SlideShare ist ein Scribd-Unternehmen logo
1 von 15
Downloaden Sie, um offline zu lesen
OWASP OWTF

Implementation owtf Botnet mode module.
Marios Kourtesis

Mentor: Abraham Aranguren
Table of Contents
●

What is Botnet Mode

●

How it works

●

TOR mode
–
–

●

Advantages
Disadvantages

Proxy List mode
–

ProxyMiner

–

ProxyManager

–

Advantages

–

Disadvantages

–

Proxy List mode Diagram

●

Behind The Scenes

●

Sources
What it Botnet Mode?
The main purpose of this feature is to detour potential ip-filtering
that defenders might attempt in order to prevent our scan.
When it is enabled it applies anonymity to all tools that are used
from OWTF.
How it Works
Botnet mode works in two different ways.
●

TOR mode
–

●

Each Http request will pass thow TOR
Network[1].

Proxy List mode
–

Each Http request will pass throw a different
proxy.
TOR mode

●

Starts TOR daemon.

●

Every request passes throw TOR network.

●

●

User can configure in how many time to automatically change
his IP address.
User can configure after how many request wants to change his
IP address.
TOR mode Advantages
●

High level of anonymity.

●

Good option for professional testing without privileges.
TOR mode Disadvantages
●

TOR network is very slow.

●

Some TOR proxy routers are owned by government.
Proxy List mode
●

Each Http request will pass throw a different proxy.

●

Support public and private proxy lists.

●

The proxies could be imported as a list.

●

●

The proxies also could be fetched automatically with the
ProxyMiner* from the web.
Recovery support for dead proxies.

*ProxyMiner(Described in the next slides)
ProxyMiner
ProxyMiner is a feature that searches on the web for proxies
and passes them to ProxyManager(next slide). By the time you
have enabled Botnet mode, ProxyMiner will ask user if he
wants to start the mining process before the scanning process
begins.
●

It runs continuously and mines proxies(optionally).

●

It has a big list of websites that contain proxies.

●

Handles dead proxies.
ProxyManager
Proxy manager handles all proxies that are passed from
ProxyMiner or imported from a list.

●

It is responsible to handle dead proxies.

●

It sorts proxies by speed or country.

●

It puts dead proxies in a blacklist.

●

It keeps Statistics about proxies.
Proxy List mode Advantages
●

High speed scan.

●

Provides better anonymity level than using a simple proxy.

●

You can have proxies list automatically.

●

If you don't trust ProxyMiner's proxies you can import your
proxy list.
Proxy List mode Disadvantages
●

Proxies mined from the web are not confidential.
Proxy List mode diagram
Behind the Scenes
●

●

For the Data mining process i will use Beautiful Soup(python
library[2]). Beautiful soup is implemented in both python 2.7 and
python 3 so it is a great choice for future plan of porting owtf to
python 3.
The data structure for the proxy list will be the following:
(ip, port, speed, country, type,send_requests, user, password)

●

The implementation will use the MiTM proxy[3].
Sources
●

●

●

[1]”TOR”, url:
[ https://www.torproject.org/about/overview.html.en ]
[2]”Beautiful Soup Documentation”, url:
[http://www.crummy.com/software/BeautifulSoup/bs4/doc/]
[3]”MiTM Proxy”, url:
[http://www.slideshare.net/abrahamaranguren/owasp-owtfsummer-storm-owasp-appsec-eu-2013], pp. 43-53.

Weitere ähnliche Inhalte

Andere mochten auch

Speaking activity
Speaking activitySpeaking activity
Speaking activityThalein
 
IES JUAN DE HERRERA Grupo Escolar AMNISTIA INTERNACIONAL 2013
IES JUAN DE HERRERA Grupo Escolar AMNISTIA INTERNACIONAL 2013IES JUAN DE HERRERA Grupo Escolar AMNISTIA INTERNACIONAL 2013
IES JUAN DE HERRERA Grupo Escolar AMNISTIA INTERNACIONAL 2013IESJUAN DE HERRERA
 
Webfólio da Oficina com os alunos
Webfólio da Oficina com os alunos Webfólio da Oficina com os alunos
Webfólio da Oficina com os alunos Debora Lacerda
 
