Vault7: CIA Hacking Tools Revealed
Navigation: » Latest version
Owner: User #14587667
General Info / Baseline Resource Measurements
Perseus 1.1.0
MikroTik RB450G - DUT2
General Info
WAN (from TR-Core) 172.20.100.8/30
TR-CoreSwx: 172.20.100.9
DUT: 172.20.100.10 (ether1) , 192.168.88.1/24 (ether2), 10.0.0.2/30 (ether4), 192.168.20.1/24 (ether5)
ICON: 172.20.12.101/24
LAN Hosts
192.168.20.2 = Perseus Test2 #2 - 1.1.0b1 - UbuntuDesktop 14.10 x64
RIP Config
Neighbor (RB493G) = 10.0.0.1/30
/ip address print
Flags: X - disabled, I - invalid, D - dynamic
# ADDRESS NETWORK INTERFACE
0 ;;; default configuration
192.168.88.1/24 192.168.88.0 ether2-master-local
1 172.20.100.10/30 172.20.100.8 ether1-gateway
2 ;;; To_RB493G_ether4
10.0.0.2/30 10.0.0.0 ether4-slave-local
3 192.168.20.1/24 192.168.20.0 ether5-slave-local
How to Connect
From the VMVirtual Machine named "DAB - ICON4 - COG":
/usr/bin/tshPatcher_v1.0.4/tsh-x86_64 172.20.100.10 12345 MyPassphrase
Perseus Files
BusyBox location: /flash/boot/hidden/busybox
Primary Files location: /flash/boot/hidden
Startup Scripts: /flash/etc/rc.d/run.d/S99mcc, /flash/etc/rc.d/run.d/S99tsh
Test Procedure
- Backup config (off the device)
- Perform netinstall to ROS6.X
- Restore config settings (if necessary).
- Capture output (screenshots) of:
- /system resource print
- /system resource monitor
- Throw CR, TSH, Flux, Perseus
- Capture output (screenshots) of:
- /system resource print
- /system resource monitor
- Compare outputs (before/after using exploits)