Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/mdsecactivebreach/chameleon
Chameleon: A tool for evading Proxy categorisation
https://github.com/mdsecactivebreach/chameleon
Last synced: 17 days ago
JSON representation
Chameleon: A tool for evading Proxy categorisation
- Host: GitHub
- URL: https://github.com/mdsecactivebreach/chameleon
- Owner: mdsecactivebreach
- Created: 2017-07-04T10:21:08.000Z (over 7 years ago)
- Default Branch: master
- Last Pushed: 2022-10-13T02:59:15.000Z (about 2 years ago)
- Last Synced: 2024-10-25T13:59:11.338Z (about 2 months ago)
- Language: Python
- Homepage:
- Size: 176 KB
- Stars: 456
- Watchers: 17
- Forks: 71
- Open Issues: 8
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
- awesome-network-stuff - **172**星
README
```
_.....---..._
_..-'-. _.--' '--.._
_.-' ( 0) Y'' ''-.._
(---.._, '-._
`---.,___.-\ \----......./ /..------...____ '-.
_/ / _/ / __\ \ __\ \ `-. \
(((-' (((-' (((---' (((---` ) /
.-'.-'
Chameleon: @domchell, MDSec ActiveBreach (__`-,
``
```
# DescriptionChameleon is a tool which assists red teams in categorising their infrastructure under arbitrary categories.
Currently, the tool supports arbitrary categorisation for Bluecoat, McAfee Trustedsource and IBM X-Force.
However, the tool is designed in such a way that additional proxies can be added with ease.# Usage
```
usage: chameleon.py [-h] [--proxy ] [--check] [--submit]
[--domain ]optional arguments:
-h, --help show this help message and exit
--proxy Proxy type: a = all, b = bluecoat, m = mcafee, i = IBM
Xforce
--check Perform check on current category
--submit Submit new category
--domain Domain to validate
```Example 1: Checking the category of your website against all supported proxies:
```
$ python chameleon.py --proxy a --check --domain google.com_.....---..._
_..-'-. _.--' '--.._
_.-' ( 0) Y'' ''-.._
(---.._, '-._
`---.,___.-\ \----......./ /..------...____ '-.
_/ / _/ / __\ \ __\ \ `-. \
(((-' (((-' (((---' (((---` ) /
.-'.-'
Chameleon: @domchell, MDSec ActiveBreach (__`-,
``[-] Targeting Bluecoat WebPulse
[-] Checking category for google.com
[-] Your site is categorised as: Search Engines/Portals
[-] Targeting McAfee Trustedsource
[-] Getting anti-automation tokens
[-] Checking category for google.com
[-] Found category: - Search Engines
[-] Targeting IBM Xforce
[-] IBM xForce Check: google.com
[-] Domain categorised as Search Engines / Web Catalogues / Portals
```Example 2: Submitting your domain for the financial category for McAfee proxy only:
```
$ python chameleon.py --proxy m --submit --domain foobar.com_.....---..._
_..-'-. _.--' '--.._
_.-' ( 0) Y'' ''-.._
(---.._, '-._
`---.,___.-\ \----......./ /..------...____ '-.
_/ / _/ / __\ \ __\ \ `-. \
(((-' (((-' (((---' (((---` ) /
.-'.-'
Chameleon: @domchell, MDSec ActiveBreach (__`-,
``[-] Targeting McAfee Trustedsource
[-] Getting anti-automation tokens
[-] Checking category for foobar.com
[-] Found category: - Personal Pages
[-] Submitting URL for finance category
[-] URL submitted, please wait up to 6 hours for categorisation
```**Caution**: when attempting to categorise a site in Bluecoat, do not check the category first otherwise it will end up uncategorised! Individual hosts can however be categorised differently.
# Credits
Chameleon was developed by [Dominic Chell](https://twitter.com/domchell) of the [MDSec ActiveBreach](https://www.mdsec.co.uk/services/red-teaming/) team.
Categorisation checks for Bluecoat and IBM X-Force were reused based on code originally developed in [DomainHunter](https://github.com/minisllc/domainhunter) and [CatMyFish](https://github.com/Mr-Un1k0d3r/CatMyFish).