Генетичний код
Генетичний кодГенетичний код
Генетичний кодmagistr_magii95
 
CHAPTER 10 COMMUNICATION AND GROUP PROCESS
CHAPTER  10 COMMUNICATION AND GROUP PROCESSCHAPTER  10 COMMUNICATION AND GROUP PROCESS
CHAPTER 10 COMMUNICATION AND GROUP PROCESSRenz Diaz
 
Reunion con padres de familia yo no abandono
Reunion con padres de familia yo no abandonoReunion con padres de familia yo no abandono
Reunion con padres de familia yo no abandonoErnesto Yañez Rivera
 
La Metacognición - Mapa conceptual, mental y preguntas metacognitivas.
La Metacognición - Mapa conceptual, mental y preguntas metacognitivas. La Metacognición - Mapa conceptual, mental y preguntas metacognitivas.
La Metacognición - Mapa conceptual, mental y preguntas metacognitivas. Marcela Flórez
 
Agile diena 2013 individualaus ir komandinio kūrybiškumo valdymas naudojant t...
Agile diena 2013 individualaus ir komandinio kūrybiškumo valdymas naudojant t...Agile diena 2013 individualaus ir komandinio kūrybiškumo valdymas naudojant t...
Agile diena 2013 individualaus ir komandinio kūrybiškumo valdymas naudojant t...andriu z
 
How far can u go?
How far can u go?How far can u go?
How far can u go?kmehajer
 

Andere mochten auch (17)

Speaking activity
Speaking activitySpeaking activity
Speaking activity
 
IES JUAN DE HERRERA Grupo Escolar AMNISTIA INTERNACIONAL 2013
IES JUAN DE HERRERA Grupo Escolar AMNISTIA INTERNACIONAL 2013IES JUAN DE HERRERA Grupo Escolar AMNISTIA INTERNACIONAL 2013
IES JUAN DE HERRERA Grupo Escolar AMNISTIA INTERNACIONAL 2013
 
Expocision informatica
Expocision informaticaExpocision informatica
Expocision informatica
 
Webfólio da Oficina com os alunos
Webfólio da Oficina com os alunos Webfólio da Oficina com os alunos
Webfólio da Oficina com os alunos
 
:)
:):)
:)
 
14 de octubre
14 de octubre14 de octubre
14 de octubre
 
Генетичний код
Генетичний кодГенетичний код
Генетичний код
 
Sesión icfes
Sesión icfesSesión icfes
Sesión icfes
 
CHAPTER 10 COMMUNICATION AND GROUP PROCESS
CHAPTER  10 COMMUNICATION AND GROUP PROCESSCHAPTER  10 COMMUNICATION AND GROUP PROCESS
CHAPTER 10 COMMUNICATION AND GROUP PROCESS
 
Reunion con padres de familia yo no abandono
Reunion con padres de familia yo no abandonoReunion con padres de familia yo no abandono
Reunion con padres de familia yo no abandono
 
La Metacognición - Mapa conceptual, mental y preguntas metacognitivas.
La Metacognición - Mapa conceptual, mental y preguntas metacognitivas. La Metacognición - Mapa conceptual, mental y preguntas metacognitivas.
La Metacognición - Mapa conceptual, mental y preguntas metacognitivas.
 
Agile diena 2013 individualaus ir komandinio kūrybiškumo valdymas naudojant t...
Agile diena 2013 individualaus ir komandinio kūrybiškumo valdymas naudojant t...Agile diena 2013 individualaus ir komandinio kūrybiškumo valdymas naudojant t...
Agile diena 2013 individualaus ir komandinio kūrybiškumo valdymas naudojant t...
 
How far can u go?
How far can u go?How far can u go?
How far can u go?
 
