IndustryBestPractice / Bootsy

Licence: GPL-3.0 License
Designed to be installed on a fresh install of raspbian on a raspberry pi, by combining Respounder (Responder detection) and Artillery (port and service spoofing) for network deception, this tool allows you to detect an attacker on the network quickly by weeding out general noisy alerts with only those that matter.

Programming Languages

shell
77523 projects
python
139335 projects - #7 most used programming language

Projects that are alternatives of or similar to Bootsy

Defaultcreds Cheat Sheet
One place for all the default credentials to assist the Blue/Red teamers activities on finding devices with default password 🛡️
Stars: ✭ 1,949 (+5806.06%)
Mutual labels:  infosec, blueteam
github-watchman
Monitoring GitHub for sensitive data shared publicly
Stars: ✭ 60 (+81.82%)
Mutual labels:  infosec, blueteam
Gitlab Watchman
Monitoring GitLab for sensitive data shared publicly
Stars: ✭ 127 (+284.85%)
Mutual labels:  infosec, blueteam
Plumhound
Bloodhound for Blue and Purple Teams
Stars: ✭ 452 (+1269.7%)
Mutual labels:  infosec, blueteam
MurMurHash
This little tool is to calculate a MurmurHash value of a favicon to hunt phishing websites on the Shodan platform.
Stars: ✭ 79 (+139.39%)
Mutual labels:  infosec, blueteam
Awesome Security Hardening
A collection of awesome security hardening guides, tools and other resources
Stars: ✭ 630 (+1809.09%)
Mutual labels:  infosec, blueteam
Smogcloud
Find cloud assets that no one wants exposed 🔎 ☁️
Stars: ✭ 168 (+409.09%)
Mutual labels:  infosec, blueteam
Slack Watchman
Monitoring your Slack workspaces for sensitive information
Stars: ✭ 159 (+381.82%)
Mutual labels:  infosec, blueteam
Blue-Team-Notes
You didn't think I'd go and leave the blue team out, right?
Stars: ✭ 899 (+2624.24%)
Mutual labels:  infosec, blueteam
dummyDLL
Utility for hunting UAC bypasses or COM/DLL hijacks that alerts on the exported function that was consumed.
Stars: ✭ 35 (+6.06%)
Mutual labels:  infosec, blueteam
Infosec reference
An Information Security Reference That Doesn't Suck; https://rmusser.net/git/admin-2/Infosec_Reference for non-MS Git hosted version.
Stars: ✭ 4,162 (+12512.12%)
Mutual labels:  infosec, blueteam
adalanche
Active Directory ACL Visualizer and Explorer - who's really Domain Admin?
Stars: ✭ 862 (+2512.12%)
Mutual labels:  infosec, blueteam
Bxss
bXSS is a utility which can be used by bug hunters and organizations to identify Blind Cross-Site Scripting.
Stars: ✭ 331 (+903.03%)
Mutual labels:  infosec, blueteam
Snoop
Snoop — инструмент разведки на основе открытых данных (OSINT world)
Stars: ✭ 886 (+2584.85%)
Mutual labels:  infosec, blueteam
pyc2bytecode
A Python Bytecode Disassembler helping reverse engineers in dissecting Python binaries by disassembling and analyzing the compiled python byte-code(.pyc) files across all python versions (including Python 3.10.*)
Stars: ✭ 70 (+112.12%)
Mutual labels:  infosec, blueteam
NIST-to-Tech
An open-source listing of cybersecurity technology mapped to the NIST Cybersecurity Framework (CSF)
Stars: ✭ 61 (+84.85%)
Mutual labels:  infosec, blueteam
honeyku
A Heroku-based web honeypot that can be used to create and monitor fake HTTP endpoints (i.e. honeytokens).
Stars: ✭ 56 (+69.7%)
Mutual labels:  infosec, deception
1earn
ffffffff0x 团队维护的安全知识框架,内容包括不仅限于 web安全、工控安全、取证、应急、蓝队设施部署、后渗透、Linux安全、各类靶机writup
Stars: ✭ 3,715 (+11157.58%)
Mutual labels:  infosec, blueteam
incident-response-plan-template
A concise, directive, specific, flexible, and free incident response plan template
Stars: ✭ 288 (+772.73%)
Mutual labels:  infosec
hibpwned
Python API wrapper for haveibeenpwned.com (API v3)
Stars: ✭ 21 (-36.36%)
Mutual labels:  infosec

