Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/infobyte/spoilerwall
Spoilerwall introduces a brand new concept in the field of network hardening. Avoid being scanned by spoiling movies on all your ports!
https://github.com/infobyte/spoilerwall
ctf devops firewall pentest pentesting pranks spoilerwall
Last synced: about 16 hours ago
JSON representation
Spoilerwall introduces a brand new concept in the field of network hardening. Avoid being scanned by spoiling movies on all your ports!
- Host: GitHub
- URL: https://github.com/infobyte/spoilerwall
- Owner: infobyte
- License: gpl-3.0
- Created: 2017-06-13T20:31:04.000Z (over 7 years ago)
- Default Branch: master
- Last Pushed: 2020-06-22T11:48:08.000Z (over 4 years ago)
- Last Synced: 2024-08-01T09:26:04.616Z (3 months ago)
- Topics: ctf, devops, firewall, pentest, pentesting, pranks, spoilerwall
- Language: Python
- Homepage:
- Size: 529 KB
- Stars: 760
- Watchers: 20
- Forks: 42
- Open Issues: 3
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
# Beware! Spoilers ahead!
Spoilerwall introduces a brand new concept in the field of network hardening. Avoid being scanned by spoiling movies on all your ports!
Firewall? How about Fire'em'all! Stop spending thousand of dollars on big teams that you don't need! Just fire up the Spoilers Server and that's it!
Movie Spoilers DB + Open Ports + Pure Evil = Spoilerwall
Set your own:
1. Clone this repo
```
$ git clone [email protected]:infobyte/spoilerwall.git
```2. Edit the file `server-spoiler.py` and set the **HOST** and **PORT** variables.
3. Change spoiler color (or not?), default green
4. Run the server
```
$ python2 server-spoiler.py
```The server will listen on the selected port (8080 by default). Redirect incoming TCP traffic in all ports to this service by running:
```
iptables -A PREROUTING -t nat -i eth0 -p tcp --dport 1:65535 -j DNAT --to-destination {HOST}:{PORT}
```Change **{HOST}** and **{PORT}** for the values set in step (2). Also, if the traffic is redirected to localhost, run:
```
sysctl -w net.ipv4.conf.eth0.route_localnet=1
```Using this config, an nmap scan will show every port as open and a spoiler for each one.
View the live demo running in [spoilerwall.faradaysec.com](http://spoilerwall.faradaysec.com)
```
~ ❯❯❯ telnet spoilerwall.faradaysec.com 23Trying 138.197.196.144...
Connected to spoilerwall.faradaysec.com.
Escape character is '^]'.
Gummo
Fucked up people killing cats after a tornado
Connection closed by foreign host.
```Browse in Shodan (but beware of the Spoilers!):
https://www.shodan.io/host/138.197.196.144
Be careful in your next CTF - you never know when the spoilers are coming!
Spoilers from **SpoilMe**: https://spoilme.io
Thanks **SpoilMe**!