Desayunos dif
Desayunos difDesayunos dif
Desayunos dif
 
Testing
TestingTesting
Testing
 
Fuentes
FuentesFuentes
Fuentes
 
Informatica inedaps
Informatica inedapsInformatica inedaps
Informatica inedaps
 

Ähnlich wie OWTF Botnet Mode Module

The Evil Tester's Guide to HTTP proxies Tutorial
The Evil Tester's Guide to HTTP proxies TutorialThe Evil Tester's Guide to HTTP proxies Tutorial
The Evil Tester's Guide to HTTP proxies TutorialAlan Richardson
 
LINE LIVE のチャットが
30,000+/min のコメント投稿を捌くようになるまで
LINE LIVE のチャットが
30,000+/min のコメント投稿を捌くようになるまでLINE LIVE のチャットが
30,000+/min のコメント投稿を捌くようになるまで
LINE LIVE のチャットが
30,000+/min のコメント投稿を捌くようになるまでLINE Corporation
 
TSC Summit #4 - Howto get browser persitence and remote execution (JS)
TSC Summit #4 - Howto get browser persitence and remote execution (JS)TSC Summit #4 - Howto get browser persitence and remote execution (JS)
TSC Summit #4 - Howto get browser persitence and remote execution (JS)Mikal Villa
 
Thick Client Testing Advanced
Thick Client Testing AdvancedThick Client Testing Advanced
Thick Client Testing AdvancedNSConclave
 
Black hat dc-2010-egypt-uav-slides
Black hat dc-2010-egypt-uav-slidesBlack hat dc-2010-egypt-uav-slides
Black hat dc-2010-egypt-uav-slidesBakry3
 
CSCAMP2013 - Introduction to pwnCore
CSCAMP2013 - Introduction to pwnCoreCSCAMP2013 - Introduction to pwnCore
CSCAMP2013 - Introduction to pwnCoreAnwar Mohamed
 
Reactive mistakes - ScalaDays Chicago 2017
Reactive mistakes -  ScalaDays Chicago 2017Reactive mistakes -  ScalaDays Chicago 2017
Reactive mistakes - ScalaDays Chicago 2017Petr Zapletal
 
UTD Computer Security Group - Cracking the domain
UTD Computer Security Group - Cracking the domainUTD Computer Security Group - Cracking the domain
UTD Computer Security Group - Cracking the domainUTD Computer Security Group
 
Your first sitemap.xml and robots.txt implementation
Your first sitemap.xml and robots.txt implementationYour first sitemap.xml and robots.txt implementation
Your first sitemap.xml and robots.txt implementationJérôme Verstrynge
 
Real-time applications with sockets and websockets. Introduction to Smartfoxs...
Real-time applications with sockets and websockets. Introduction to Smartfoxs...Real-time applications with sockets and websockets. Introduction to Smartfoxs...
Real-time applications with sockets and websockets. Introduction to Smartfoxs...Pablo Monterde Perez
 
SPDY and What to Consider for HTTP/2.0
SPDY and What to Consider for HTTP/2.0SPDY and What to Consider for HTTP/2.0
SPDY and What to Consider for HTTP/2.0Mike Belshe
 
Tor Project overview
Tor Project overviewTor Project overview
Tor Project overviewJorge Couchet
 
Accelerate Quality with Postman Advance
Accelerate Quality with Postman AdvanceAccelerate Quality with Postman Advance
Accelerate Quality with Postman AdvanceKnoldus Inc.
 
FastNetMon and Metrics
FastNetMon and MetricsFastNetMon and Metrics
FastNetMon and MetricsAltinity Ltd
 
Unmanned Aerial Vehicles: Exploit Automation with the Metasploit Framework
Unmanned Aerial Vehicles: Exploit Automation with the Metasploit FrameworkUnmanned Aerial Vehicles: Exploit Automation with the Metasploit Framework
Unmanned Aerial Vehicles: Exploit Automation with the Metasploit Frameworkegypt
 
A Botnet Detecting Infrastructure Using a Beneficial Botnet
A Botnet Detecting Infrastructure Using a Beneficial BotnetA Botnet Detecting Infrastructure Using a Beneficial Botnet
A Botnet Detecting Infrastructure Using a Beneficial BotnetTakashi Yamanoue
 
Feature Selection Strategies for HTTP Botnet Traffic Detection
Feature Selection Strategies for HTTP Botnet Traffic DetectionFeature Selection Strategies for HTTP Botnet Traffic Detection
Feature Selection Strategies for HTTP Botnet Traffic DetectionIvan Letteri
 
