LightBulb是一个开源的python框架用于审计web应用程序防火墙

网友投稿 1040 2022-10-11

LightBulb是一个开源的python框架用于审计web应用程序防火墙

LightBulb是一个开源的python框架用于审计web应用程序防火墙

LightBulb

LightBulb is an open source python framework for auditing web application firewalls and filters.

Synopsis

The framework consists of two main algorithms:

GOFA: An active learning algorithm that infers symbolic representations of automata in the standard membership/equivalence query model. Active learning algorithms permits the analysis of filter and sanitizer programs remotely, i.e. given only the ability to query the targeted program and observe the output. SFADiff: A black-box differential testing algorithm based on Symbolic Finite Automata (SFA) learning Finding differences between programs with similar functionality is an important security problem as such differences can be used for fingerprinting or creating evasion attacks against security software like Web Application Firewalls (WAFs) which are designed to detect malicious inputs to web applications.

Motivation

Web Applications Firewalls (WAFs) are fundamental building blocks of modern application security. For example, the PCI standard for organizations handling credit card transactions dictates that any application facing the internet should be either protected by a WAF or successfully pass a code review process. Nevertheless, despite their popularity and importance, auditing web application firewalls remains a challenging and complex task. Finding attacks that bypass the firewall usually requires expert domain knowledge for a specific vulnerability class. Thus, penetration testers not armed with this knowledge are left with publicly available lists of attack strings, like the XSS Cheat Sheet, which are usually insufficient for thoroughly evaluating the security of a WAF product.

BlackHat Europe 2016 Presentation

In this presentation we introduce a novel, efficient, approach for bypassing WAFs using automata learning algorithms. We show that automata learning algorithms can be used to obtain useful models of WAFs. Given such a model, we show how to construct, either manually or automatically, a grammar describing the set of possible attacks which are then tested against the obtained model for the firewall. Moreover, if our system fails to find an attack, a regular expression model of the firewall is generated for further analysis. Using this technique we found over 10 previously unknown vulnerabilities in popular WAFs such as Mod-Security, PHPIDS and Expose allowing us to mount SQL Injection and XSS attacks bypassing the firewalls. Finally, we present LightBulb, an open source python framework for auditing web applications firewalls using the techniques described above. In the release we include the set of grammars used to find the vulnerabilities presented.

Commands Usage

Main interface commands:

CommandDescription
coreShows available core modules
utilsShows available query handlers
info <module>Prints module information
libraryEnters library
modulesShows available application modules
use <module>Enters module
start <moduleA> <moduleB>Initiate algorithm
helpPrints help
statusChecks and installs required packages
completePrints bash completion command

Module commands:

CommandDescription
backGo back to main menu
infoPrints current module information
libraryEnters library
optionsShows available options
define <option> <value>Set an option value
startInitiate algoritm
completePrints bash completion command

Library commands:

CommandDescription
backGo back to main menu
info <folder\module>Prints requested module information (folder must be located in lightbulb/data/)
cat <folder\module>Prints requested module (folder must be located in lightbulb/data/)
modules <folder>Shows available library modules in the requested folder (folder must be located in lightbulb/data/)
search <keywords>Searches available library modules using comma separated keywords
completePrints bash completion command

Installation

Prepare your system

First you have to verify that your system supports flex, python dev, pip and build utilities:

For apt platforms (ubuntu, debian...):

sudo apt-get install flex sudo apt-get install python-pip sudo apt-get install python-dev sudo apt-get install build-essential

(Optional for apt) If you want to add support for MySQL testing:

sudo apt-get install libmysqlclient-dev

For yum platforms (centos, redhat, fedora...) with already installed the extra packages repo (epel-release):

sudo yum install -y python-pip sudo yum install -y python-devel sudo yum install -y wget sudo yum groupinstall -y 'Development Tools'

(Optional for yum) If you want to add support for MySQL testing:

sudo yum install -y mysql-devel sudo yum install -y MySQL-python

Install Lightbulb

In order to use the application without complete package installation:

git clone https://github.com/lightbulb-framework/lightbulb-frameworkcd lightbulb-frameworkmakelightbulb status

In order to perform complete package installation. You can also install it from pip repository. This requires first to install the latest setuptools version:

pip install setuptools --upgradepip install lightbulb-frameworklightbulb status

If you want to use virtualenv:

pip install virtualenvvirtualenv envsource env/bin/activatepip install lightbulb-frameworklightbulb status

The "lightbulb status" command will guide you to install MySQLdb and OpenFst support. If you use virtualenv in linux, the "sudo" command will be required only for the installation of libmysqlclient-dev package.

It should be noted that the "lightbulb status" command is not necessary if you are going to use the Burp Extension. The reason is that this command installs the "openfst" and "mysql" bindings and the extension by default is using Jython, which does not support C bindings. It is recommended to use the command only if you want to change the Burp extension configuration from the settings and enable the native support.

It is also possible to use a docker instance:

docker pull lightbulb/lightbulb-framework

Install Burp Extension

If you wish to use the new GUI, you can use the extension for the Burp Suite. First you have to setup a working environment with Burp Proxy and Jython

Download the latest Jython from hereFind your local python packages installation folder*Configure Burp Extender to use these values, as shown below*

Select the new LightBulb module ("BurpExtension.py") and set the extension type to be "Python"

*You can ignore this step, and install the standalone version which contains all the required python packages included. You can download it here

Examples

Check out the Wiki page for usage examples.

Contributors

George ArgyrosIoannis StaisSuman JanaAngelos D. KeromytisAggelos Kiayias

References

G. Argyros, I. Stais, S. Jana, A. D. Keromytis, and A. Kiayias. 2016. SFADiff: Automated Evasion Attacks and Fingerprinting Using Black-box Differential Automata Learning. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (CCS '16). ACM, New York, NY, USA, 1690-1701. doi: 10.1145/2976749.2978383G. Argyros, I. Stais, A. Kiayias and A. D. Keromytis, "Back in Black: Towards Formal, Black Box Analysis of Sanitizers and Filters," 2016 IEEE Symposium on Security and Privacy (SP), San Jose, CA, 2016, pp. 91-109. doi: 10.1109/SP.2016.14

Acknowledgements

This research was partly supported by ERC project CODAMODA, #259152.

License

MIT License as described in LICENSE file

版权声明:本文内容由网络用户投稿,版权归原作者所有,本站不拥有其著作权,亦不承担相应法律责任。如果您发现本站中有涉嫌抄袭或描述失实的内容,请联系我们jiasou666@gmail.com 处理,核实后本网站将在24小时内删除侵权内容。

上一篇:Spring Security实现基于RBAC的权限表达式动态访问控制的操作方法
下一篇:MongoDB-聚合操作$unwind
相关文章

 发表评论

暂时没有评论,来抢沙发吧~