All Projects → COMSYS → msf-opcua

COMSYS / msf-opcua

Licence: GPL-3.0 License
Metasploit Modules for OPC UA

Programming Languages

python
139335 projects - #7 most used programming language

Projects that are alternatives of or similar to msf-opcua

trolo
trolo - an easy to use script for generating Payloads that bypasses antivirus
Stars: ✭ 45 (+104.55%)
Mutual labels:  metasploit
awesome-opcua
No description or website provided.
Stars: ✭ 51 (+131.82%)
Mutual labels:  opc-ua
iotagent-opcua
IoT Agent for OPC UA protocol
Stars: ✭ 28 (+27.27%)
Mutual labels:  opc-ua
REW-sploit
Emulate and Dissect MSF and *other* attacks
Stars: ✭ 115 (+422.73%)
Mutual labels:  metasploit
azure-iiot-opc-vault-service
Azure Industrial IoT OPC Vault Service
Stars: ✭ 15 (-31.82%)
Mutual labels:  opc-ua
Pentest-Bookmarkz
A collection of useful links for Pentesters
Stars: ✭ 118 (+436.36%)
Mutual labels:  metasploit
Vegile
This tool will setting up your backdoor/rootkits when backdoor already setup it will be hidden your spesisifc process,unlimited your session in metasploit and transparent. Even when it killed, it will re-run again. There always be a procces which while run another process,So we can assume that this procces is unstopable like a Ghost in The Shell
Stars: ✭ 601 (+2631.82%)
Mutual labels:  metasploit
msfvenom-zsh-completion
zsh completion for msfvenom in Metasploit
Stars: ✭ 42 (+90.91%)
Mutual labels:  metasploit
OpcUaStack
Open Source OPC UA Application Server and OPC UA Client/Server C++ Libraries
Stars: ✭ 89 (+304.55%)
Mutual labels:  opc-ua
secist script
No description or website provided.
Stars: ✭ 86 (+290.91%)
Mutual labels:  metasploit
TF6100 Samples
Contains product samples for TF6100 TC3 OPC UA
Stars: ✭ 15 (-31.82%)
Mutual labels:  opc-ua
Jasmin-Ransomware
Jasmin Ransomware is an advanced red team tool (WannaCry Clone) used for simulating real ransomware attacks. Jasmin helps security researchers to overcome the risk of external attacks.
Stars: ✭ 84 (+281.82%)
Mutual labels:  metasploit
MsfMania
Python AV Evasion Tools
Stars: ✭ 388 (+1663.64%)
Mutual labels:  metasploit
opcua-esp32
Embedded OPC UA Server on ESP32 based on open62541 stack
Stars: ✭ 82 (+272.73%)
Mutual labels:  opc-ua
VirusX5
The Most Powerful Fake Page Redirecting tool...
Stars: ✭ 15 (-31.82%)
Mutual labels:  metasploit
UA-IIoT-StarterKit
Samples and tutorials to illustrate how to build OPC UA PubSub applications.
Stars: ✭ 55 (+150%)
Mutual labels:  opc-ua
presentations
My Presentations in PDF
Stars: ✭ 27 (+22.73%)
Mutual labels:  metasploit
ui
UI for Mainflux IoT platform
Stars: ✭ 73 (+231.82%)
Mutual labels:  opc-ua
Kali-Linux-Ebooks
Top 20 Kali Linux Related E-books (Free Download)
Stars: ✭ 134 (+509.09%)
Mutual labels:  metasploit
iot-master
物联大师是开源免费的物联网智能网关系统,集成了标准Modbus和主流PLC等多种协议,支持数据采集、公式计算、定时控制、自动控制、异常报警、流量监控、Web组态、远程调试等功能,适用于大部分物联网和工业互联网应用场景。
Stars: ✭ 119 (+440.91%)
Mutual labels:  opc-ua

Metasploit Modules for OPC UA

Description

This repository contains OPC UA scanner modules as well as their respective documentation. Furthermore, a list of OPC UA specific default credentials can be found in this repository. In order to use these modules, Metasploit needs to be installed on your system. For further information on the rationale behind these scanner modules, please refer to our research paper Assessing the Security of OPC UA Deployments presented at the 1st ITG Workshop on IT Security.