Man In The Browser
Man In The BrowserMan In The Browser
Man In The BrowserSave Manos
 
Uber mobility - High Performance Networking
Uber mobility - High Performance NetworkingUber mobility - High Performance Networking
Uber mobility - High Performance NetworkingDhaval Patel
 
Debugging data pipelines @OLA by Karan Kumar
Debugging data pipelines @OLA by Karan KumarDebugging data pipelines @OLA by Karan Kumar
Debugging data pipelines @OLA by Karan KumarShubham Tagra
 

Ähnlich wie OWTF Botnet Mode Module (20)

The Evil Tester's Guide to HTTP proxies Tutorial
The Evil Tester's Guide to HTTP proxies TutorialThe Evil Tester's Guide to HTTP proxies Tutorial
The Evil Tester's Guide to HTTP proxies Tutorial
 
LINE LIVE のチャットが
30,000+/min のコメント投稿を捌くようになるまで
LINE LIVE のチャットが
30,000+/min のコメント投稿を捌くようになるまでLINE LIVE のチャットが
30,000+/min のコメント投稿を捌くようになるまで
LINE LIVE のチャットが
30,000+/min のコメント投稿を捌くようになるまで
 
TSC Summit #4 - Howto get browser persitence and remote execution (JS)
TSC Summit #4 - Howto get browser persitence and remote execution (JS)TSC Summit #4 - Howto get browser persitence and remote execution (JS)
TSC Summit #4 - Howto get browser persitence and remote execution (JS)
 
Thick Client Testing Advanced
Thick Client Testing AdvancedThick Client Testing Advanced
Thick Client Testing Advanced
 
Black hat dc-2010-egypt-uav-slides
Black hat dc-2010-egypt-uav-slidesBlack hat dc-2010-egypt-uav-slides
Black hat dc-2010-egypt-uav-slides
 
CSCAMP2013 - Introduction to pwnCore
CSCAMP2013 - Introduction to pwnCoreCSCAMP2013 - Introduction to pwnCore
CSCAMP2013 - Introduction to pwnCore
 
Reactive mistakes - ScalaDays Chicago 2017
Reactive mistakes -  ScalaDays Chicago 2017Reactive mistakes -  ScalaDays Chicago 2017
Reactive mistakes - ScalaDays Chicago 2017
 
UTD Computer Security Group - Cracking the domain
UTD Computer Security Group - Cracking the domainUTD Computer Security Group - Cracking the domain
UTD Computer Security Group - Cracking the domain
 
Your first sitemap.xml and robots.txt implementation
Your first sitemap.xml and robots.txt implementationYour first sitemap.xml and robots.txt implementation
Your first sitemap.xml and robots.txt implementation
 
Real-time applications with sockets and websockets. Introduction to Smartfoxs...
Real-time applications with sockets and websockets. Introduction to Smartfoxs...Real-time applications with sockets and websockets. Introduction to Smartfoxs...
Real-time applications with sockets and websockets. Introduction to Smartfoxs...
 
SPDY and What to Consider for HTTP/2.0
SPDY and What to Consider for HTTP/2.0SPDY and What to Consider for HTTP/2.0
SPDY and What to Consider for HTTP/2.0
 
Tor Project overview
Tor Project overviewTor Project overview
Tor Project overview
 
Accelerate Quality with Postman Advance
Accelerate Quality with Postman AdvanceAccelerate Quality with Postman Advance
Accelerate Quality with Postman Advance
 
FastNetMon and Metrics
FastNetMon and MetricsFastNetMon and Metrics
FastNetMon and Metrics
 
Unmanned Aerial Vehicles: Exploit Automation with the Metasploit Framework
Unmanned Aerial Vehicles: Exploit Automation with the Metasploit FrameworkUnmanned Aerial Vehicles: Exploit Automation with the Metasploit Framework
Unmanned Aerial Vehicles: Exploit Automation with the Metasploit Framework
 
A Botnet Detecting Infrastructure Using a Beneficial Botnet
A Botnet Detecting Infrastructure Using a Beneficial BotnetA Botnet Detecting Infrastructure Using a Beneficial Botnet
A Botnet Detecting Infrastructure Using a Beneficial Botnet
 
