• Stars
    star
    190
  • Rank 199,657 (Top 4 %)
  • Language
    Shell
  • Created over 5 years ago
  • Updated over 1 year ago

Reviews

There are no reviews yet. Be the first to send feedback to the community and the maintainers!

Repository Details

BadUSB in Routers

BadUSB in Routers

Material found in this repository was originally presented at BSides Dublin on March 23, 2019. The slides are included here in pdf format.

This repository contains configuration files for P4wnP1, a BadUSB framework for the Raspberry Pi. The configuration files allow an attacker to execute BadUSB style attacks on certain routers.

The following hardware and software were used for the BadUSB attacks:


mikrotik_mitm

The mikrotik_mitm directory contains configuration files to man-in-the-middle outbound traffic from RouterOS LAN hosts. The configuration files were tested using RouterOS on an hAP using default configurations on 6.44.1 Stable. Presumably, it works on any RouterOS based router that supports 4g USB functionality. The attack will cause all internet bound traffic to be routed to the Raspberry Pi plugged into the USB port. The Pi will forward all of the internet traffic to a remote VPN server.

PoC Video:

PoC Video

As written the "remote" VPN server is at 192.168.1.64. If you are going to try this out for yourself, you'll need to adjust the openvpn connection and possibly the iptables / dhcp options depending on where your VPN server is. The VPN server configuration is fairly simple:

sudo sysctl -w net.ipv4.ip_forward=1
sudo openvpn --ifconfig 10.200.0.1 10.200.0.2 --dev tun --auth none
sudo iptables -I FORWARD -i tun0 -j ACCEPT
sudo iptables -I FORWARD -i tun0 -o ACCEPT
sudo iptables -t nat -A POSTROUTING -j MASQUERADE

As mentioned, RouterOS will recognize the USB device using the default configuration. However! For some reason, the router won't recognize the Pi until you first plug in something else. You only have to do it once and then you are good until the router reboots. I'm not sure of the root cause of this. I've been using this ethernet adapter (you can find it on Amazon):


mikrotik_wan_lan_access

This is a non-mitm version of the MikroTik attack. The Pi will be assigned 192.168.4.1 and it should have access to both the WAN and LAN. LAN devices should also be able to reach the Pi. This is kind of useful if you just want to plug in your Pi as some type of local server... or if you want a reverse shell out to the internet.


asus_bsides_routing_table

The asus_bsides_routing_table directory contains configuration files to hijack traffic bound for http://securitybsides.com. The attack relies on the ability of the USB WAN to insert arbitrary entries into the router's routing table via DHCP options.

This attack was tested against an Asus RT-AC51U with load balancing dual WAN configured.

PoC Video:

PoC Video


Traditional Attacks over IP

A variety of routers support printer sharing (Netgear, Linksys, and TP-Link). The way this works is that you plug your USB printer into the router and then you install client software on your LAN host which gives it the ability to talk to the printer via the router.

I've found that the router/client software will actually communicate with pretty much any USB device. For whatever reason, the device makers didn't limit the functionality to printers only.

As such, an attacker can execute any of the normal payloads that come with P4wnP1. In my PoC video, I'm using hid_keyboard2.txt. The downside to this attack is that it requires special software be installed and that the user actually click "connect".

PoC Video:

PoC Video

More Repositories

1

terrascan

Detect compliance and security violations across Infrastructure as Code to mitigate risk before provisioning cloud native infrastructure.
Go
4,472
star
2

poc

Proof of Concepts
Python
1,181
star
3

routeros

RouterOS Security Research Tooling and Proof of Concepts
C++
838
star
4

nessrest

A python library for using the new Nessus REST API.
Python
386
star
5

pyTenable

Python Library for interfacing into Tenable's platform APIs
Python
332
star
6

ghidra_tools

A collection of Ghidra scripts, including the GPT-3 powered code analyser and annotator, G-3PO.
Python
288
star
7

awesome-llm-cybersecurity-tools

A curated list of large language model tools for cybersecurity research.
278
star
8

pi_sniffer

The pocket-sized wireless sniffer
C++
202
star
9

upnp_info

A simple script for discovery and analysis of UPnP servers
Python
158
star
10

esp32_image_parser

A toolkit for helping you reverse engineer ESP32 firmware.
Python
137
star
11

DiscordClient

Python
96
star
12

Posh-Nessus

PowerShell Module for automating Tenable Nessus Vulnerability Scanner.
PowerShell
88
star
13

