Bluewall is a firewall framework designed for offensive and defensive cyber professionals. This framework allows Cybersecurity professionals to quickly setup their environment while staying within their scope.
Features
* Configure Firewall
* Configure Hostname
* Configure Interface(s)
Also Read – LOLBITS : C# Reverse Shell Using BITS As Communication Protocol
Supported Operating Systems
* Redhat/CentOS
* Windows configuration can be generated but not executed.
Commandline
* bluewall -c config/example.ini
** See example configuration
Utils
* Enumerate – Identify live hosts inside your network (coming soon)
Symantecs
* Target Host – Outbound communication
* Trusted Host – Bidirectional communication
* No Strike – Devices your computer should not communicate with
Setup
#BUILT FOR PYTHON 2.x
sudo python setup.py install
sudo bluewall -h (for help)
Getting Started
#Setup Initial Environment using Configuration
sudo bluewall -c config/hostconfig.ini
#Export optional windows configuration
sudo bluewall -c config/hostconfig.ini -w autoconfig.ps1
#Add additional inbound host or ranges
sudo bluewall -ih 192.168.0.3,192.168.1.0/24
#Exclude host to communicate with
sudo bluewall -eh 192.168.1.1
#Super easy wizard mode
sudo bluewall –wizard
What is a Software Supply Chain Attack? A software supply chain attack occurs when a…
When people ask how UDP works, the simplest answer is this: UDP sends data quickly…
Endpoint Detection and Response (EDR) solutions have become a cornerstone of modern cybersecurity, designed to…
A large-scale malware campaign leveraging AI-assisted development techniques has been uncovered, revealing how attackers are…
How Does a Firewall Work Step by Step? What Is a Firewall and How Does…
People trying to securely connect to work are being tricked into doing the exact opposite.…