Ausnahme gefangen: SSL certificate problem: certificate is not yet valid ๐Ÿ“Œ MOSE - Post Exploitation Tool For Configuration Management Servers.

๐Ÿ  Team IT Security News

TSecurity.de ist eine Online-Plattform, die sich auf die Bereitstellung von Informationen,alle 15 Minuten neuste Nachrichten, Bildungsressourcen und Dienstleistungen rund um das Thema IT-Sicherheit spezialisiert hat.
Ob es sich um aktuelle Nachrichten, Fachartikel, Blogbeitrรคge, Webinare, Tutorials, oder Tipps & Tricks handelt, TSecurity.de bietet seinen Nutzern einen umfassenden รœberblick รผber die wichtigsten Aspekte der IT-Sicherheit in einer sich stรคndig verรคndernden digitalen Welt.

16.12.2023 - TIP: Wer den Cookie Consent Banner akzeptiert, kann z.B. von Englisch nach Deutsch รผbersetzen, erst Englisch auswรคhlen dann wieder Deutsch!

Google Android Playstore Download Button fรผr Team IT Security



๐Ÿ“š MOSE - Post Exploitation Tool For Configuration Management Servers.


๐Ÿ’ก Newskategorie: IT Security Nachrichten
๐Ÿ”— Quelle: feedproxy.google.com


MOSE is a post exploitation tool that enables security professionals with little or no experience with configuration management (CM) technologies to leverage them to compromise environments. CM tools, such as Puppet, Chef, Salt, and Ansible are used to provision systems in a uniform manner based on their function in a network. Upon successfully compromising a CM server, an attacker can use these tools to run commands on any and all systems that are in the CM serverโ€™s inventory. However, if the attacker does not have experience with these types of tools, there can be a very time-consuming learning curve. MOSE allows an operator to specify what they want to run without having to get bogged down in the details of how to write code specific to a proprietary CM tool. It also automatically incorporates the desired commands into existing code on the system, removing that burden from the user. MOSE allows the operator to choose which assets they want to target within the scope of the serverโ€™s inventory, whether this is a subset of clients or all clients. This is useful for targeting specific assets such as web servers or choosing to take over all of the systems in the CM serverโ€™s inventory.


MOSE + Puppet



Mose + Chef



Dependencies

You must download and install the following for MOSE to work:

  • Golang - tested with 1.12.7 through 1.15.2

Be sure to properly set your GOROOT, PATH and GOPATH env vars

  • Docker - tested with 18.09.2 through 19.03.12

Getting started

Grab the code without having to clone the repo:

go get -u -v github.com/master-of-servers/mose

Install all go-specific dependencies and build the binary (be sure to cd into the repo before running this):

make build

Usage
Usage:
github.com/master-of-servers/mose [command]

Available Commands:
ansible Create MOSE payload for ansible
chef Create MOSE payload for chef
help Help about any command
puppet Create MOSE payload for puppet
salt Create MOSE payload for salt

Flags:
--basedir string Location of payloads output by mose (default "/Users/l/programs/go/src/github.com/master-of-servers/mose")
-c, --cmd string Command to run on the targets
--config string config file (default is $PWD/.settings.yaml)
--debug Display debug output
--exfilport int Port used to exfil data from chef server (default 9090, 443 with SSL) (default 9090)
-f, --filepath string Output binary locally at <filepath>
-u, --fileupload string File upload option
-h, --help help for github.com/master-of-servers/mose
-l, --localip string Local IP Address
--nocolor Disable colors for mose
-a, --osarch string Architecture that the target CM tool is running on
-o, --ostarget string Operating system that the target CM server is on (default "linux")
-m, --payloadname string Name for backdoor payload (default "my_cmd")
--payloads string Location of payloads output by mose (default "/Users/l/programs/go/src/github.com/master-of-servers/mose/payloads")
--remoteuploadpath string Remote file path to upload a script to (used in conjunction with -fu) (default "/root/.definitelynotevil")
-r, --rhost string Set the remote host for /etc/hosts in the chef workstation container (format is hostname:ip)
--ssl Serve payload over TLS
--tts int Number of seconds to serve the payload (default 60)
--websrvport int Port used to serve payloads (default 8090, 443 with SSL) (default 8090)

Use "github.com/master-of-servers/mose [command] --help" for more information about a command.

TLS Certificates

You should generate and use a TLS certificate signed by a trusted Certificate Authority

A self-signed certificate and key are provided for you, although you really shouldn't use them. This key and certificate are widely distributed, so you can not expect privacy if you do choose to use them. They can be found in the data directory.


Examples

You can find some examples of how to run MOSE in EXAMPLES.md.


Test Labs

Test labs that can be run with MOSE are at these locations:


Credits

The following resources were used to help motivate the creation of this project:



...



๐Ÿ“Œ MOSE: Using Configuration Management for Evil


๐Ÿ“ˆ 44.94 Punkte

๐Ÿ“Œ Die Vorarlberger Band Mose: Das Pferd findet allein nach Hause


๐Ÿ“ˆ 31.81 Punkte

๐Ÿ“Œ Meet MOSE: A New Dataset for Video Object Segmentation in Complex Scenes


๐Ÿ“ˆ 31.81 Punkte

๐Ÿ“Œ RouterSploit - Find Router Exploitation on Kali Linux 2018.2 (Router Exploitation Framework)


๐Ÿ“ˆ 23.83 Punkte

๐Ÿ“Œ RouterSploit - Find Router Exploitation on Kali Linux (Router Exploitation Framework)


๐Ÿ“ˆ 23.83 Punkte

๐Ÿ“Œ Which of the most popular DEs (GNOME, KDE, xfce, other?) has the best support for configuration management and/or declarative configuration


๐Ÿ“ˆ 22.07 Punkte

๐Ÿ“Œ CMSeeK | An Open Source Content Management System Detection and Exploitation Tool


๐Ÿ“ˆ 21.48 Punkte

๐Ÿ“Œ Double Zero-day Attack: Microsoft Exchange Servers Under Active Exploitation!


