Scanner -Sophos-XG --- Web server (HTTP/HTTPS)
212.0.210.169 212.0.210.172 (port B)
10.255.255.1 (port C) 10.255.255.172
1) Scanner VM: ubuntu-lts-20-soph-pytbull
https://www.bgasecurity.com/2013/08/ack-kaynak-kodlu-yazlmlar-kullanarak/
212.0.210.169
cd /zzz/pytbull/pytbull-ng-main/source
time /zzz/pytbull/pytbull-ng-main/source/pytbull -t 212.0.210.172 --mode=gateway
2) Sophos XG 18.3 VM: sophos-18.5.3_MR-3.VMW-408_virtual_vm8
Network adapter 1 vlan_0099 ( Port A : https://172.17.99.117:4444/
Network adapter 2 vlan_3098 ( Port B : 212.0.210.172 (+ NAT to 10.255.255.172)
Network adapter 3 vlan_0666 ( Port A : 10.255.255.1
3) Web Server: ubuntu-lts-20-soph-web-server
Network adapter 1 vlan_0666 ( Port A : 10.255.255.172
https://sxg.telco.md/
====================================
./GO-pytbull-scanner
(cd /zzz/pytbull/pytbull-ng-main/source
time /zzz/pytbull/pytbull-ng-main/source/pytbull -t 212.0.210.172 --mode=gateway)
__ __ ____
____ __ __/ /_/ /_ __ __/ / / ____ ____ _
/ __ \/ / / / __/ __ \/ / / / / /_____/ __ \/ __ `/
/ /_/ / /_/ / /_/ /_/ / /_/ / / /_____/ / / / /_/ /
/ .___/\__, /\__/_.___/\__,_/_/_/ /_/ /_/\__, /
/_/ /____/ /____/
creator of pytbull: Sebastien Damaye, aldeid.com
creator of pytbull-ng: Michal Chrobak, efigo.pl
What would you like to do?
1. Run a new campaign (will erase previous results)
2. View results from previous campaign
3. Exit
Choose an option: 1
(gateway mode)
+------------------------------------------------------------------------+
| pytbull will set off IDS/IPS alarms and/or other security devices |
| and security monitoring software. The user is aware that malicious |
| content will be downloaded and that the user should have been |
| authorized before running the tool. |
+------------------------------------------------------------------------+
BASIC CHECKS
------------
Checking root privileges.........................................[ OK ]
Checking remote port 80/tcp (HTTP)...............................[ OK ]
Checking path for sudo...........................................[ OK ]
Checking path for nmap...........................................[ OK ]
Checking path for nikto..........................................[ OK ]
Checking path for niktoconf......................................[ OK ]
Checking path for hping3.........................................[ OK ]
Checking path for tcpreplay......................................[ OK ]
Checking path for ab.............................................[ OK ]
Checking path for ping...........................................[ OK ]
Checking path for ncrack.........................................[ OK ]
Removing temporary file..........................................[ OK ]
Cleaning database................................................[ OK ]
TESTS
------------
Client Side Attacks..............................................[ no ]
Test Rules.......................................................[ no ]
Bad Traffic......................................................[ yes ]
Fragmented Packets...............................................[ yes ]
Brute Force......................................................[ no ]
Evasion Techniques...............................................[ yes ]
ShellCodes.......................................................[ no ]
Denial of Service................................................[ yes ]
Pcap Replay......................................................[ yes ]
Normal Usage.....................................................[ yes ]
IP Reputation....................................................[ yes ]
BAD TRAFFIC
------------
