Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/splunk/melting-cobalt
A Cobalt Strike Scanner that retrieves detected Team Server beacons into a JSON object
https://github.com/splunk/melting-cobalt
Last synced: 3 months ago
JSON representation
A Cobalt Strike Scanner that retrieves detected Team Server beacons into a JSON object
- Host: GitHub
- URL: https://github.com/splunk/melting-cobalt
- Owner: splunk
- License: apache-2.0
- Created: 2021-10-03T22:44:24.000Z (about 3 years ago)
- Default Branch: main
- Last Pushed: 2022-10-14T15:16:42.000Z (about 2 years ago)
- Last Synced: 2024-04-15T02:58:40.705Z (7 months ago)
- Language: Python
- Homepage:
- Size: 98.6 KB
- Stars: 164
- Watchers: 15
- Forks: 25
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
- awesome-hacking-lists - splunk/melting-cobalt - A Cobalt Strike Scanner that retrieves detected Team Server beacons into a JSON object (Python)
README
# melting-cobalt 👀
A tool to hunt/mine for Cobalt Strike beacons and "reduce"
their beacon configuration for later indexing. Hunts can either be expansive and internet wide using services like SecurityTrails, Shodan, or ZoomEye or a list of IP's.## Getting started
1. [Install](#installation) melting-cobalt
2. [Configure](#configuration) your tokens to begin the hunt
3. [Mine](#search-examples) Beacons to begin reducing them
4. Review results `cat results.json | jq`:tv: **Demo**
[![Melting-Cobalt Demo](https://img.youtube.com/vi/IBwwFUwFkU4/3.jpg)](https://www.youtube.com/watch?v=IBwwFUwFkU4)
## Installation
Requirements: `virtualenv`, and `python3.8+`
1. `git clone https://github.com/splunk/melting-cobalt && cd melting-cobalt` Clone project and cd into the project dir.
2. `pip install virtualenv && virtualenv -p python3 venv && source venv/bin/activate && pip install -r requirements.txt` Create Virtualenv and install requirements.Continue to [configuring](#configuration) for SecurityTrails, Shodan, or ZoomEye API key.
## Configuration [`melting-cobalt.conf`](https://github.com/splunk/melting-cobalt/blob/master/melting-cobalt.conf.example)
Copy `melting-cobalt.conf.example` to `melting-cobalt.conf`!
Make sure to set a token for one of the available [providers](https://github.com/splunk/melting-cobalt/blob/main/melting-cobalt.conf.example#L18-L25). If you need to create one for your account follow [these](htt://need wiki page) instructions.
Configuration example:
```
[global]
output = results.json
# stores matches in JSON herelog_path = melting-cobalt.log
# Sets the log_path for the logging filelog_level = INFO
# Sets the log level for the logging
# Possible values: INFO, ERROR, VERBOSEnse_script = grab_beacon_config.nse
# path to the nse script that rips down cobalt configs. This is specifically using https://github.com/whickey-r7/grab_beacon_configsearches = search.yml
# contains the different searches to run on each internet scanning service provider (eg shodan, zoomeye, security trails) when hunting for team servers.shodan_token = TOKENHERE
# shodan token for searchingzoomeye_token = TOKENHERE
# zoomeye token for searchingsecuritytrails_token = TOKENHERE
# security trails token for searching
```### Search The Internet
To modify the default mining performed across different providers, customize `search.yml`. The default melting-cobalt [Search Examples](#search-examples) below.
Run:
`python melting-cobalt.py`
### Search IP list
populate `ips.txt` with potential Cobalt Strike C2 IPs a new line delimeted, example:```
1.1.1.1
2.2.2.2
3.3.3.3
```Run:
`python melting-cobalt.py -i ips.txt`
If you need inspiration from hunters we highly recommend:
* [The DFIR Report](https://twitter.com/TheDFIRReport)
* [Awesome-Cobalt-Strike](https://github.com/MichaelKoczwara/Awesome-CobaltStrike-Defence)
* [CobaltStrikeBot](https://twitter.com/cobaltstrikebot)## Usage
```
usage: melting-cobalt.py [-h] [-c CONFIG] [-o OUTPUT] [-v] [-i INPUT]scans for open cobalt strike team servers and grabs their beacon configs and write this as a json log to be analyzed by any analytic tools
like splunk, elastic, etc..optional arguments:
-h, --help show this help message and exit
-c CONFIG, --config CONFIG
config file path
-o OUTPUT, --output OUTPUT
file to write to the results, defaults to results.json.log
-v, --version shows current melting-cobalt version
-i INPUT, --input INPUT
newline delimeted file of cobalt strike server ips to grab beacon configs from. example ips.txt
```## Search Examples
The following searches are provided out of the box and more may be added to [`search.yml`](https://github.com/splunk/melting-cobalt/blob/main/search.yml) for more data.
