{"id":701,"date":"2013-03-23T11:13:15","date_gmt":"2013-03-23T09:13:15","guid":{"rendered":"https:\/\/www.asafety.fr\/?p=701"},"modified":"2014-10-18T16:18:56","modified_gmt":"2014-10-18T14:18:56","slug":"beef-modules-m0n0wall-et-pfsense","status":"publish","type":"post","link":"https:\/\/www.asafety.fr\/en\/vuln-exploit-poc\/beef-modules-m0n0wall-et-pfsense\/","title":{"rendered":"BeEF : modules m0n0wall et pfSense"},"content":{"rendered":"<p><\/p>\n<p><a href=\"https:\/\/www.asafety.fr\/wp-content\/uploads\/beefLogo.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-medium wp-image-704\" alt=\"beefLogo\" src=\"https:\/\/www.asafety.fr\/wp-content\/uploads\/beefLogo-300x79.png\" width=\"300\" height=\"79\" srcset=\"https:\/\/www.asafety.fr\/wp-content\/uploads\/beefLogo-300x79.png 300w, https:\/\/www.asafety.fr\/wp-content\/uploads\/beefLogo.png 629w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p><a title=\"BeEF project\" href=\"http:\/\/beefproject.com\/\" target=\"_blank\">BeEF<\/a>, pour &#8220;<em>Browser Exploitation Framework Project<\/em>&#8220;,\u00a0est un outil d&#8217;audit\/pentest qui cible les navigateurs web. Celui-ci se focalise sur des vecteurs d&#8217;attaques c\u00f4t\u00e9 client, aussi bien sur les postes de travail que les terminaux mobiles.<\/p>\n<blockquote>\n<p><em>What is BeEF?<\/em><\/p>\n<p><em>BeEF is short for The Browser Exploitation Framework. It is a penetration testing tool that focuses on the web browser.<\/em><\/p>\n<p><em>Amid growing concerns about web-borne attacks against clients, including mobile clients, BeEF allows the professional penetration tester to assess the actual security posture of a target environment by using client-side attack vectors. Unlike other security frameworks, BeEF looks past the hardened network perimeter and client system, and examines exploitability within the context of the one open door: the web browser. BeEF will hook one or more web browsers and use them as beachheads for launching directed command modules and further attacks against the system from within the browser context.<\/em><\/p>\n<\/blockquote>\n<p>Le principe g\u00e9n\u00e9ral consiste \u00e0 exploiter un vecteur d&#8217;attaque sur une machine cliente (vecteur\u00a0<a title=\"XSS\" href=\"http:\/\/en.wikipedia.org\/wiki\/Cross-site_scripting\" target=\"_blank\">XSS<\/a>,\u00a0<a title=\"CSRF\" href=\"http:\/\/en.wikipedia.org\/wiki\/Csrf\" target=\"_blank\">CSRF<\/a>, etc) pour ouvrir une porte d&#8217;acc\u00e8s au syst\u00e8me, et d&#8217;examiner les exploitations potentielles dans le contexte courant du navigateur.<\/p>\n<p>Une fois une cible rattach\u00e9e \u00e0 BeEF, le framework exploite un tunnel asynchrone (principalement g\u00e9n\u00e9r\u00e9 par Javascript\/Ajax) afin de lancer l&#8217;ex\u00e9cution de modules dans le navigateur de la cible, et ainsi\u00a0perp\u00e9tuer\u00a0des attaques \u00e0 l&#8217;encontre du syst\u00e8me. Parmi les fonctionnalit\u00e9s du framework, on peut citer :<\/p>\n<ul>\n<li>L&#8217;exploitation de modules au travers du navigateur cible<\/li>\n<li>L&#8217;enregistrement des frappes du