Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/jymcheong/aptc
Automated Payload Test Controller
https://github.com/jymcheong/aptc
lnk malware misp testing
Last synced: 21 days ago
JSON representation
Automated Payload Test Controller
- Host: GitHub
- URL: https://github.com/jymcheong/aptc
- Owner: jymcheong
- License: unlicense
- Created: 2017-03-28T02:54:43.000Z (over 7 years ago)
- Default Branch: master
- Last Pushed: 2017-06-29T07:33:00.000Z (over 7 years ago)
- Last Synced: 2024-08-05T17:42:17.090Z (4 months ago)
- Topics: lnk, malware, misp, testing
- Language: Python
- Homepage: https://jymcheong.github.io/aptc/
- Size: 15.4 MB
- Stars: 8
- Watchers: 4
- Forks: 4
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
- awesome-hacking-lists - jymcheong/aptc - Automated Payload Test Controller (Python)
README
## Synopsis
A set of scripts using [PyMISP](https://github.com/MISP/PyMISP) to extend [MISP](https://github.com/MISP/MISP) for automated payload testing.
[User Documentation](https://jymcheong.github.io/aptc/), click on the mind-map topics/nodes to explore further.
[Demo of CVE2017-0199 payload youtube link](https://www.youtube.com/watch?v=mASJv_2HZbM)
## Sh0ut 0utz
Big thank you to the awesome folks @ https://gitter.im/MISP/MISP & Harvard-IT-security## Under-the-hood (TL;DR)
![APTC overview](https://cdn-images-1.medium.com/max/2000/1*G6LukbBiZRgo2Nz9vPvV7w.png)- Assuming (test-case & targets) events are setup properly, tagging a test-case event with test-start tag will launch getpayloads.py
- getpayloads.py in turn launches getresults.py to query graylog with pre-defined query statement to find indicator of success
- It is up to you to decide what you mean by success/hit, typically a Product-under-Test will emit logs when it catches a payload. When the query can't find the indicators after a certain amount of time, it will deemed as 'miss'## Installation steps for MISP host
1. git clone https://github.com/jymcheong/aptc.git
2. Edit /Controller/EventsController.php
3. Find Tag added, you should locate "return new CakeResponse(array('body'=> json_encode(array('saved' => true, 'success' => 'Tag added..."Add the line below above the return statement
```
if ($tag['Tag']['name']=="aptc:test-start") shell_exec("python3 /var/www/MISP/tools/aptc/getpayloads.py -id ".$id." > /dev/null 2>/dev/null &");
```
4. Create aptc folder under MISP tools directory
5. Copy all the aptc scripts to that folder & adjust permission accordingly (eg. readable for www-data, chmod +x *.py)
6. Create aptc folder under /var/www/MISP/app/files/taxonomies/ (or equivalent)
7. Copy machinetag.json into that folder, update your tags & enable all of them
8. Edit key.py to set misp_url & key
9. Create target paths (samba mount point) to write payloads to (give appropriate permissions for read/write)
10. Install Samba & setup share for targets to mount (by default APTC writes to /opt/aptc/targets/HOSTNAME, ie. share /opt/aptc/targets. You can change it by editing aptc.py. Refer to https://jymcheong.github.io/aptc/ to understand how this whole thing works)## Installation steps for Windows target(s)
1. Mount the samba shared folder in your Windoze
2. Copy filemonitor.vbs to the target(s), make it auto-run upon login (target should [auto-login](https://technet.microsoft.com/en-us/library/ee872306.aspx))## Useful links
Most convenient way to setup the latest MISP: https://github.com/harvard-itsecurity/docker-misp