Skip to main content

IdsFree: Launch hacking tests in cloud providers securely, isolated and without raise security alerts in the provider

Project description

idsFree

IdsFree: Launch hacking tests in cloud providers securely, isolated and without raise security alerts in the provider

idsFree logo https://travis-ci.org/BBVA/idsfree.svg?branch=master https://img.shields.io/pypi/l/Django.svg https://img.shields.io/pypi/status/Django.svg https://codecov.io/gh/bbva/idsfree/branch/master/graph/badge.svg Documentation Status

Project site

https://github.com/bbva/idsfree

Issues

https://github.com/bbva/idsfree/issues/

Documentation

https://idsfree.readthedocs.io/

Authors

Daniel Garcia (cr0hn)

Latest Version

1.0.0-alpha

Python versions

3.5 or above

What’s idsFree?

IdsFree allow you to perform hacking testing without raise alerts at IDS mechanism.

What problem solve IdsFree?

There’re many organizations and companies (an users too) that only have Cloud provides as an infrastructure for their own products, developments and any other thing that they will need.

But, what happen with active part of security? Of course we’re talking about ethical hacking and penetration testing. The major part of cloud providers doesn’t allow to perform hacking tasks in their platform (or very limited), even if you only attack your own services!

IdsFree allow you to do:

  1. Hacking tasks without raise alert into Cloud Provider.

  2. Create a secure and isolated network to perform your hacking tests.

  3. Automate your hacking tasks following the concept of previous point.

How it works?

To perform the above tasks, IdsFree follow these steps:

  1. IdsFree uses a SSH connection a virtual machine in your cloud provider.

  2. Once connected, idsFree will create a private and cyphered network on this virtual machine using Docker Swarm.

  3. Get your application (and their environment requisites) as a Docker image and run it attaching it to the previously created network.

  4. Attach to the network hacking tools as docker containers and launch selected attacks through the cyphered and isolated network.

  5. Take the results of tools and export them in a usable format: JSON or JUnit format (very useful for integrating with Jenkins).

  6. Clean up the container and network from the virtual machine.

The next image illustrates how the environment are deployed in the cloud provider:

IdsFree running

Quick start

Install

> python3.5 -m pip install idsfree

Check remote environment

IdsFree allow to check if a remote system has all the necessary conditions to run. An examples of usage are:

Check remote system by passing the password in command line

> idsfree -v -H 192.168.111.129  -d -U root -P MY_PASSWORD prepare
[ * ] Starting preparation of remote host...
[ * ] Checking remote machine for minimum requisites
[ * ] Initialization Swarm at IP: 192.168.111.129
[ * ] Creating new encrypted network: DgJXoXmeYhASHjmSV

Check remote system and tell to idsFree ask for the password

> idsfree -v -H 192.168.111.129  -d -U root -A prepare
[ * ] Starting preparation of remote host...
[ * ] Checking remote machine for minimum requisites
[ * ] Initialization Swarm at IP: 192.168.111.129
[ * ] Creating new encrypted network: DgJXoXmeYhASHjmSV

Launching the attacks

Currently, idsFree can launch two type of attacks: net | web, and try to choice the best tools to perform the attacks.

Also, idsFree can report in two formats: JSON and JUnit.

Launch attack and report in JUnit

> idsfree -v -H 192.168.111.129  -d -U root -P MY_PASSWORD run_attacks  -p  6379 -t net -s redis redis -o results.xml -e junit
[ * ] Starting attacks of remote host...
[ * ] Checking remote machine for minimum requisites
[ * ] Creating temporal encrypted network: lEvXBfPNVmoCZyFmKJsnPSADJjrUoxmxjFst
[ * ] Removing temporal encrypted network: lEvXBfPNVmoCZyFmKJsnPSADJjrUoxmxjFst
[ * ] Generating results as 'JUnit' format, in file: 'results.xml'

Launch attack, report in JSON and ask for password

> idsfree -v -H 192.168.111.129  -d -U root -A run_attacks  -p  6379 -t  net -s redis redis -o results.json -e json
[ * ] Starting attacks of remote host...
[ * ] Checking remote machine for minimum requisites
[ * ] Creating temporal encrypted network: lEvXBfPNVmoCZyFmKJsnPSADJjrUoxmxjFst
[ * ] Removing temporal encrypted network: lEvXBfPNVmoCZyFmKJsnPSADJjrUoxmxjFst
[ * ] Generating results as 'json' format, in file: 'results.json'

Documentation

(Still pending!)

Go to documentation site: https://idsfree.readthedocs.io/

Contributors

Contributors are welcome. You can find a list ot TODO tasks in the TODO.md at the project file.

All contributors will be added to the CONTRIBUTORS.md file.

Thanks in advance if you’re planning to contribute to the project! :)

License

This project is distributed under BSD license

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

idsfree-1.0.0.tar.gz (20.8 kB view details)

Uploaded Source

File details

Details for the file idsfree-1.0.0.tar.gz.

File metadata

  • Download URL: idsfree-1.0.0.tar.gz
  • Upload date:
  • Size: 20.8 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No

File hashes

Hashes for idsfree-1.0.0.tar.gz
Algorithm Hash digest
SHA256 aaa13552b82a4dfe8c8b0c0ce2dd9a4c4b5c27d4fe1c18404b75d66218092637
MD5 19195743ae92c5e2b3010a36b6279155
BLAKE2b-256 411d0db453329650fafaefe0b0d4e4638f0b02f9e80ba5a6fefe9a344f5825bc

See more details on using hashes here.

Supported by

AWS AWS Cloud computing and Security Sponsor Datadog Datadog Monitoring Fastly Fastly CDN Google Google Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page