clavier (<a title=\"Keystroke logging\" href=\"http:\/\/en.wikipedia.org\/wiki\/Keystroke_logging\" target=\"_blank\"><em>keystroke logging<\/em><\/a>)<\/li>\n<li>L&#8217;utilisation du navigateur cible comme d&#8217;un proxy, pour camoufler des attaques de plus grande envergure<\/li>\n<li>L&#8217;int\u00e9gration du framework au sein de\u00a0<a title=\"Metasploit\" href=\"http:\/\/www.metasploit.com\/\" target=\"_blank\">Metasploit<\/a>\u00a0et du nouveau\u00a0<a title=\"BackTrack\" href=\"http:\/\/www.backtrack-linux.org\/\" target=\"_blank\">BackTrack<\/a>\u00a0du nom de\u00a0<a title=\"Kali Linux\" href=\"http:\/\/www.kali.org\/\" target=\"_blank\">Kali Linux<\/a><\/li>\n<li>La d\u00e9tection automatique des plugins du navigateur avec leur version (Flash, Java, Adobe&#8230;), afin d&#8217;ex\u00e9cuter des commandes arbitraires sur le syst\u00e8me.<\/li>\n<li>Comme le framework s&#8217;exploite c\u00f4t\u00e9 client, il offre un acc\u00e8s aux services intranet au pentester\/assaillant (acc\u00e8s aux firewall internes d&#8217;entreprise, routeurs, applications web priv\u00e9es&#8230;).<\/li>\n<li>Le module\u00a0<a title=\"PhoneGap\" href=\"http:\/\/phonegap.com\/\" target=\"_blank\">PhoneGap<\/a>\u00a0permet de cibler les applications mobiles (iOS, Android, BlackBerry, Symbian, Windows Phone&#8230;).<\/li>\n<li>Un tas de services et de vecteurs d&#8217;attaques ciblant\u00a0l\u2019ing\u00e9nieurie\u00a0sociale (<a title=\"Social Engineering\" href=\"http:\/\/en.wikipedia.org\/wiki\/Social_engineering_(security)\" target=\"_blank\"><em>Social Engineering &#8211; SE<\/em><\/a>) sont \u00e9galement int\u00e9gr\u00e9s.<\/li>\n<\/ul>\n<p>Exploitant des vecteurs d&#8217;attaques c\u00f4t\u00e9 client, les frameworks tels que BeEF ont redonn\u00e9s de l&#8217;importance \u00e0 des vuln\u00e9rabilit\u00e9s bien trop souvent d\u00e9laiss\u00e9es et consid\u00e9r\u00e9es comme &#8220;non-critiques&#8221;. Telles que le\u00a0<em>Cross-Site-Scripting<\/em>\u00a0(XSS persisent, non-persistent) ou encore les\u00a0<em>Cross-Site-Request-Forgery<\/em>\u00a0(CSRF). A titre de rappel, ces deux familles de vuln\u00e9rabilit\u00e9s sont plac\u00e9es respectivement en A3 et A8 par l&#8217;OWASP (<a title=\"OWASP Top Ten\" href=\"https:\/\/www.owasp.org\/index.php\/Category:OWASP_Top_Ten_Project\" target=\"_blank\">OWASP Top Ten Project 2013<\/a>). De tr\u00e8s nombreuses XSS\/CSRF sont d\u00e9couvertes chaque jour au travers d&#8217;outils web tr\u00e8s r\u00e9pandus ou encore dans des sites tr\u00e8s r\u00e9put\u00e9s. Le site\u00a0<a title=\"XSSed\" href=\"http:\/\/www.xssed.com\/\" target=\"_blank\">XSSed<\/a>\u00a0recense une grande partie de l&#8217;actualit\u00e9 li\u00e9e \u00e0 cette famille de vuln\u00e9rabilit\u00e9s, ainsi que les derniers sites impact\u00e9s.<\/p>\n<p>Le framework BeEF \u00e0 subit une refonte compl\u00e8te il y\u00a0a quelques temps par rapport \u00e0 sa version initiale qui \u00e9tait uniquement au travers d&#8217;une application WebGUI. A pr\u00e9sent, il est possible d&#8217;y charger des modules publics\/priv\u00e9s ciblant telle ou telle application\/technologie. Ces modules, similaires \u00e0 la base d&#8217;exploits de Metasploit, peuvent \u00eatre cr\u00e9\u00e9s et propos\u00e9s \u00e0 la communaut\u00e9 de BeEF par un quelconque contributeur.