Cyber security

WolfPack – Scaling Red Team Redirectors

WolfPack combines the capabilities of Terraform and Packer to streamline the deployment of red team redirectors on a large scale.

This tool enables security professionals to efficiently scale out the creation and management of Apache redirectors, which mimic authentic websites.

These redirectors act as a bridge, seamlessly redirecting incoming traffic to a controlled C2 infrastructure.

WolfPack simplifies the process of setting up and configuring these deceptive elements, making it an invaluable asset for security testing and red teaming exercises.

Installation:

git clone https://github.com/RoseSecurity-Research/WolfPack.git

Ensure that you have downloaded Packer and Terraform before continuing! This can be simply done using the following methods:

Packer And Terraform Download Methods (MacOS):

1.) Install Homebrew by entering this command into your terminal application: /bin/bash -c "$(curl -fsSL https://raw.githubusercontent.com/Homebrew/install/master/install.sh)". Then install both packer and terraform via brew

$ brew tap hashicorp/tap && brew update
$ brew cask install packer
$ brew cask install terraform

Deployment:

To deploy WolfPack, ensure that you have an active AWS profile with credentials within your current terminal session before continuing with the following commands

$ vim playbooks/apache_install.yaml
    - name: Add .htaccess
      copy:
        dest: /var/www/.htaccess
        content: |
          # .htaccess Start
          RewriteEngine On
          RewriteCond %{REQUEST_METHOD} ^(GET|POST) [NC]
          RewriteCond %{REQUEST_URI} ^/api/v1/2023/(.*)$
          
          # Change the following to the User-Agent for callbacks
          RewriteCond %{HTTP_USER_AGENT} "Mozilla/5.0 \(Windows NT 10.0; Win64; x64) AppleWebKit/537.36 \(KHTML, like Gecko\) Chrome/113.0.0.0 Safari/537.36"

          # Change the following to your C2 IP Address
          RewriteRule ^.*$ "https://10.8.0.2%{REQUEST_URI}" [P,L]

Deploy the AMI

$ cd images/redirector
$ packer init
$ packer build .

This will deploy a custom redirector AMI within your AWS account EC2 services.

Note
This code is undergoing development, so if you encounter any errors or have any enhancement requests, feel free to create an issue on this repository

Tamil S

Tamil has a great interest in the fields of Cyber Security, OSINT, and CTF projects. Currently, he is deeply involved in researching and publishing various security tools with Kali Linux Tutorials, which is quite fascinating.

Recent Posts

PwnedPasswordsDownloader – Efficient Downloading Of HIBP Password Hashes Using Curl Parallelism

Thanks for HIBP and this downloader. At first I was considering using it, but the…

4 days ago

Cybersecurity Conferences – A Comprehensive Slide Collection

Comprehensive repository for presentation slides from major cybersecurity conferences held in 2023 and 2024. It…

1 week ago

DLL Proxy Generator – Harnessing Advanced Proxy Capabilities

Generate a proxy dll for arbitrary dll, while also loading a user-defined secondary dll. In…

1 week ago

DLL Universal Patcher – A Comprehensive Guide To Advanced Binary Patching

DLL Universal Patcher is a flexible and convenient code patcher that doesn't touch the files…

1 week ago

RustiveDump : A Rust-Based Tool For Efficient Memory Dumping Of lsass.exe

RustiveDump is a Rust-based tool designed to dump the memory of the lsass.exe process using…

1 week ago

SharpExclusionFinder – Streamlining Windows Defender Exclusion Checks With Advanced Scanning Capabilities

This C# program finds Windows Defender folder exclusions using Windows Defender through its command-line tool…

1 week ago