Abaddon is a Red team operations involve miscellaneous skills, last several months and are politically sensitive; they require a lot of monitoring, consolidating and caution. Wavestone’s red team operations management software, Abaddon, has been designed to make red team operations faster, more repeatable, stealthier, while including value-added tools and bringing numerous reporting capabilities.
Because:
What did we want with Abaddon ?:
Abaddon aims at facilitating red team operations by:
The slides presenting Abaddon at RSAC2020 can be found here: (Abaddon, the red team angel)
Installing And Launching Abaddon
Abaddon has been tested on Debian, LUbuntu, and of course KALI Linux (latest tests have been performed on the 5.4.0 amd64 version). You also need to have Internet access, and a public IP address if you want to deploy your C&C server locally.
Note that to configure your AWS environment, the easiest way is probably to install the aws-cli like indicated here: https://docs.aws.amazon.com/fr_fr/cli/latest/userguide/install-cliv2-linux.html
curl “https://awscli.amazonaws.com/awscli-exe-linux-x86_64.zip” -o “awscliv2.zip”
unzip awscliv2.zip
sudo ./aws/install
Clone this repository and move inside the repository folder
git clone git@github.com/wavestone-cdt/abaddon.git
cd abaddon
Create the files ~/.aws/credentials and ~/.aws/config with your AWS credentials and configuration, using the following command:
aws configure
Move settings.py.sample to settings.py. Add change the database user password (This password will be asked durring the setup process)
mv abaddon/settings.py.sample abaddon/settings.py
sed -i ‘s/yourPasswordHere//g’ abaddon/settings.py
Launch the following command in the abaddon/setup folder:
bash setup/install.sh
This script will:
Start the Red Team Angel !
bash abaddon.sh
Open a browser, and go to the URL 127.0.0.1:8000 (connect with the Django superuser credentials created during the installation).
Deployment Of A C&C Infrastructure Inside Abaddon
http port = 80
ssl port = 443
Listening Port= 9999
C2 IP adress = 172.16.0.1
bomber is an application that scans SBOMs for security vulnerabilities. So you've asked a vendor…
Embed a payload within a PNG file by splitting the payload across multiple IDAT sections.…
Exploit-Street, where we dive into the ever-evolving world of cybersecurity with a focus on Local…
Shadow Dumper is a powerful tool used to dump LSASS (Local Security Authority Subsystem Service)…
shadow-rs is a Windows kernel rootkit written in Rust, demonstrating advanced techniques for kernel manipulation…
Extract and execute a PE embedded within a PNG file using an LNK file. The…