KaiMonkey

KaiMonkey provides vulnerable infrastructure as code (IaC) to help explore and understand common cloud security threats exposed via IaC.
HCL
85
star
14

Tenable.io-SDK-for-Python

Tenable.io SDK offers a scalable and safe way to integrate with the Tenable.io platform.
Python
83
star
15

EscalateGPT

An AI-powered tool for discovering privilege escalation opportunities in AWS IAM configurations.
Python
81
star
16

audit_scripts

Scripts to help work with configuration audit files
Python
76
star
17

Burp-extension-for-GPT

an extension for Burp Suite to allow researchers to utilize GPT for analys is of HTTP requests and responses
Python
74
star
18

integration-jira-cloud

Python
65
star
19

yara-rules

Repository of yara rules
YARA
55
star
20

terrascan-action

Terrascan GitHub action. Scan infrastructure as code including Terraform, Kubernetes, Helm, and Kustomize file for security best practices.
Shell
47
star
21

nasl

A parser for NASL.
Ruby
43
star
22

flask-logging-demo

Demo files for 'The Boring Stuff - Flask Logging' blog post
Python
34
star
23

mIDA

C++
32
star
24

audit_files

Nessus Audit files
31
star
25

Security-Hub

For use in our Tenable.IO to AWS Security Hub integration
Python
24
star
26

terrascan-rego-editor

Visual Studio Code extension for writing Terrascan Rego policies
TypeScript
18
star
27

nasldoc

A documentation generator for NASL.
Ruby
17
star
28

pedant

A static analysis framework for NASL.
Ruby
14
star
29

sublimetext-nasl

13
star
30

accurics-action

The Accurics GitHub Action scans Infrastructure as Code files checked into the respository to help ensure that cloud resources are secure and compliant from creation.
Shell
13
star
31

Kastle

A purely functional, effectful, resource-safe, kafka library for Scala
Scala
12
star
32

csup

Tenable.io Container Security Uploading and Reporting Commandline Tool
Python
11
star
33

microfrontend-demo-app

JavaScript
11
star
34

SinCity

Python
11
star
35

integration-asc

Python
10
star
36

vim-nasl

Vim extensions for programming in NASL
Vim Script
9
star
37

runterrascan.io

CSS
8
star
38

golden-ami-pipeline-with-tenable-sample

The golden AMI pipeline enables creation, distribution, verification, launch-compliance, and decommissioning of the golden AMI out of the box. This version of the pipeline integrates with Tenable.io for vulnerability assessments.
6
star
39

container-security-action

Tenable's Container security action which helps scan docker images.
Python
6
star
40

notepadpp-nasl

5
star
41

integration-cef

Python
5
star
42

was-action

Github action to trigger WAS
Python
5
star
43

cloud-snapshot-automation

Templates for creating Cloud Snapshots
HCL
4
star
44

splunk-app-pvs

This app provides Splunk dashboards and reporting for Tenable PVS
HTML
4
star
45

presentations

4
star
46

integrations-ibm-cloudpak-for-security

Python
4
star
47

Tenable.ad-EventsLogs-Subscriber

Tenable.ad IOA module event logs listener
Rust
4
star
48

entra-id-federation-abuse-research-required-roles

PowerShell
4
star
49

UncoverDCShadow

PowerShell
3
star
50

integration-cscc

Tenable.io to Google Cloud Security Command Center Bridge
Python
3
star
51

emacs-nasl

Emacs Lisp
3
star
52

tenablecs_demo

HCL
2
star
53

asm-python-examples

Bit Discovery REST API scripts
Python
2
star
54

labs

1
star
55

accurics-vscode

TypeScript
1
star
56

WSUSpendu

PowerShell
1
star
57

nasl-layer

Spacemacs layer for NASL
1
star
58

asm-asset-importer

Scripts to integrate BitDiscovery data with Tenable
Python
1
star
59

atom-grammar-nessuskb

Grammar file for Nessus KB files.
CoffeeScript
1
star
60

accurics-orb

The Accurics CircleCI Orb scans IaC (Infrastructure as Code) to help identify vulnerabilities prior to cloud deployment.
Shell
1
star
61

helm-charts

Smarty
1
star