Feature Selection Strategies for HTTP Botnet Traffic Detection
Feature Selection Strategies for HTTP Botnet Traffic DetectionFeature Selection Strategies for HTTP Botnet Traffic Detection
Feature Selection Strategies for HTTP Botnet Traffic Detection
 
Man In The Browser
Man In The BrowserMan In The Browser
Man In The Browser
 
Uber mobility - High Performance Networking
Uber mobility - High Performance NetworkingUber mobility - High Performance Networking
Uber mobility - High Performance Networking
 
Debugging data pipelines @OLA by Karan Kumar
Debugging data pipelines @OLA by Karan KumarDebugging data pipelines @OLA by Karan Kumar
Debugging data pipelines @OLA by Karan Kumar
 

Kürzlich hochgeladen

Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 

Kürzlich hochgeladen (20)

Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 

OWTF Botnet Mode Module

  • 1. OWASP OWTF Implementation owtf Botnet mode module. Marios Kourtesis Mentor: Abraham Aranguren
  • 2. Table of Contents ● What is Botnet Mode ● How it works ● TOR mode – – ● Advantages Disadvantages Proxy List mode – ProxyMiner – ProxyManager – Advantages – Disadvantages – Proxy List mode Diagram ● Behind The Scenes ● Sources
  • 3. What it Botnet Mode? The main purpose of this feature is to detour potential ip-filtering that defenders might attempt in order to prevent our scan. When it is enabled it applies anonymity to all tools that are used from OWTF.
  • 4. How it Works Botnet mode works in two different ways. ● TOR mode – ● Each Http request will pass thow TOR Network[1]. Proxy List mode – Each Http request will pass throw a different proxy.
  • 5. TOR mode ● Starts TOR daemon. ● Every request passes throw TOR network. ● ● User can configure in how many time to automatically change his IP address. User can configure after how many request wants to change his IP address.
  • 6. TOR mode Advantages ● High level of anonymity. ● Good option for professional testing without privileges.
  • 7. TOR mode Disadvantages ● TOR network is very slow. ● Some TOR proxy routers are owned by government.
  • 8. Proxy List mode ● Each Http request will pass throw a different proxy. ● Support public and private proxy lists. ● The proxies could be imported as a list. ● ● The proxies also could be fetched automatically with the ProxyMiner* from the web. Recovery support for dead proxies. *ProxyMiner(Described in the next slides)
  • 9. ProxyMiner ProxyMiner is a feature that searches on the web for proxies and passes them to ProxyManager(next slide). By the time you have enabled Botnet mode, ProxyMiner will ask user if he wants to start the mining process before the scanning process begins. ● It runs continuously and mines proxies(optionally). ● It has a big list of websites that contain proxies. ● Handles dead proxies.
  • 10. ProxyManager Proxy manager handles all proxies that are passed from ProxyMiner or imported from a list. ● It is responsible to handle dead proxies. ● It sorts proxies by speed or country. ● It puts dead proxies in a blacklist. ● It keeps Statistics about proxies.
  • 11. Proxy List mode Advantages ● High speed scan. ● Provides better anonymity level than using a simple proxy. ● You can have proxies list automatically. ● If you don't trust ProxyMiner's proxies you can import your proxy list.
  • 12. Proxy List mode Disadvantages ● Proxies mined from the web are not confidential.
  • 13. Proxy List mode diagram
  • 14. Behind the Scenes ● ● For the Data mining process i will use Beautiful Soup(python library[2]). Beautiful soup is implemented in both python 2.7 and python 3 so it is a great choice for future plan of porting owtf to python 3. The data structure for the proxy list will be the following: (ip, port, speed, country, type,send_requests, user, password) ● The implementation will use the MiTM proxy[3].
  • 15. Sources ● ● ● [1]”TOR”, url: [ https://www.torproject.org/about/overview.html.en ] [2]”Beautiful Soup Documentation”, url: [http://www.crummy.com/software/BeautifulSoup/bs4/doc/] [3]”MiTM Proxy”, url: [http://www.slideshare.net/abrahamaranguren/owasp-owtfsummer-storm-owasp-appsec-eu-2013], pp. 43-53.