• Stars
    star
    220
  • Rank 179,412 (Top 4 %)
  • Language
  • Created about 8 years ago
  • Updated about 8 years ago

Reviews

There are no reviews yet. Be the first to send feedback to the community and the maintainers!

Repository Details

Documentation for the Mechanical Phish.

The Mechanical Phish

The Mechanical Phish is open source! Mechanical Phish was created by Shellphish as our CRS for the DARPA Cyber Grand Challenge. It rocked it in the final event, winning 3rd place, and we are very proud of it.

The Cyber Grand Challenge was the first time anything like this was attempted in the security world. As such, Mechanical Phish is an extremely complicated piece of software, with an absurd amount of components. No blueprint for doing this existed before the CGC, so we had to figure things out as we went along. Unfortunately, rather than being a software development shop, we are a "mysterious hacker collective". This means that Mechanical Phish has some rough components, missing documentation, and ghosts in the machine. Our hope is that, going forward, we can polish and extend Mechanical Phish, as a community, to continue to push the limits of automated hacking.

Keep in mind that this was never designed to be turn-key, might not install without extreme effort, and might not work without a lot of tweaking. Otherwise, have at it!

Issues

So far, there are several glaring issues that came up during the runup to the CGC Final Event, the CFE itself, DEFCON, or our post-CGC analysis:

  • There is very little documentation of the whole thing. This is something that we would love community involvement for (although it's admittedly a chicken-and-egg problem).
  • Setting Mechanical Phish up can be an ordeal. A ready-built docker would be cool.
  • There are probably lots of URLs pointing to our internal infrastructure. These will need to be changed to point to github as they're identified.
  • There are some issues we're aware of:
  • Our Kubernetes setup has problems scheduling things quickly, leading to under-utilitization of the infrastructure.
  • An accidental assert, partway through our multi-CB exploitation pipeline, completely disables Mechanical Phish's ability to exploit multi-CB challenge sets.
  • There are some race conditions between the patch selection and patch submission, leading to too many patch submissions.
  • The scheduler for analyzing network traffic has a bug that causes it to pull down the full traffic rather than the metadata, essentially disabling that component after 15 rounds of the game.
  • There are other, mysterious scheduling issues that cause exploitable crashes to be overlooked (for example, during the CFE, Mechanical Phish identified 40 exploitable crashes, but only scheduled the generation of 15 exploits).

Overall, we're pretty surprised this thing ran at all! In the development of Mechanical Phish, we had to fix some bugs in some underlying components. We have fixes our fixes in the following forks, but we need to upstream them:

Components

The CRS has a lot of moving parts. They have been distributed throughout several different github namespaces:

This is an index of all of the repositories, split by component.

Meister

The CRS Meister handles task scheduling.

Ambassador

The Ambassador talks to the CGC API to retrieve CBs, submit POVs, etc.

Scriba

Scriba decides what exploits and RCBs to submit.

Worker

The CRS worker handles running the actual tasks that are scheduled by the worker. This part includes a lot of repositories working together.

  • Worker - the actual glue
  • Rex - Shellphish's automated exploitation component
  • Patcherex - Shellphish's automatic patching engine.
  • Fuzzer - a Python wrapper around AFL, and the fuzzer component of the Shellphish CRS.
  • Tracer - Component that traces CGC binaries symbolically with concrete inputs (convenience wrapper for concolic tracing).
  • Driller - The Shellphish CRS "smart fuzzer".
  • Shellphish-QEMU - A pip wrapper around our ridiculous amounts of qemu ports.
  • Shellphish-AFL - A pip wrapper to easily distribute AFL.

Common

There are several common components that don't fit in a single category above.

  • Farnsworth - Farnsworth is the knowledge base of the Shellphish CRS. It provides a JSON-based REST API and uses PostgreSQL as the data store.
  • Common-utils - Common utilities that didn't fit elsewhere.

Other

There are also many other repositories that act as dependencies for those above. We'll get a full list together at some point.

Setup

We have documented the process to setup a local development version here.

Scripts for setting up the full, kubernetes-powered distributed systems are here.

Support

We plan to keep Mechanical Phish alive through our research and the support of the community. However, we are a small group of PhD students, and don't have much time to give support, as our primary task is to do research, publish papers, and graduate. Please understand this when creating support requests: if resolving a support question takes too much time, it will likely never be done. To maximize the chance of a resolution, meet us half way and try exploring the issue with us :-)

More Repositories

1

pov_fuzzing

Our backup exploitation technique: fuzzing for POVs!
Python
23
star
2

setup

Python
17
star
3

multiafl

AFL, modified to support multi-CB challenge sets for CGC.
C
16
star
4

cgrex

Targeted patcher for CGC binaries. CGrex was used only during the CGC qualifier event, and is OBSOLETE. For the CFE, we used patcherex (github.com/shellphish/patcherex).
Python
14
star
5

povsim

POV simulation for CGC.
Python
11
star
6

qemu-cgc

QEMU modified to run CGC binaries.
C
11
star
7

colorguard

Concolic tracer to detect flag leaks and create Type-2 POVs.
Python
11
star
8

worker

Scaffolding for actually launching the various analysis, exploitation, and patching tasks.
Python
10
star
9

meister

The central scheduler component of the Mechanical Phish.
Python
10
star
10

compilerex

POV templates and compilation support for CGC binaries.
C
10
star
11

simulator

A simulator to help us think about strategies.
Python
9
star
12

farnsworth

Database ORM models for the Mechanical Phish.
Python
8
star
13

virtual-competition

Server for the CGC game API. Forked from DARPA, with lots of bells and whistles added
Python
6
star
14

common-utils

Some common util functionality that didn't fit anywhere else.
Python
5
star
15

patch_performance

Python
5
star
16

scriba

Submission decision component for the Mechanical Phish.
Python
5
star
17

manual-interaction

Fledgling human interaction component for the CGC, written under fire at DEFCON.
Python
5
star
18

network_poll_creator

Component that listens to network input and injects it into the Mechanical Phish.
Python
4
star
19

vm-workers

Scaffolding for workers that require the use of the CGC DECREE VM (i.e., final POV testing).
Python
4
star
20

topsecret

Semantic-aware exploit reconstruction techniques with meta fuzzer integration.
4
star
21

ambassador

API interaction component for the Mechanical Phish.
Python
4
star
22

network_dude

Network listener for the CGC.
Python
4
star
23

pykube

pykube fork with features required for mechaphish
Python
1
star
24

cgc-boolector

C
1
star