Your SlideShare is downloading. ×
0
Botnet mode
Botnet mode
Botnet mode
Botnet mode
Botnet mode
Botnet mode
Botnet mode
Botnet mode
Botnet mode
Botnet mode
Botnet mode
Botnet mode
Botnet mode
Botnet mode
Botnet mode
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Botnet mode

548

Published on

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
548
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
11
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. OWASP OWTF Implementation owtf Botnet mode module. Marios Kourtesis Mentor: Abraham Aranguren
  • 2. Table of Contents ● What is Botnet Mode ● How it works ● TOR mode – – ● Advantages Disadvantages Proxy List mode – ProxyMiner – ProxyManager – Advantages – Disadvantages – Proxy List mode Diagram ● Behind The Scenes ● Sources
  • 3. What it Botnet Mode? The main purpose of this feature is to detour potential ip-filtering that defenders might attempt in order to prevent our scan. When it is enabled it applies anonymity to all tools that are used from OWTF.
  • 4. How it Works Botnet mode works in two different ways. ● TOR mode – ● Each Http request will pass thow TOR Network[1]. Proxy List mode – Each Http request will pass throw a different proxy.
  • 5. TOR mode ● Starts TOR daemon. ● Every request passes throw TOR network. ● ● User can configure in how many time to automatically change his IP address. User can configure after how many request wants to change his IP address.
  • 6. TOR mode Advantages ● High level of anonymity. ● Good option for professional testing without privileges.
  • 7. TOR mode Disadvantages ● TOR network is very slow. ● Some TOR proxy routers are owned by government.
  • 8. Proxy List mode ● Each Http request will pass throw a different proxy. ● Support public and private proxy lists. ● The proxies could be imported as a list. ● ● The proxies also could be fetched automatically with the ProxyMiner* from the web. Recovery support for dead proxies. *ProxyMiner(Described in the next slides)
  • 9. ProxyMiner ProxyMiner is a feature that searches on the web for proxies and passes them to ProxyManager(next slide). By the time you have enabled Botnet mode, ProxyMiner will ask user if he wants to start the mining process before the scanning process begins. ● It runs continuously and mines proxies(optionally). ● It has a big list of websites that contain proxies. ● Handles dead proxies.
  • 10. ProxyManager Proxy manager handles all proxies that are passed from ProxyMiner or imported from a list. ● It is responsible to handle dead proxies. ● It sorts proxies by speed or country. ● It puts dead proxies in a blacklist. ● It keeps Statistics about proxies.
  • 11. Proxy List mode Advantages ● High speed scan. ● Provides better anonymity level than using a simple proxy. ● You can have proxies list automatically. ● If you don't trust ProxyMiner's proxies you can import your proxy list.
  • 12. Proxy List mode Disadvantages ● Proxies mined from the web are not confidential.
  • 13. Proxy List mode diagram
  • 14. Behind the Scenes ● ● For the Data mining process i will use Beautiful Soup(python library[2]). Beautiful soup is implemented in both python 2.7 and python 3 so it is a great choice for future plan of porting owtf to python 3. The data structure for the proxy list will be the following: (ip, port, speed, country, type,send_requests, user, password) ● The implementation will use the MiTM proxy[3].
  • 15. Sources ● ● ● [1]”TOR”, url: [ https://www.torproject.org/about/overview.html.en ] [2]”Beautiful Soup Documentation”, url: [http://www.crummy.com/software/BeautifulSoup/bs4/doc/] [3]”MiTM Proxy”, url: [http://www.slideshare.net/abrahamaranguren/owasp-owtfsummer-storm-owasp-appsec-eu-2013], pp. 43-53.

×