Black Hills Information Security leads and takes part in a number of different (and awesome) open-source projects. Let’s check them out!
🔹ADHD (Active Defense Harbinger Distribution) — Stand up Active Directory Active Defense (ADAD) using ADHD, create honey accounts, create callback word documents, and create fake SMB shares.
🔹Auto Scan with Burp — Auto Scan with Burp contains a Burp Extension and a Python script for invoking the extension to perform automated and authenticated scans against all URLs listed in a configuration file. Authentication is accomplished through Burp State files. Auto Scan comes with an optional Nikto scan function as well.
🔹CredDefense Toolkit — Wouldn’t it be great if there was a free toolkit to protect your credentials even when password length couldn’t be changed, and to alert on other credential attacks being conducted in your network? That’s why BHIS created The CredDefense Toolkit — to have a free way to detect and prevent credential abuse attacks.
🔹CredKing — Password sprays against websites like Google’s GSuite are getting more and more difficult. CredKing looks to solve that problem by leveraging Amazon AWS Lambda to rotate IP addresses for each authentication attempt. Fully supporting all AWS Lambda regions, CredKing is a must-have tool for cracking external perimeters through password spraying.
🔹CredSniper — While phishing for login credentials is nothing new, more and more organizations are adopting multi-factor authentication, making it difficult to phish account access. CredSniper can easily launch a new phishing site that not only requests the login credentials but also the 2FA token from unsuspecting targets. Out of the box, CredSniper supports all forms of multi-factor tokens for Google GSuite! It not only looks and feels like the original site, but it also automates SSL certificate generation using Let’s Encrypt.
🔹DNS Blacklists — DNS Blacklists is a Python script that uses regular expressions to examine IP addresses and hostnames, comparing them against known blacklists. This is then used to alert the user if there are any in common, indicating communication with unwanted addresses.
🔹Domain Password Audit Tool (DPAT) — This is a Python script that will generate password use statistics from password hashes dumped from a domain controller and a password crack file such as oclHashcat tool during password cracking. The report is an HTML report with clickable links.
🔹DomainPasswordSpray — A tool written in PowerShell to perform a password spray attack against users of a domain. By default, it will automatically generate the userlist form the domain.
🔹HostRecon — A tool that runs a number of checks on a system to help provide situational awareness to a penetration tester during the reconnaissance phase of an engagement. It gathers information about the local system, the users, and the domain. It does not use any ‘net,’ ‘ipconfig,’ ‘whoami,’ ‘netstat,’ or other system commands to help avoid detection.
🔹Java Web Attack — This uses a combination of Python, Java, and shell commands to break our the Java Applet Web Attack method from SET into a standalone tool. It is mainly designed to be used in the Active Defense Harbinger Distribution (ADHD), but can be used in other Ubuntu/Debian variants.
🔹MailSniper — A penetration testing tool for searching through email in a Microsoft Exchange environment for specific terms (passwords, insider intel, network architecture information, etc.). It can be used by a non-administrative user to search their own email, or by an Exchange administrator to search the mailboxes of every user in a domain. MailSniper also includes additional modules for password spraying, enumerating users/domains, gathering the Global Address List (GAL) from OWA and EWS, and checking mailbox permissions for every Exchange user at an organization.
🔹PowerMeta — PowerMeta searches for publicly available files hosted on various websites for a particular domain by using specially crafted Google and Bing searches. It then allows for the download of those files from the target domain. After retrieving the files, the metadata associated with them can be analyzed by PowerMeta. Some interesting things commonly found in metadata are usernames, domains, software titles, and computer hostnames.
🔹PowerWebShot — A PowerShell tool for taking screenshots of multiple web servers quickly.
🔹Pushpin-Web — Pushpin-Web is a web application which provides a simple interface to keep track of geo-tagged social media activity. It is adapted from Recon-ng and is currently capable of aggregating data from Twitter, Flickr, Picasa, Shodan, and YouTube in near real-time.
🔹Recon-ng — Recon-ng is a full-featured Web Reconnaissance framework authored by Tim Tomes and written in Python. Complete with independent modules, database interaction, built-in convenience functions, interactive help, and command completion. Recon-ng provides a powerful environment in which open-source, web-based reconnaissance can be conducted quickly and thoroughly.
Recon-ng has a look and feel similar to the Metasploit Framework, reducing the learning curve for leveraging the framework; however, it is quite different. Recon-ng is not intended to compete with existing frameworks, as it is designed exclusively for web-based open-source reconnaissance. If you want to exploit, use the Metasploit Framework. If you want to Social Engineer, use the Social Engineer toolkit. If you want to conduct reconnaissance, use Recon-ng!
🔹RITA — Real Intelligence Threat Analysis. RITA is an open-source framework for network traffic analysis born from BHIS. RITA is now developed and supported by Active Countermeasures. The framework ingests Bro logs, and some of the main analysis features include:
🔸Beaconing Detection: Search for signs of beaconing behavior in and out of your network.
🔸DNS Tunneling Detection: Search for signs of DNS-based covert channels.
🔸Blacklist Checking: Query blacklists to search for suspicious domains and hosts.
🔹SpiderTrap — SpiderTrap is a Python program which dynamically generates an infinite number of hyper-linked pages to trap webcrawlers.