hideNsneak application assists in managing attack infrastructure for penetration testers by providing an interface to rapidly deploy, manage, and take down various cloud services. These include VMs, domain fronting, Cobalt Strike servers, API gateways, and firewalls.
hideNsneak provides a simple interface that allows penetration testers to build ephemeral infrastructure — one that requires minimal overhead. hideNsneak can:
deploy, destroy, and listA few disclosures for V 1.0:
Ubuntu 16.04 Linux.us-east-1 go get github.com/rmikehodges/hideNsneakcd $GOPATH/src/github.com/rmikehodges/hideNsneak./setup.shcp config/example-config.json config/config.json ./hidensneak [command]Also ReadDoor404 – Door404 is Open Source Project
hidensneak help –> run this anytime to get available commandshidensneak instance deployhidensneak instance destroyhidensneak instance listhidensneak api deployhidensneak api destroyhidensneak api listhidensneak domainfront enablehidensneak domainfront disablehidensneak domainfront deployhidensneak domainfront destroyhidensneak domainfront listhidensneak firewall addhidensneak firewall listhidensneak firewall deletehidensneak exec command -chidensneak exec nmaphidensneak exec socat-redirecthidensneak exec cobaltstrike-runhidensneak exec collaborator-runhidensneak socks deployhidensneak socks listhidensneak socks destroyhidensneak socks proxychainshidensneak socks socksdhidensneak install burphidensneak install cobaltstrikehidensneak install socathidensneak install letsencrypthidensneak install gophishhidensneak install nmaphidensneak install sqlmaphidensneak file pushhidensneak file pullFor all commands, you can run --help after any of them to get guidance on what flags to use.
_terraform –> terraform modules_ansible –> ansible roles and playbooks_assets –> random assets for the beauty of this project_cmd –> frontend interface package_deployer –> backend commands and structsmain.go –> where the magic happensGoogle Domain Fronting
A default security group hideNsneak is made in all AWS regions that is full-open. All instances are configured with iptables to only allow port 22/tcp upon provisioning.
If your program starts throwing terraform errors indicating a resource is not found, then you may need to remove the problematic terraform resources. You can do this by running the following:
cd $GOPATH/src/github.com/rmikehodges/hideNsneak/terraform
terraform state rm <name of problem resource>
This resource will need to be cleaned up manually if it still exists.
Error: configuration for module name here is not present; a provider configuration block is required for all operations
This is usually due to artifacts being left in the state from old deployments. Below are instructions on how to remove those artifacts from your state. If they are live resources, they will need to be manually destroyed via the cloud provider’s administration panel.
cd $GOPATH/src/github.com/rmikehodges/hideNsneak/terraformterraform state rm <module or resource name>Error: Error locking state: Error acquiring the state lock: ConditionalCheckFailedException: The conditional request failed status code: 400, request id: P7BUM7NA56LQEJQC20A3SE2SOVVV4KQNSO5AEMVJF66Q9ASUAAJG Lock Info: ID: 4919d588-6b29-4aa7-d917-2bcb67c14ab4
If this does not go away after another user has finished deploying then it is usually due to to Terraform not automatically unlocking your state in the face of errors. This can be fixed by running the following:
terraform force-unlock <ID> $GOPATH/src/github.com/rmikehodges/hideNsneak/terraformNote that this will unlock the state so it may have an adverse affect on any other writes happening in the state so make sure your other users are not actively deploying/destroying anything when you run this.
General Working of a Web Application Firewall (WAF) A Web Application Firewall (WAF) acts as…
How to Send POST Requests Using curl in Linux If you work with APIs, servers,…
If you are a Linux user, you have probably seen commands like chmod 777 while…
Vim and Vi are among the most powerful text editors in the Linux world. They…
Working with compressed files is a common task for any Linux user. Whether you are…
In the digital era, an email address can reveal much more than just a contact…