If you use any portion of our modules in your research work, please cite the following paper:

Linus Roepert, Markus Dahlmanns, Ina Berenice Fink, Jan Pennekamp and Martin Henze
Assessing the Security of OPC UA Deployments
Proceedings of the 1st ITG Workshop on IT Security (ITSec), Tübingen, Germany
April 2020.

BibTeX:

@inproceedings{roepert_opcua_2020,
author = {Roepert, Linus and Dahlmanns, Markus and Fink, Ina Berenice and Pennekamp, Jan and Henze, Martin},
title = {{Assessing the Security of OPC UA Deployments}},
booktitle = {Proceedings of the 1st ITG Workshop on IT Security (ITSec)},
year = {2020},
}

Instructions

  1. Install Metasploit using the instructions found here. You may also use Kali Linux with a pre-installed version of Metasploit.
  2. If not already installed, install python3.
  3. Install the opcua Module for python3, e.g., via pip: pip3 install opcua.
  4. If you installed Metasploit yourself, merge the modules directory found in this repository with the modules directory in the cloned Metasploit repository. If Metasploit is pre-installed, the modules directory of this repository can be merged with ~/.msf4/modules.
  5. To use the supplied modules follow the respective module documentation or see the typical workflow below.

Typical Workflow

A typical workflow could look as follows:

  1. Use nmap to discover potential OPC UA servers in a (local) network.
    • nmap -sS <IP_RANGE> -p <PORT>
  2. Use opcua_hello to verify that an OPC UA server runs on an open port
  • use auxiliary/scanner/opcua/opcua_hello
  • set rhosts <IP>
  • set rport <PORT>
  • run
  1. Use opcua_server_config to get a list of endpoints on an OPC UA server.
  • use auxiliary/scanner/opcua/opcua_server_config
  • set rhosts <IP>
  • set rport <PORT>
  • run
  1. Optional: Use opcua_login to brute-force credentials for OPC UA server instances.
  • use auxiliary/scanner/opcua/opcua_login
  • set rhosts <IP>
  • set rport <PORT>
  • set userpass <username> <password> or set userpass file:<FILE>
  • Optional: Set up the security mode and security policy of the endpoint you want to connect to (see documentation/modules/auxiliary/scanner/opcua/opcua_login.md)
  • run
  1. Use opcua_server_config to obtain security related information for a specific OPC UA server.
  • use auxiliary/scanner/opcua/opcua_server_config
  • set rhosts <IP>
  • set rport <PORT>
  • Set up the authentication method (see documentation/modules/auxiliary/scanner/opcua/opcua_server_config.md)
  • Set up the security mode and security policy of the endpoint you want to connect to (see documentation/modules/auxiliary/scanner/opcua/opcua_server_config.md)
  • Set up information you want to retrieve from the server (servers, nodes, nodesverbose; see documentation/modules/auxiliary/scanner/opcua/opcua_server_config.md)
  • run

License

Copyright 2020 RWTH Aachen University & Fraunhofer FKIE

This program is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version.

This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details.

You should have received a copy of the GNU General Public License along with this program. If not, see http://www.gnu.org/licenses/.

If you are planning to integrate our modules into a commercial product and do not want to disclose your source code, please contact us for other licensing options via email at martin (dot) henze (at) fkie (dot) fraunhofer (dot) de

Acknowledgements

These modules have been developed within a cooperation between the Chair of Communication and Distributed Systems at RWTH Aachen University and the Fraunhofer Institute for Communication, Information Processing and Ergonomics FKIE. This work has partly been funded by the Deutsche Forschungsgemeinschaft (DFG, German Research Foundation) under Germany's Excellence Strategy – EXC-2023 Internet of Production – 390621612.

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].