Skip to main content

Network Sinkhole for Isolated Malware Analysis

Project description

Network sinkhole for isolated malware analysis.

Current build status Latest PyPI version

Overview

netsink is a network daemon that will bind to any number of configured IP ports and provide fake services in an attempt to convince running malware that it has an active Internet connection.

Getting Started

Install using pip:

pip install netsink

Start the netsink listeners with the default configuration (you will need administrator/root access to bind to privilleged ports):

sudo netsink

You should see output similar to the following, showing the bound ports:

2013-03-03 21:01:02,710 [netsink] INFO: Listener 'http' awaiting TCP activity on port/s [80, 8000, 8080, 8090]
2013-03-03 21:01:02,717 [netsink] INFO: Listener 'https' awaiting SSL activity on port/s [443, 8443]
2013-03-03 21:01:02,726 [netsink] INFO: Listener 'dns' awaiting UDP activity on port/s [53]
2013-03-03 21:01:02,726 [netsink] INFO: Waiting...

To test, open a browser on the same host and navigate to https://127.0.0.1/testing and you should see a netsink response page.

Client Setup

To be useful a client machine must be forced to redirect their traffic to the services on the netsink host. This can be achieved in several ways.

Static DNS Configuration

netsink includes a DNS server that will advertise itself as the destination for any client DNS requests (or as otherwise configured). Change the client’s network interface to use the netsink host’s address as its DNS server. Also set the Default Gateway to the netsink host if using iptables redirection, to capture direct IP address communication attempts.

DHCP Configuration

Not currently provided by the netsink package, however, if installing on a unix/linux platform, using the operating system’s DHCP server package can be effective (for example isc-dhcp-server on ubuntu). Set the netsink host as the address to be returned for DNS and Default Gateway to the clients. Set the client’s network interface to obtain an address automatically.

To test, ensure that any changes have been applied to the client’s network interface. On Windows, in a command window:

ipconfig /all

The netsink host’s address should be listed as the DNS server on the applicable network interface. Now open a web browser on the client and navigate to www.google.com you should instead see the netsink response page and the DNS/HTTP requests logged on the server.

Goals

The primary project goals are:

  • Provide malware with communication end points to assist execution and elicit network traffic.

  • Straight-forward installation. Should work out-of-the-box, with minimal configuration, for most scenarios.

  • Easy configuration and extension. Adding custom services and response handling should be as simple as possible.

Features

  • DNS redirection based on simple config file

  • HTTP/HTTPS serving of static files based on url regexes

  • Imitate known external IP address lookup sites (thanks to ipgetter for the compiled list)

  • IRC service to capture connect and channel joins, etc.

  • SMTP/ESMTP server including AUTH and STARTTLS support

  • FTP server support

  • Listening port ranges easily configurable and separate from the modules that handle the traffic.

  • Automatic connection redirection for platforms that support iptables

  • Generic port listener that can dispatch to other modules via packet inspection

Planned Additions:

  • Internal DHCP server to auto configure clients

  • Expand available fake services to include POP3, IMAP, TFTP, etc.

  • Pluggable fake C2 servers

  • Better documentation

Issues

Source code for netsink is hosted on GitHub. Any bug reports or feature requests can be made using GitHub’s issues system.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

netsink-0.5.tar.gz (32.3 kB view details)

Uploaded Source

Built Distribution

netsink-0.5-py2-none-any.whl (33.8 kB view details)

Uploaded Python 2

File details

Details for the file netsink-0.5.tar.gz.

File metadata

  • Download URL: netsink-0.5.tar.gz
  • Upload date:
  • Size: 32.3 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No

File hashes

Hashes for netsink-0.5.tar.gz
Algorithm Hash digest
SHA256 919a174b8f9bb37a89ddd5edc4d5454e7dcb44af0cafc95207d53febf1994e9b
MD5 3e9f24d389ce14189a4a7f59dfd99f63
BLAKE2b-256 0459acea564533e3c1c4a56782f072e239c9e1afcf2eeebbfe4c6b8e259e4390

See more details on using hashes here.

File details

Details for the file netsink-0.5-py2-none-any.whl.

File metadata

File hashes

Hashes for netsink-0.5-py2-none-any.whl
Algorithm Hash digest
SHA256 6b74984f8732db82c3357d6e618c93ec535346c6d73ae3cbcadbb331d8eeedaf
MD5 99c183ab2a4a4529fcdcefedc2849790
BLAKE2b-256 c210e5b74a6ac4fcdf0017ef28b3bf4e81ea789f901bc93509776d2b543ea3e3

See more details on using hashes here.

Supported by

AWS AWS Cloud computing and Security Sponsor Datadog Datadog Monitoring Fastly Fastly CDN Google Google Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page