• Stars
    star
    367
  • Rank 116,257 (Top 3 %)
  • Language
    Shell
  • License
    MIT License
  • Created over 7 years ago
  • Updated over 1 year ago

Reviews

There are no reviews yet. Be the first to send feedback to the community and the maintainers!

Repository Details

Ultimate Network Stealther that makes Linux a Ghost In The Net and protects from MITM/DOS/scan

GhostInTheNet

Ultimate Network Stealther that makes Linux a Ghost In The Net and protects from MITM/DOS/scan

Properties:

  • Network Invisibility
  • Network Anonymity
  • Protects from MITM/DOS
  • Transparent
  • Cross-platform
  • Minimalistic

Dependencies:

  • Linux 2.4.26+ - will work on any Linux-based OS, including Whonix and RaspberryPI
    • BASH - the whole script
    • root privileges - for kernel controlling

Limitations:

  • You can still be found with VLAN logs if using ethernet or by triangulation/beacons if using WiFi
  • MAC spoofing won't work if appropriate mitigations has been taken, like DAI or sticky MAC
  • Might be buggy with some CISCO switches
  • Not suitable for production servers

How it works

The basic and primary network protocol is ARP for IPv4 and NDP (ICMPv6) for IPv6, located in the link and network layer, provides main connectivity in a LAN.

Despite its utility and simplicity, it has numerous vulnerabilities that can lead to a MITM attack and leak of confidentiality.

Patching of such a widely used standard is a practically impossible task.

A very simple, but at the same time effective solution is to disable ARP and NDP responses on an interface and be very cautious with broadcasting.

Considering the varieties of implementations, this means that anyone in the network wouldn't be able to communicatate with such host, only if the host is willing it-self.

The ARP/NDP cache will be erased quickly afterwards.

Here is an example schema:

A >>> I need MAC address of B >>> B

A <<< Here it is <<< B

A <<< I need MAC address of A <<< B

A >>> I'm not giving it >>> B

To increase privacy, it's advised to spoof the MAC address, which will provide a better concealment.

Moreover, the hostname has to be changed (especially if using DHCP and in this case all the leases have to be released).

All this is possible using simple commands in Linux kernel and a script that automates it all.

Analysis

No ARP/NDP means no connectivity, so an absolute stealth and obscurity on the network/link layer.

This protects from all possible DOSes and MITMs (ARP, DNS, DHCP, ICMP, Port Stealing) and far less resource consuming like ArpON.

Such mitigation implies impossibility of being scanned (nmap, arping).

Besides, it doesn't impact a normal internet or LAN connection on the host perspective.

If you're connecting to a host, it will be authorised to do so, but shortly after stopping the communication, the host will forget about you because, ARP/NDP tables won't stay long without a fresh request.

Regarding the large compatibility and cross-platforming, it's very useful for offsec/pentest/redteaming as well.

You see everyone, but nobody sees you, you're a ghost.

Mitigation and having real supervision on the network will require deep reconfiguration of OSes, IDPSes and all other equipement, so hardly feasible.

HowTo

You can execute the script after the connection to the network or just before:

sudo ./GhostInTheNet.sh on eth0

This will activate the solution until reboot.

If you want to stop it:

sudo ./GhostInTheNet.sh off eth0

Of course, you will have to make the script executable in the first place:

chmod u+x GhostInTheNet.sh

Notes

ARP/NDP protocol can be exploited for defensive purpose.

Now your Poisontap is literally undetectable and your Tails is even more anonymous.

You should learn some stuff about IPv6.

"Stars, hide your fires; Let not light see my black and deep desires."

William Shakespeare, Macbeth

More Repositories

1

MorphAES

IDPS & SandBox & AntiVirus STEALTH KILLER. MorphAES is the world's first polymorphic shellcode engine, with metamorphic properties and capability to bypass sandboxes, which makes it undetectable for an IDPS, it's cross-platform as well and library-independent.
Python
311
star
2

ASLRay

Linux ELF x32/x64 ASLR DEP/NX bypass exploit with stack-spraying
Shell
296
star
3

CryKeX

Linux Memory Cryptographic Keys Extractor
Shell
235
star
4

GhostInTheChaos

Chaotic Crypto Stealth VPN for Anonymity and Untraceable Hacking Attacks with Linux and Android
Shell
96
star
5

USBlok

badUSB & RubberDucky & PoisonTap ultimate mitigation for Linux
Shell
62
star
6

SteCoSteg

SteCoSteg is OutGuess successor and Vernam cipher analog in steganography.
Python
55
star
7

DMC

A simple decibel-meter converter that shows an approximate distance to a Wi-Fi device
Shell
40
star
8

EPMG

Entropic Password Manager Generator is a cross-platform, most secure and storageless password manager that generates passwords
HTML
23
star
9

DeCryKe

DeCryKe is a technique to transform almost any cryptographic algorithm into deniable-one, it is a decry of Russia's anti-terrorism law (aka Yarovaya law) and its FSB implementation.
23
star
10

BusAsM

AM radio data exfiltration with CPU cache in assembly
Python
19
star
11

cryptomnesia

Linux deniable cryptographic storage eraser based on hardware USB trigger for self-destruction in a case of emergency
Shell
13
star
12

CryptoTrooper

rant blog about CryptoTrooper ransomware, its history, legacy and MalwareTech case
12
star
13

AES-REX

AES-ni Registers kEy eXtractor
Shell
9
star
14

PTS

Private Token Sharing is a web service for secure and private password sharing with one-time tokens and end-to-end encryption
HTML
7
star
15

LYCOSA1307

CypherPunk city-specific challenges with epic loot
4
star
16

XMAZ

XMAZ was a simple, quick, robust, p2p, recursive cryptosystem, which is Unix 32/64-bit open-source
1
star