<\/p>\n<p>Il y a quelques mois, nous vous rapportions la d\u00e9couverte de plusieurs vuln\u00e9rabilit\u00e9s (XSS\/CSRF) permettant l&#8217;obtention d&#8217;un shell avec les privil\u00e8ges root sur deux distributions firewall\/routeur nomm\u00e9es\u00a0<a title=\"[CSRF RCE] m0n0wall 1.33 Remote root Access\" href=\"https:\/\/www.asafety.fr\/vuln-exploit-poc\/csrf-rce-m0n0wall-1-33-remote-root-access\/\" target=\"_blank\">m0n0wall<\/a>\u00a0et\u00a0<a title=\"[XSS &amp; CSRF RCE] pfSense 2.0.1 Remote root Access\" href=\"https:\/\/www.asafety.fr\/vuln-exploit-poc\/xss-csrf-rce-pfsense-2-0-1-remote-root-access\/\" target=\"_blank\">pfSense<\/a>. Apr\u00e8s avoir \u00e9chang\u00e9 avec les \u00e9quipes de d\u00e9veloppement respectives de ces deux projets pour d\u00e9tailler les vecteurs d&#8217;attaques et les PoC, de nouvelles\u00a0<em>releases<\/em>\u00a0ont vu le jour.<\/p>\n<p>Suite \u00e0 ces corrections et ces nouvelles versions, les d\u00e9tails des PoC ont \u00e9t\u00e9 divulgu\u00e9s au public. Deux des principaux PoC viennent d&#8217;\u00eatre int\u00e9gr\u00e9s en tant que module au sein du framework BeEF par\u00a0<a title=\"bmantra\" href=\"https:\/\/github.com\/bmantra\" target=\"_blank\">Bart Leppens<\/a>. Le\u00a0<a title=\"BeEF blog\" href=\"http:\/\/blog.beefproject.com\/\" target=\"_blank\">blog officiel du projet BeEF<\/a>\u00a0pr\u00e9sente\u00a0<a title=\"BeEF m0n0wall 1.33 article\" href=\"http:\/\/blog.beefproject.com\/2013\/03\/exploiting-m0n0wall-133-with-beef.html\" target=\"_blank\">un article sur le module visant la version de m0n0wall 1.33<\/a>. Une\u00a0<a title=\"Vid\u00e9o d\u00e9monstration\" href=\"http:\/\/static.googleusercontent.com\/external_content\/untrusted_dlcp\/video.google.com\/en\/\/googleplayer.swf?videoUrl=http%3A%2F%2Fredirector.googlevideo.com%2Fvideoplayback%3Fid%3Daa0ef335dd6a8195%26itag%3D18%26source%3Dpicasa%26cmo%3Dsensitive_content%253Dyes%26ip%3D0.0.0.0%26ipbits%3D0%26expire%3D1366412152%26sparams%3Did%2Citag%2Csource%2Cip%2Cipbits%2Cexpire%26signature%3D9949C3E7E34E805838CE51F9E341A669F95214D.264590B122C7BA23090D35AF79DCB8AE825036DF%26key%3Dlh1\" target=\"_blank\">vid\u00e9o de d\u00e9monstration<\/a>\u00a0du module est \u00e9galement disponible.<\/p>\n<p>Il existe d&#8217;autres alternatives \u00e0 BeEF qui apparaissent depuis quelques ann\u00e9es, notamment\u00a0<a title=\"XSSF\" href=\"https:\/\/code.google.com\/p\/xssf\/\" target=\"_blank\">The Cross-Site Scripting Framework<\/a>\u00a0(XSSF) ou encore l&#8217;<a title=\"Xenotix XSS Exploit Framework\" href=\"https:\/\/www.owasp.org\/index.php\/OWASP_Xenotix_XSS_Exploit_Framework\" target=\"_blank\">OWASP Xenotix XSS Exploit Framework<\/a>.