botnet mode

15
OWASP OWTF Implementation owtf Botnet mode module. Marios Kourtesis Mentor: Abraham Aranguren

Upload: marioskourt

Post on 30-Aug-2014

389 views

Category:

Technology


0 download

DESCRIPTION

 

TRANSCRIPT

Page 1: Botnet mode

OWASP OWTF

Implementation owtf Botnet mode module.

Marios Kourtesis

Mentor: Abraham Aranguren

Page 2: Botnet mode

Table of Contents

● What is Botnet Mode

● How it works

● TOR mode

– Advantages

– Disadvantages

● Proxy List mode

– ProxyMiner

– ProxyManager

– Advantages

– Disadvantages

– Proxy List mode Diagram

● Behind The Scenes

● Sources

Page 3: Botnet mode

What it Botnet Mode?

The main purpose of this feature is to detour potential ip-filtering that defenders might attempt in order to prevent our scan.

When it is enabled it applies anonymity to all tools that are used from OWTF.

Page 4: Botnet mode

How it Works

Botnet mode works in two different ways.

● TOR mode

– Each Http request will pass thow TOR Network[1].

● Proxy List mode

– Each Http request will pass throw a different proxy.

Page 5: Botnet mode

TOR mode

● Starts TOR daemon.

● Every request passes throw TOR network.

● User can configure in how many time to automatically change his IP address.

● User can configure after how many request wants to change his IP address.

Page 6: Botnet mode

TOR mode Advantages

● High level of anonymity.

● Good option for professional testing without privileges.

Page 7: Botnet mode

TOR mode Disadvantages

● TOR network is very slow.

● Some TOR proxy routers are owned by government.

Page 8: Botnet mode

Proxy List mode

● Each Http request will pass throw a different proxy.

● Support public and private proxy lists.

● The proxies could be imported as a list.

● The proxies also could be fetched automatically with the ProxyMiner* from the web.

● Recovery support for dead proxies.

*ProxyMiner(Described in the next slides)

Page 9: Botnet mode

ProxyMiner

ProxyMiner is a feature that searches on the web for proxies and passes them to ProxyManager(next slide). By the time you have enabled Botnet mode, ProxyMiner will ask user if he wants to start the mining process before the scanning process begins.

● It runs continuously and mines proxies(optionally).

● It has a big list of websites that contain proxies.

● Handles dead proxies.

Page 10: Botnet mode

ProxyManager

Proxy manager handles all proxies that are passed from ProxyMiner or imported from a list.

● It is responsible to handle dead proxies.

● It sorts proxies by speed or country.

● It puts dead proxies in a blacklist.

● It keeps Statistics about proxies.

Page 11: Botnet mode

Proxy List mode Advantages

● High speed scan.

● Provides better anonymity level than using a simple proxy.

● You can have proxies list automatically.

● If you don't trust ProxyMiner's proxies you can import your proxy list.

Page 12: Botnet mode

Proxy List mode Disadvantages

● Proxies mined from the web are not confidential.

Page 13: Botnet mode

Proxy List mode diagram

Page 14: Botnet mode

Behind the Scenes

● For the Data mining process i will use Beautiful Soup(python library[2]). Beautiful soup is implemented in both python 2.7 and python 3 so it is a great choice for future plan of porting owtf to python 3.

● The data structure for the proxy list will be the following:

(ip, port, speed, country, type,send_requests, user, password)

● The implementation will use the MiTM proxy[3].

Page 15: Botnet mode

Sources

● [1]”TOR”, url: [ https://www.torproject.org/about/overview.html.en ]

● [2]”Beautiful Soup Documentation”, url: [http://www.crummy.com/software/BeautifulSoup/bs4/doc/]

● [3]”MiTM Proxy”, url: [http://www.slideshare.net/abrahamaranguren/owasp-owtf-summer-storm-owasp-appsec-eu-2013], pp. 43-53.