Bootsy - Notes

Bootsy Collins is a legendary bass guitar player who laid down the best basslines known to man. In his honour, we are attempting to lay down some of the best baselines known to InfoSec.

By combining Respounder (Responder detection) and Artillery (port and service spoofing) for deception, the hope is to quickly detect an attacker on the network early and without tipping them off that they have been found out.

This project is designed to be installed on a current version (September, 2019) of raspbian OS on the raspberry pi and has been tested on a raspberry 2 and 3. We maxed out listening on approx. 4k IP addresses on a single pi before it gave up the ghost. We recommend no more than 2,500 ips per pi.

This version has also been tested on the 32-bit version of the raspberry pixel OS in a VM; however, we did test the limit on the number of ips that could be listened on.....soooo.....have fun and experiment!

Help File

./bootsy.sh [-h] [-i /install/path] [-c /path/to/iplist.csv] [-w /path/to/wordlist] [-u /path/to/whitelist/file]

where (Note: All switches are optional and you will be prompted for those you don't specify):
        -h  Display this help message
        -i  Install path
        -c  IPList.csv file path
        -w  Wordlist file path (adding this option stops the download of rockyou)
	-u  Whitelist file path

Bootsy - Help File Detail

A logfile of everything this script does is written to "$install_path/bootsy_install.log"

  • -i - By default, bootsy will install to /bootsy and have subdirs of /artillery and /respounder
  • -c - This is a prebuilt file that you can create ahead of time.
    • If you do not specify the location of the file via command line argument, we assume it lives in "{git_clone_dir}/ipList.csv"
    • The format of the ipList.csv file is as follows:
      • ip,mask,gateway,vlanid
      • 10.0.0.2,255.255.255.0,10.0.0.1,10
      • 10.0.0.3,255.255.255.0,10.0.0.1,10
      • 10.105.0.2,255.255.255.0,10.105.0.1,105
      • etc
  • -w - This is the wordlist that is used to give the interfaces their various names. They are iterative, so make sure you have as many words in your wordlist as you do in your ipList.csv file.
    • By default, we provide you with funkList2000.txt, which is a curated list of 3,496 of Bootsy Collins' best words used in his musical library.
    • If you delete or do not want funkList2000.txt and do not provide an alternative, we will download rockyou from OffSec and use that...
  • -u - This is the whitelist file, for any IP's that you absolutely do not want "blacklisted" by default in artillery.
    • You should enter items, one per line, such as:
      • your vulnerability scanner(s) (if you have one)
      • likely your jump box that you will use to get to this box, should you ever do an nmap of it for testing purposes and don't want yourself locked out.
    • If you do not provide a list, you will be prompted if there are any IP's you want to add manually during setup

Bootsy - General Info

  • During the install, this script will do the following:
    • Change the hostname of the device to bootsy### where ### is a randomly chosen number between 100 and 999
    • Setup SSH on a random port between 10,000 and 30,000
      • Prohibit root from logging in to the box via SSH
    • Setup a new, low priv user
      • Add this user to the sudoers group
      • Set this user to be allowed to login via SSH

AFTER SETUP THE SYSTEM WILL NOT HAVE A PATH TO THE INTERNET

Because of the multi-homeing process, the routing to the internet breaks after setup. If you would like this to have access to the internet (for patching, etc), you'll have to setup the routing manually.

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].