<\/p>\n<p><strong>Sources &amp; ressources :<\/strong><\/p>\n<ul>\n<li><a title=\"BeEF official blog\" href=\"http:\/\/blog.beefproject.com\/2013\/03\/exploiting-m0n0wall-133-with-beef.html\" target=\"_blank\">Exploiting m0n0wall 1.33 with BeEF &#8211; BeEF official blog<\/a><\/li>\n<li><a title=\"Discussion module\" href=\"https:\/\/github.com\/beefproject\/beef\/pull\/852\" target=\"_blank\">Discussion about m0n0wall module &#8211; BeEF GitHub<\/a><\/li>\n<li><a title=\"Module m0n0wall\" href=\"https:\/\/github.com\/bmantra\/beef\/commit\/de2bd15769c446ce941649178da25ed328afc3a9\" target=\"_blank\">Module m0n0wall 1.33 in BeEF<\/a><\/li>\n<li><a title=\"Module pfSense 2.0.1\" href=\"https:\/\/github.com\/bmantra\/beef\/commit\/8cd570c62d24596175387d2c06ccffe50b8254d4\" target=\"_blank\">Module pfSense 2.0.1 in BeEF<\/a><\/li>\n<li><a title=\"Article Synetis\" href=\"http:\/\/www.synetis.com\/2013\/03\/22\/beef-the-browser-exploitation-framework-project\/\" target=\"_blank\">Article Synetis<\/a><\/li>\n<\/ul>\n<p>Je remercie Bart Leppens pour sa courtoisie, son article et son message de remerciement vis-\u00e0-vis de son int\u00e9r\u00eat pour ces deux PoC m0n0wall et pfSense.<\/p>\n<p><em>I thank Bart Leppens for his courtesy, his article and his mail of appreciation concerning its interest for both PoC m0n0wall and pfSense.<\/em><\/p>\n<p><\/p>","protected":false},"excerpt":{"rendered":"<p>BeEF, pour &#8220;Browser Exploitation Framework Project&#8220;,\u00a0est un outil d&#8217;audit\/pentest qui cible les navigateurs web. Celui-ci se focalise sur des vecteurs [&hellip;]<\/p>\n","protected":false},"author":1337,"featured_media":1153,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[195,165,16,14],"tags":[295,297,48,293,200,206,294,298,202,296,299,209,226,203,49,301,300],"class_list":["post-701","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-bsd","category-os","category-prog-and-dev","category-vuln-exploit-poc","tag-ajax","tag-backtrack","tag-beef","tag-browser-exploitation-framework","tag-cross-site-request-forgery","tag-cross-site-scripting","tag-javascript","tag-kali-linux","tag-m0n0wall","tag-metasploit","tag-owasp","tag-pentest","tag-pentesting","tag-pfsense","tag-poc","tag-xenotix","tag-xssf"],"_links":{"self":[{"href":"https:\/\/www.asafety.fr\/en\/wp-json\/wp\/v2\/posts\/701","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.asafety.fr\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.asafety.fr\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.asafety.fr\/en\/wp-json\/wp\/v2\/users\/1337"}],"replies":[{"embeddable":true,"href":"https:\/\/www.asafety.fr\/en\/wp-json\/wp\/v2\/comments?post=701"}],"version-history":[{"count":7,"href":"https:\/\/www.asafety.fr\/en\/wp-json\/wp\/v2\/posts\/701\/revisions"}],"predecessor-version":[{"id":1154,"href":"https:\/\/www.asafety.fr\/en\/wp-json\/wp\/v2\/posts\/701\/revisions\/1154"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.asafety.fr\/en\/wp-json\/wp\/v2\/media\/1153"}],"wp:attachment":[{"href":"https:\/\/www.asafety.fr\/en\/wp-json\/wp\/v2\/media?parent=701"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.asafety.fr\/en\/wp-json\/wp\/v2\/categories?post=701"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.asafety.fr\/en\/wp-json\/wp\/v2\/tags?post=701"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}