Skip to content

Conversation

@singe
Copy link
Contributor

@singe singe commented Nov 3, 2017

Needs more testing.

nisay759 and others added 30 commits March 21, 2017 10:22
- Payload is encoded in a 253 characters-long DNS query
- Payload is encoded on multiple labels of (max.) 63 characters
- Less data is sent over the wire due to less redundant information
- Place the executable in the the folder it extracts to
- Ability to read the plugins and config file that are shipped into the
executable
- Multi-host data exfiltration mode
- Exfiltration plugin (still experimental) based on the SIP protocol
- Exfiltration is done through the signature of the SDP message within
the SIP INVITE request
- The plugin simulates a legit user-agent behavior during a VoIP call
- Requests/Reponses sent over the wire: INVITE -> Trying -> Ringing ->
Decline -> ACK (Client calls, servers hangs up, client acknowledges)
- Zombie mode not implemented yet
- The "zombies" parameter in the config file can now be empty or omitted
nisay759 and others added 12 commits June 10, 2017 18:07
- Update roadmap
- Add example of proxy usage
- Add description of how to package DET with PyInstaller
- Change the 'Server' header in responses to simulate an Apache server
- Change 'User-Agent' header in requests to match the underlying OS
- Randomly switch between GET and POST when sending data
- Send data over cookies in GET requests
- Server sends defaut Apache page as responses
- Restore credit
- Restore credit
@PaulSec
Copy link
Contributor

PaulSec commented Nov 3, 2017

@nisay759 we will work out the version on https://github.com/PaulSec/DET 👍

@nisay759
Copy link

nisay759 commented Nov 3, 2017

Resolved the conflicts. It should now be merge-able.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants