Ausnahme gefangen: SSL certificate problem: certificate is not yet valid ๐Ÿ“Œ Bluewall - A Firewall Framework Designed For Offensive And Defensive Cyber Professionals

๐Ÿ  Team IT Security News

TSecurity.de ist eine Online-Plattform, die sich auf die Bereitstellung von Informationen,alle 15 Minuten neuste Nachrichten, Bildungsressourcen und Dienstleistungen rund um das Thema IT-Sicherheit spezialisiert hat.
Ob es sich um aktuelle Nachrichten, Fachartikel, Blogbeitrรคge, Webinare, Tutorials, oder Tipps & Tricks handelt, TSecurity.de bietet seinen Nutzern einen umfassenden รœberblick รผber die wichtigsten Aspekte der IT-Sicherheit in einer sich stรคndig verรคndernden digitalen Welt.

16.12.2023 - TIP: Wer den Cookie Consent Banner akzeptiert, kann z.B. von Englisch nach Deutsch รผbersetzen, erst Englisch auswรคhlen dann wieder Deutsch!

Google Android Playstore Download Button fรผr Team IT Security



๐Ÿ“š Bluewall - A Firewall Framework Designed For Offensive And Defensive Cyber Professionals


๐Ÿ’ก Newskategorie: IT Security Nachrichten
๐Ÿ”— Quelle: feedproxy.google.com


Bluewall is a firewall framework designed for offensive and defensive cyber professionals. This framework allows Cybersecurity professionals to quickly setup their environment while staying within their scope.

Credit
Inspired by Andrew Benson's hostfw iptable generation script.

Features

Bluewall
* Configure Firewall
* Configure Hostname
* Configure Interface(s)

Supported Operating Systems
* Redhat/CentOS
* Windows configuration can be generated but not executed.

Commandline
*  bluewall -c config/example.ini
** See example configuration

Utils
* Enumerate - Identify live hosts inside your network (coming soon)

Symantecs
* Target Host - Outbound communication
* Trusted Host - Bidirectional communication
* No Strike - Devices your computer should not communicate with

Setup
# BUILT FOR PYTHON 2.x
sudo python setup.py install
sudo bluewall -h (for help)

Getting Started
# Setup Initial Environment using Configuration
sudo bluewall -c config/hostconfig.ini

# Export optional windows configuration
sudo bluewall -c config/hostconfig.ini -w autoconfig.ps1

# Add additional inbound host or ranges
sudo bluewall -ih 192.168.0.3,192.168.1.0/24

# Exclude host to communicate with
sudo bluewall -eh 192.168.1.1

# Super easy wizard mode
sudo bluewall --wizard

Help
usage: bluewall [-h] [-V] [-v] [-r] [-p] [-i] [-d] [-w WINDOWS_CONFIG]
[-ot TCP_PORTS_OUT] [-ou UDP_PORTS_OUT] [-it TCP_PORTS_IN]
[-iu UDP_PORTS_IN] [-oh OUTBOUND_HOSTS] [-ih INBOUND_HOSTS]
[-eh EXCLUDE_HOSTS] [-l] [-s] [-q] [-D] [-A] [-F] [-S] [-c CONFIG]
[--info]

/////////////////////////////////////////////////////
| _____ __ _____ _____ _ _ _ _____ __ __ |
| | __ | | | | | __| | | | - | | | | |
| | __-| |__| | | __| | | | | |__| |__ |
| |_____|_____|_____|_____|_____|__|__|_____|_____| |
| |
\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\
A python framework to automate firewall setup.

Defaults:
Outbound connections will be allowed on all ports to all hosts.
Inbou nd connections will be limited to related outbound traffic.
DHCP will be enabled.
Ping responses will be enabled.
Unsolicited inbound connections will be dropped.



optional arguments:
-h, --help show this help message and exit
-V, --version Display Version
-v, --verbose Verbose Mode
-r, --reset Send TCP RST instead of dropping packet.
-p, --disallow_ping Disallow incoming PING
-i, --allow_outbound_icmp
Don't restrict ICMP types
-d, --disallow_dhcp Disallow DHCP
-w WINDOWS_CONFIG, --windows_config WINDOWS_CONFIG
Generate Windows Configuration. Usage: bluewall -w
config.ps1
-ot TCP_PORTS_OUT, --tcp_ports_out TCP_PORTS_OUT
Comma separated list of allowed TCP ports outbound
-ou UDP_PORTS_OUT, --udp_ports_ out UDP_PORTS_OUT
Comma separated list of allowed UDP ports outbound
-it TCP_PORTS_IN, --tcp_ports_in TCP_PORTS_IN
Comma separated list of allowed TCP ports inbound
-iu UDP_PORTS_IN, --udp_ports_in UDP_PORTS_IN
Comma separated list of allowed UDP ports inbound
-oh OUTBOUND_HOSTS, --outbound_hosts OUTBOUND_HOSTS
Restrict outbound to specified hosts. -oh
192.168.3.0/24,192.168.4.0/24
-ih INBOUND_HOSTS, --inbound_hosts INBOUND_HOSTS
Restrict outbound to specified hosts. -ih
192.168.3.0/24,192.168.4.0/24
-eh EXCLUDE_HOSTS, --exclude_hosts EXCLUDE_HOSTS
Exclude hosts -eh 192.168.3.0/24
-l, --log_exceptions Log Exceptions
-s, --simulate Simulate only.
-q, --quiet Quiet (don't display status messages
-D, --deny_all Absolute Deny all
-A, --allow_all Absolute allow all
-F, --flush Flush IPTables
-S, --show_rules Show rules after setting
--wizard Addressing and firewall wizard mode
-c CONFIG, --config CONFIG
Configuration for firewall
--info About Bluewall

Config Example
example.ini
[local_config]
iface=em1
rh_host=RHEL-Example
rh_ipaddr=192.168.1.42
netmask=255.255.255.0
gateway_addr=172.16.63.1
dns=8.8.8.8
#win_ipaddr=192.168.1.42 - Optional windows IP Address
#
# Optional Windows host (Bluewall will generate a config file for windows)
win_host=WINExample
# MAC Addresses must be ALL CAPS Valid: AA:93:AB:EF:00:01
# rh_mac=* will generate random MAC address
rh_mac=*

[firewall_config]
# Target Range are networks you want to allow outbound communication with.
target_range=172.16.63.0/24
target_range=192.168.2.0/24
#
# Nostrike addresses are devices your computer should NOT communicate with
nostrike=192.168.2.1
#
# Trusted Range are networks you wish to have bi-directional communication with
trusted_range=172.16.63.0/24
trusted_host=42.42.42.42

Output
[ataylor@localhost bluewall]$ sudo bluewall -c configs/exampleconfig.ini 
[OK] 192.168.1.101 is a valid setting for dns
[OK] 192.168.1.1 is a valid setting for gateway_addr
[OK] 24 is a valid setting for cidr_prefix
[OK] 192.168.1.254 is a valid setting for nostrike
[OK] * is a valid setting for rh_mac
[OK] WINtaylor is a valid setting for win_host
[OK] 192.168.2.0/24 is a valid setting for target_range
[OK] 192.168.3.0/24 is a valid setting for target_range
[OK] 192.168.1.30 is a valid setting for rh_ipaddr
[OK] RHEL-taylor is a valid setting for rh_host
[OK] 42.42.42.42 is a valid setting for trusted_host
[OK] 192.168.1.0/24 is a valid setting for trusted_range
[OK] 192.168.1.50 is a valid setting for win_ipaddr
==============================

[VALID CONFIG] No Errors Detected.

CONFIGURING
writing eth config to /etc/sysconfig/network-scripts/ifcfg-ens33
[CONFIGURATION]
TYPE="Etherne t"
BOOTPROTO=none
NAME=ens33
DEVICE="ens33"
ONBOOT=no
DEFROUTE="yes"
IPV4_FAILURE_FATAL=no
DNS1=192.168.1.101
IPADDR=192.168.1.30
PREFIX=24
GATEWAY=192.168.1.1
MACADDR=00:16:3E:52:7F:8D

[+] Interface ens33 shutdown.
[+] Restarting Network Service
[+] Interface ens33 brought up.
[+] Rules Flushed!
[+] Allowing outbound ICMP/traceroute to 192.168.2.0/24...
[+] Allowing outbound ICMP/traceroute to 192.168.3.0/24...
[+] Allowing outbound ICMP/traceroute to 192.168.1.0/24...
[+] Limiting outbound TCP connections to 192.168.2.0/24.
[+] Limiting outbound TCP connections to 192.168.3.0/24.
[+] Limiting outbound TCP connections to 192.168.1.0/24.
[+] Limiting outbound UDP connections to 192.168.2.0/24.
[+] Limiting outbound UDP connections to 192.168.3.0/24.
[+] Limiting outbound UDP connections to 192.168.1.0/24.
[+] Limiting inbound UDP connections to 192.168.1.0/24.
[+] Limiting in bound TCP connections to 192.168.1.0/24.
[+] Allowing traffic for localhost.
[+] 192.168.1.254 applied to NOSTRIKE
$ iptables -nvL
Chain INPUT (policy DROP 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination
0 0 DROP all -- * * 192.168.1.254 0.0.0.0/0
0 0 ACCEPT all -- * * 127.0.0.0/8 127.0.0.0/8
0 0 ACCEPT tcp -- * * 0.0.0.0/0 192.168.1.0/24
0 0 ACCEPT udp -- * * 0.0.0.0/0 192.168.1.0/24

Chain FORWARD (policy DROP 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination
< br/>Chain OUTPUT (policy DROP 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination
0 0 DROP all -- * * 0.0.0.0/0 192.168.1.254
0 0 ACCEPT all -- * * 127.0.0.0/8 127.0.0.0/8
0 0 ACCEPT udp -- * * 0.0.0.0/0 192.168.1.0/24
0 0 ACCEPT udp -- * * 0.0.0.0/0 192.168.3.0/24
0 0 ACCEPT udp -- * * 0.0.0.0/0 192.168.2.0/24
0 0 ACCEPT tcp -- * * 0.0.0.0/0 192.168.1.0/24
0 0 ACCEPT tcp -- * * 0.0.0.0/0 192.168.3.0/24
0 0 ACCEPT tcp -- * * 0.0.0.0/0 192.168.2.0/24
0 0 ACCEPT icmp -- * * 0.0.0.0/0 192.168.1.0/24 icmptype 0
0 0 ACCEPT icmp -- * * 0.0.0.0/0 192.168.1.0/24 icmptype 8
0 0 ACCEPT icmp -- * * 0.0.0.0/0 192.168.3.0/24 icmptype 0
0 0 ACCEPT icmp -- * * 0.0.0.0/0 192.168.3.0/24 icmptype 8
0 0 ACCEPT icmp -- * * 0.0.0.0/0 192.168.2.0/24 icmptype 0
0 0 ACCEPT icmp -- * * 0.0.0.0/0 192.168.2.0/24 icmptype 8

[+] Setup Complete.


...



๐Ÿ“Œ Bluewall - A Firewall Framework Designed For Offensive And Defensive Cyber Professionals


๐Ÿ“ˆ 119.02 Punkte

๐Ÿ“Œ MITRE ATT&CK Framework For Offensive & Defensive Operations


๐Ÿ“ˆ 38.79 Punkte

๐Ÿ“Œ Intelligence Committee Outlines UK's Offensive and Defensive Cyber Posture


๐Ÿ“ˆ 37.83 Punkte

๐Ÿ“Œ #DTX2022: Cyber Needs to Redress the Defensive-Offensive Balance Following Russia-Ukraine


๐Ÿ“ˆ 36.04 Punkte

๐Ÿ“Œ [papers] Offensive and Defensive PowerShell


๐Ÿ“ˆ 33.46 Punkte

๐Ÿ“Œ RangeForce platform updates enable users to conduct offensive and defensive attack scenarios


๐Ÿ“ˆ 33.46 Punkte

๐Ÿ“Œ Offensive and Defensive AI: Letโ€™s Chat(GPT) About It


๐Ÿ“ˆ 33.46 Punkte

๐Ÿ“Œ ESP32 Marauder v0.9.12 releases: suite of WiFi/Bluetooth offensive and defensive tools for the ESP32


