identified).

Bluto requires various other dependencies. So to make things as easy as possible, pip is used for the installation. This does mean you will need to have pip installed prior to attempting the Bluto install.

Pip Install Instructions 
Note: To test if pip is already installed execute. 
  pip -V

(1) Mac and Kali users can simply use the following command to download and install pip
  curl https://bootstrap.pypa.io/get-pip.py -o - | python

Bluto Install Instructions 
(1) Once pip has successfully downloaded and installed, we can install Bluto: 
  sudo pip install git+git://github.com/RandomStorm/Bluto

(2) You should now be able to execute 'bluto' from any working directory in any terminal. 
  bluto

Upgrade Instructions 
(1) The upgrade process is as simple as; 
  sudo pip install git+git://github.com/RandomStorm/Bluto --upgrade


BOHATEI - FLEXIBLE AND ELASTIC DDOS DEFENSE


Bohatei is a first of its kind platform that enables flexible and elastic DDoS defense using SDN and NFV.

The repository contains a first version of the components described in the Bohatei paper, as well as a web-based User Interface. The backend folder consists of :
  • an implementation of the FlowTags framework for the OpenDaylight controller
  • an implementation of the resource management algorithms
  • a topology file that was used to simulate an ISP topology
  • scripts that facilitate functions such as spawning, tearing down and retrieving the topology.
  • scripts that automate and coordinate the components required for the usecases examined.
The frontend folder contains the required files for the web interface.
For the experiments performed, we used a set of VM images that contain implementations of the strategy graphs for each type of attack (SYN Flood, UDP Flood, DNS Amplification and Elephant Flow). Those images will become available at a later stage. The tools that were used for those strategy graphs are the following:


Aucun commentaire:

Enregistrer un commentaire