#### Shodan
##### Find specific [JARM](https://blog.cobaltstrike.com/2020/12/08/a-red-teamer-plays-with-jarm/) signatures, out of the box we track Cobalt Strike 4.x
`'ssl.jarm:07d14d16d21d21d07c42d41d00041d24a458a375eef0c576d23a7bab9a9fb1'`##### Filter by HTTP headers and ports to reduce noisy results
`'ssl.jarm:07d14d16d21d21d07c42d41d00041d24a458a375eef0c576d23a7bab9a9fb1 port:"22, 80, 443, 444, 1234, 2000, 2222, 3000, 3780, 4000, 4443, 6379, 7443, 8443, 8080, 8081, 8082, 8087, 8088, 8099, 8089, 8090, 8181, 8888, 8889, 9443, 50050" HTTP/1.1 404 Not Found Content-Length: 0'`##### Team server detected by Shodan
`'product:"cobalt strike team server"'`_note_: will generate lots of noisy results, do not actually schedule this unless you want to burn your license credits.
##### Team server certificate serial
`'ssl.cert.serial:146473198'`#### SecurityTrails
##### Find specific [JARM](https://blog.cobaltstrike.com/2020/12/08/a-red-teamer-plays-with-jarm/) signatures
`'SELECT address, ports.port FROM ips WHERE jarm = "07d14d16d21d21d07c42d41d00041d24a458a375eef0c576d23a7bab9a9fb1"'`##### Filter by HTTP Headers and ports to reduce noisy nmap_results
`'SELECT address, ports.port, isp.name_normalized, ports.port, address, asn.number, jarm, http.headers.raw FROM ips WHERE jarm = "07d14d16d21d21d07c42d41d00041d24a458a375eef0c576d23a7bab9a9fb1" OR jarm = "07d14d16d21d21d07c07d14d07d21d9b2f5869a6985368a9dec764186a9175" OR jarm = "2ad2ad16d2ad2ad22c42d42d00042d58c7162162b6a603d3d90a2b76865b53" AND http.headers.content_type = "text/plain" AND http.headers.raw = "content-length:0" AND ports.port IN (22, 80, 443, 444, 1234, 2000, 2222, 3000, 3780, 4000, 4443, 6379, 7443, 8443, 8080, 8081, 8082, 8087, 8088, 8099, 8089, 8090, 8181, 8888, 8889, 9443, 50050)'`## Author
* Michael Haag [@M_haggis](https://twitter.com/M_haggis)
* Jose Hernandez [@d1vious](https://twitter.com/d1vious)## Support 📞
Please use the [GitHub issue tracker](https://github.com/splunk/melting-cobalt/issues) to submit bugs or request features.If you have questions or need support, you can:
* Join the [#security-research](https://splunk-usergroups.slack.com/archives/C1S5BEF38) room in the [Splunk Slack channel](http://splunk-usergroups.slack.com)
## Credits & References
* Inspiration came from a handful of blogs:https://michaelkoczwara.medium.com/cobalt-strike-c2-hunting-with-shodan-c448d501a6e2, https://sergiusechel.medium.com/improving-the-network-based-detection-of-cobalt-strike-c2-servers-in-the-wild-while-reducing-the-6964205f6468
* Much of this is only possible because whickey-r7 shared with us [grab_beacon_config.nse](https://github.com/whickey-r7/grab_beacon_config)
* [Aan](https://twitter.com/petruknisme) For Contributing the ZoomEye integration!## TODO
- [ ] Dedup results before nmap
- [ ] add checking the most recent result by looking at the latest_updated field## License
Copyright 2020 Splunk Inc.Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License athttp://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License.