๐Ÿ“ˆ 33.46 Punkte

๐Ÿ“Œ ESP32 Marauder v0.9.12 releases: suite of WiFi/Bluetooth offensive and defensive tools for the ESP32


๐Ÿ“ˆ 33.46 Punkte

๐Ÿ“Œ A Year in Review on Offensive Security, Defensive Landscapes, and Global Implications - BTS #19


๐Ÿ“ˆ 33.46 Punkte

๐Ÿ“Œ A Year in Review on Offensive Security, Defensive Landscapes, and Global Implications -... - BTS #19


๐Ÿ“ˆ 33.46 Punkte

๐Ÿ“Œ Die beste Defensive ist eine gute Offensive


๐Ÿ“ˆ 31.67 Punkte

๐Ÿ“Œ Die beste Defensive ist eine gute Offensive


๐Ÿ“ˆ 31.67 Punkte

๐Ÿ“Œ #Defensive statt #Offensive am Beispiel von KRITIS


๐Ÿ“ˆ 31.67 Punkte

๐Ÿ“Œ #Defensive statt #Offensive am Beispiel von KRITIS - english translation


๐Ÿ“ˆ 31.67 Punkte

๐Ÿ“Œ Hearthstone: Des Druiden offensive Defensive - neuer Karten-Reveal


๐Ÿ“ˆ 31.67 Punkte

๐Ÿ“Œ Why Defensive Superiority Should Rein Over Offensive Capability


๐Ÿ“ˆ 31.67 Punkte

๐Ÿ“Œ OP thinks that heโ€™s being followed, and I canโ€™t give professionals advice, so I came to the professionals!


๐Ÿ“ˆ 28.74 Punkte

๐Ÿ“Œ U.S. Cyber Command deploys defensive operators to Croatia to hunt for malicious cyber activity


๐Ÿ“ˆ 28.6 Punkte

๐Ÿ“Œ MITRE adds D3FEND defensive cybersecurity techniques to ATT&CK Framework


๐Ÿ“ˆ 26.99 Punkte

๐Ÿ“Œ GATOR - GCP Attack Toolkit For Offensive Research, A Tool Designed To Aid In Research And Exploiting Google Cloud Environments


๐Ÿ“ˆ 26.22 Punkte

๐Ÿ“Œ The new Sutter Slim Backpack was designed with tech professionals in mind


๐Ÿ“ˆ 26.1 Punkte

๐Ÿ“Œ TIDoS Framework - The Offensive Web Application Penetration Testing Framework


๐Ÿ“ˆ 26.04 Punkte

๐Ÿ“Œ TIDoS-Framework v1.7 - The Offensive Manual Web Application Penetration Testing Framework


๐Ÿ“ˆ 26.04 Punkte

๐Ÿ“Œ TIDoS Framework- The Offensive Manual Web Application Penetration Testing Framework


๐Ÿ“ˆ 26.04 Punkte

๐Ÿ“Œ TIDoS Framework- The Offensive Manual Web Application Penetration Testing Framework


๐Ÿ“ˆ 26.04 Punkte

๐Ÿ“Œ TIDoS Framework | Offensive Manual Web Application Penetration Testing Framework | Kali Linux 2019.1


๐Ÿ“ˆ 26.04 Punkte

๐Ÿ“Œ Nishang - Offensive PowerShell For Red Team, Penetration Testing And Offensive Security


๐Ÿ“ˆ 25.4 Punkte

๐Ÿ“Œ Debian also removed offensive ascii arts from cowsay-off (and the description clearly states that off stands for offensive)


๐Ÿ“ˆ 25.4 Punkte

๐Ÿ“Œ How to think like a hacker: Essential offensive skills for cybersecurity professionals


๐Ÿ“ˆ 25.28 Punkte

๐Ÿ“Œ How Old-School Hackers Are Enabling the Next Generation of Offensive Security Professionals


๐Ÿ“ˆ 25.28 Punkte

๐Ÿ“Œ Cyber risk literacy should be part of every defensive strategy


๐Ÿ“ˆ 24.23 Punkte

๐Ÿ“Œ Octo Metric Wins JV Contract to Support Army Defensive Cyber Operations (DCO)


๐Ÿ“ˆ 24.23 Punkte











matomo