๐Ÿ“ˆ 20.29 Punkte

๐Ÿ“Œ Russian Hackers Suspected in Ongoing Exploitation of Unpatched PaperCut Servers


๐Ÿ“ˆ 20.29 Punkte

๐Ÿ“Œ Bugtraq: Re: rConfig, the open source network device configuration management tool, Vulnerable to Local File Inclusion


๐Ÿ“ˆ 18.5 Punkte

๐Ÿ“Œ Bugtraq: Re: rConfig, the open source network device configuration management tool, Vulnerable to Local File Inclusion


๐Ÿ“ˆ 18.5 Punkte

๐Ÿ“Œ CVE-2019-9745 | CloudCTI HIP Integrator Recognition Configuration Tool EXQUISE Named Pipe privileges management


๐Ÿ“ˆ 18.5 Punkte

๐Ÿ“Œ Bug in HP Remote Management Tool Leaves Servers Open to Attack


๐Ÿ“ˆ 17.94 Punkte

๐Ÿ“Œ Row erupts over who to blame after NordVPN says: One of our servers was hacked via remote management tool


๐Ÿ“ˆ 17.94 Punkte

๐Ÿ“Œ Row erupts over who to blame after NordVPN says: One of our servers was hacked via remote management tool


๐Ÿ“ˆ 17.94 Punkte

๐Ÿ“Œ Azure App Configuration - Making Centralized Configuration Easy


๐Ÿ“ˆ 17.88 Punkte

๐Ÿ“Œ Piwigo 2.9.2 Configuration admin/configuration.php order_by sql injection


๐Ÿ“ˆ 17.88 Punkte

๐Ÿ“Œ Piwigo 2.9.2 Configuration admin/configuration.php order_by SQL Injection


๐Ÿ“ˆ 17.88 Punkte

๐Ÿ“Œ Configuration as Code Plugin up to 1.24 on Jenkins Configuration Import Environment Variable information disclosure


๐Ÿ“ˆ 17.88 Punkte

๐Ÿ“Œ Samba up to 4.9.12/4.10.7/4.11.0rc2 Configuration Configuration File directory traversal


๐Ÿ“ˆ 17.88 Punkte

๐Ÿ“Œ Huawei Honor 20 Pro Configuration Parameter configuration buffer overflow


๐Ÿ“ˆ 17.88 Punkte

๐Ÿ“Œ VoIPmonitor up to 24.60 Configuration config/configuration.php SPOOLDIR injection


๐Ÿ“ˆ 17.88 Punkte

๐Ÿ“Œ Redesigning Configuration Refresh for Azure App Configuration


๐Ÿ“ˆ 17.88 Punkte

๐Ÿ“Œ CVE-2022-38664 | Job Configuration History Plugin up to 1165.v8cc9fd1f4597 on Jenkins System Configuration History Page cross site scripting


๐Ÿ“ˆ 17.88 Punkte

๐Ÿ“Œ CVE-2019-2965 | Oracle Siebel Core - DB Deployment/Configuration up to 19.8 Install Configuration information disclosure


๐Ÿ“ˆ 17.88 Punkte

๐Ÿ“Œ CVE-2019-18238 | Moxa ioLogik 2542-HSPA/Ioxpress Configuration Utility Configuration File cleartext storage


๐Ÿ“ˆ 17.88 Punkte

๐Ÿ“Œ Attack Surface Management: Should It Cover Configuration Management?


๐Ÿ“ˆ 17.32 Punkte

๐Ÿ“Œ CVE-2021-31805 | Oracle Communications Policy Management 12.6.0.0.0 Configuration Management Platform unknown vulnerability


๐Ÿ“ˆ 17.32 Punkte

๐Ÿ“Œ CVE-2020-36518 | Oracle Communications Policy Management 12.6.0.0.0 Configuration Management Platform denial of service


๐Ÿ“ˆ 17.32 Punkte

๐Ÿ“Œ SSH Configuration on Nexpose Servers Allowed Weak Encryption Algorithms


๐Ÿ“ˆ 17.32 Punkte

๐Ÿ“Œ Apache Superset Vulnerability: Insecure Default Configuration Exposes Servers to RCE Attacks


๐Ÿ“ˆ 17.32 Punkte

๐Ÿ“Œ Common insecure configuration opens Apache Superset servers to compromise


๐Ÿ“ˆ 17.32 Punkte

๐Ÿ“Œ JexBoss: Jboss verify and EXploitation Tool


๐Ÿ“ˆ 17.29 Punkte

๐Ÿ“Œ Zeebsploit - Web Scanner / Exploitation Tool on Kali Linux


๐Ÿ“ˆ 17.29 Punkte

๐Ÿ“Œ Theo - Ethereum Recon And Exploitation Tool


๐Ÿ“ˆ 17.29 Punkte











matomo