TEST #1 - [16:25:19-16:35:19] - Nmap Xmas scan........................[ done ]
TEST #2 - [16:25:24-16:26:24] - Malformed Traffic.....................[ done ]
FRAGMENTED PACKETS
------------
EVASION TECHNIQUES
------------
TEST #3 - [16:25:28-16:35:28] - Nmap decoy test (6th position)........[ done ]
TEST #4 - [16:27:56-16:37:56] - Nmap decoy test (7th position)........[ done ]
TEST #5 - [16:30:22-16:31:22] - Hex encoding..........................[ done ]
TEST #6 - [16:30:26-16:40:26] - Nmap scan with fragmentation..........[ done ]
TEST #7 - [16:31:15-16:32:15] - Nikto Random URI encoding.............[ done ]
TEST #8 - [16:31:36-16:32:36] - Nikto Directory self reference........[ done ]
TEST #9 - [16:32:11-16:33:11] - Nikto Premature URL ending............[ done ]
TEST #10 - [16:32:47-16:33:47] - Nikto Prepend long random string.....[ done ]
TEST #11 - [16:33:23-16:34:23] - Nikto Fake parameter.................[ done ]
TEST #12 - [16:33:32-16:34:32] - Nikto TAB as request spacer..........[ done ]
TEST #13 - [16:33:38-16:34:38] - Nikto Change the case of the URL.....[ done ]
TEST #14 - [16:34:15-16:35:15] - Nikto Windows directory separator....[ done ]
TEST #15 - [16:34:52-16:35:52] - Nikto Carriage return as request s...[ done ]
TEST #16 - [16:34:58-16:35:58] - Nikto Binary value as request spac...[ done ]
TEST #17 - [16:35:06-16:36:06] - Javascript Obfuscation...............[ done ]
DENIAL OF SERVICE
------------
TEST #18 - [16:35:10-16:36:10] - ApacheBench DoS......................timed out...[ done ]
TEST #19 - [16:36:14-16:37:14] - hping SYN flood......................[ done ]
PCAP REPLAY
------------
NORMAL USAGE
------------
TEST #20 - [16:36:19-16:37:19] - ApacheBench 10 requests..............[ done ]
TEST #21 - [16:36:25-16:37:25] - Standard ping........................[ done ]
IP REPUTATION
------------
TEST #22 - [16:36:29-16:37:29] - IP Reputation 103.129.98.17..........[ done ]
TEST #23 - [16:36:33-16:37:33] - IP Reputation 103.253.73.77..........[ done ]
TEST #24 - [16:36:37-16:37:37] - IP Reputation 103.83.81.144..........[ done ]
TEST #25 - [16:36:41-16:37:41] - IP Reputation 104.18.36.98...........[ done ]
TEST #26 - [16:36:45-16:37:45] - IP Reputation 107.175.64.210.........[ done ]
TEST #27 - [16:36:49-16:37:49] - IP Reputation 108.171.216.194........[ done ]
TEST #28 - [16:36:53-16:37:53] - IP Reputation 110.4.45.119...........[ done ]
TEST #29 - [16:36:57-16:37:57] - IP Reputation 184.168.221.43.........[ done ]
TEST #30 - [16:37:01-16:38:01] - IP Reputation 185.104.45.20..........[ done ]
TEST #31 - [16:37:05-16:38:05] - IP Reputation 185.174.100.116........[ done ]
real 11m52.821s
user 0m10.923s
sys 0m3.134s
Sophos XG IPS logs:
Time Log comp Log subtype Username Src IP Dst IP Signature ID Signature name Category Platform Victim Firewall rule Message ID Live PCAP
IPS 6/9/2022 19:30 Signatures Drop 212.0.210.169 10.255.255.172 1122 SERVER-WEBAPP /etc/passwd file access attempt server-webapp Linux Server 6 7002 Open PCAP
IPS 6/9/2022 19:27 Signatures Drop 212.0.210.169 10.255.255.172 2305362 SCAN NMAP Script Scanner scan BSD,Linux,Mac,Other,Solaris,Unix,Windows Server 6 7002 Open PCAP
IPS 6/9/2022 19:27 Signatures Drop 212.0.210.169 10.255.255.172 2305362 SCAN NMAP Script Scanner scan BSD,Linux,Mac,Other,Solaris,Unix,Windows Server 6 7002 Open PCAP
IPS 6/9/2022 19:27 Signatures Drop 212.0.210.169 10.255.255.172 2305362 SCAN NMAP Script Scanner scan BSD,Linux,Mac,Other,Solaris,Unix,Windows Server 6 7002 Open PCAP
IPS 6/9/2022 19:27 Signatures Drop 212.0.210.169 10.255.255.172 2305362 SCAN NMAP Script Scanner scan BSD,Linux,Mac,Other,Solaris,Unix,Windows Server 6 7002 Open PCAP