-
Notifications
You must be signed in to change notification settings - Fork 16
Expand file tree
/
Copy pathSecurizer.pl
More file actions
482 lines (363 loc) · 14 KB
/
Securizer.pl
File metadata and controls
482 lines (363 loc) · 14 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
#!/usr/bin/perl -wU
use 5.010;
use threads;
use Pod::Usage;
use diagnostics;
use Getopt::Long;
use Switch 'Perl6';
use Term::ANSIColor;
use English '-no_match_vars';
use constant TRUE =>(1);
use constant FALSE =>(0);
use constant FILTER =>('/proc/sys/net/ipv4/conf/');
my $result = GetOptions(
'mode|d=s' => \my $Mode,
);
pod2usage(1) if(not defined($Mode));
warnings() if($UID ne (FALSE));
BEGIN:
my $Compt=TRUE;
my $IFACE;
if (-d FILTER){
opendir(FILTER_PATH , FILTER) || printf("[-] Ouverture de %s : Impossible ! \012\012",FILTER);
my @filter_path= readdir (FILTER_PATH)|| say colored(" [NO]\n\n",'bold red');;
close(FILTER_PATH);
# On set les flags a "1" de chaques filtres contre le spoofing IP
foreach(@filter_path){
my @f_p=("/rp_filter");
my @rep=(FILTER);
next if( -e $_);
my $Setting=print`echo 1 > @rep$_@f_p`;
print("[*] Configuration du filtre $_ $Compt...........");
say colored(" [OK]", 'bold green');
$Compt++;
}
say colored("[+] Configuration des filtres terminee ($Compt)",'bold blue');
}
if($Mode !~ /nude/i){
print("\n[*] Configuration niveau kernel...",);
kernel_settings() || say colored(" [NO]\n\n",'bold red');;
say colored(" [OK]\n",'bold green');
say colored("[--- Saisir l interface a traiter (wlan0, eth0....) ---]",'yellow');
say colored("\r\r[Interface]:",'bold yellow');
$IFACE=<STDIN>;
chomp($IFACE);
}
SWITCH_MODE:
given ($Mode) {
when(/defensive/i){
say colored("\nConfiguration IPTABLES en mode DEFENSIF!",'bold green');
iptables_config("defensive","DROP",140);
}
when(/offensive/i){
say colored("\nConfiguration IPTABLES en mode OFFENSIF",'bold yellow');
iptables_config("offensive","REJECT",50);
}
when(/nude/i){
say colored("\nConfiguration IPTABLES en mode NUDE (dangereux)",'bold blue');
iptables_flush();
say colored("\r\r Firewall stoppe avec succes... open bar !\n ",'yellow');
exit(TRUE);
}
default{
say colored("\r\r WTF??? ",'bold red');
exit(FALSE);
}
}
my $ReloadService=print(`mv iptables_config.sh /etc/init.d/iptables_config.sh
mv ip6tables_config.sh /etc/init.d/ip6tables_config.sh
chmod a+x /etc/init.d/iptables_config.sh
chmod a+x /etc/init.d/ip6tables_config.sh
/etc/init.d/iptables_config.sh start
/etc/init.d/ip6tables_config.sh start`);
exit(TRUE);
#**************************#
# Fonctions #
#**************************#
sub warnings{
warn (" [-] Exiting : $! \012\012\015");
kill($PID);
exit(FALSE);
my $thread1 = threads->new(\&path_cleaner) || $!;
}
sub path_cleaner{
# Vide les variables d'environnement
delete @ENV {qw (IFS CDPATH ENV BASH_ENV ) };
return(TRUE);
}
sub kernel_settings{
my $KernelSetting=print(`
echo 2 >/proc/sys/kernel/randomize_va_space
echo 1 > /proc/sys/net/ipv4/icmp_echo_ignore_all
echo 1 > /proc/sys/net/ipv4/icmp_echo_ignore_broadcasts
echo 1 > /proc/sys/net/ipv4/conf/all/accept_source_route
echo 1 > /proc/sys/net/ipv4/conf/all/accept_redirects
echo 1 > /proc/sys/net/ipv4/icmp_ignore_bogus_error_responses
echo 1 > /proc/sys/net/ipv4/conf/all/log_martians
`);
if($Mode =~ /offensive/i){
my $HardKernelSettings=print(`
echo 1 > /proc/sys/net/ipv4/tcp_syncookies
echo 0 > /proc/sys/net/ipv4/conf/all/accept_redirects
echo 1 > /proc/sys/net/ipv4/conf/default/accept_redirects
echo 1 > /proc/sys/net/ipv4/conf/lo/accept_redirects
`);
}
my $modules_iptables = threads->new(\&iptables_modules) || $!;
return(TRUE);
}
sub iptables_modules{
system<<EOF ;
modprobe ipt_tcpmss
modprobe iptable_nat
modprobe ip_conntrack
modprobe iptable_filter
modprobe iptable_mangle
modprobe ipt_LOG
modprobe ipt_limit
modprobe ipt_state
EOF
return(TRUE);
}
sub iptables_config{
my @ModeValues=@_;
my $Mode =$ModeValues[0]; # mode choisi
my $Todo =$ModeValues[1]; # DROP / REJECT
my $Burst=$ModeValues[2]; # Burst-limit
unless(open(IPTABLES_CONF ,"> iptables_config.sh")){
warn("[-] $! \012\015");
exit(FALSE);
}
print IPTABLES_CONF <<EOF;
#!/bin/bash -e
### BEGIN INIT INFO
# Provides: iptables_config : $Mode
# Required-Start: $IFACE
# Default-Start: 2 3 4 5
# Default-Stop: 0 1 6
# Short-Description: Lightweight network security system
# Description: Security system that will
# analyse traffic from the network cards and will
# match against a set of known attacks.
### END INIT INFO
iptables -P INPUT ACCEPT
iptables -P OUTPUT ACCEPT
iptables -P FORWARD ACCEPT
iptables -F
###############################################################
# Partie a decommenter si les chaines ont deja ete crees #
###############################################################
# iptables -X UDP_INPUT
# iptables -X TCP_INPUT
# iptables -X UDP_OUTPUT
# iptables -X TCP_OUTPUT
# iptables -X ICMP
# iptables -X ALLOWED_INPUT
# iptables -X SYN_FLOOD
# iptables -X Attacks
# iptables -X FRAG_Attacks
# iptables -X BlackList
###############################################################
# Creation de nouvelles chaines #
###############################################################
iptables -N ALLOWED_INPUT
iptables -N TCP_INPUT
iptables -N UDP_INPUT
iptables -N TCP_OUTPUT
iptables -N UDP_OUTPUT
iptables -N ICMP
iptables -N Attacks
iptables -N SYN_FLOOD
iptables -N FRAG_Attacks
iptables -N BlackList
# Politiques par defaut
iptables -P INPUT DROP
iptables -P OUTPUT DROP
iptables -P FORWARD DROP
# Autoriser la boucle locale
iptables -t filter -A INPUT -p ALL -s 127.0.0.1 -i lo -m state --state ESTABLISHED,NEW,RELATED -j ACCEPT
iptables -t filter -A OUTPUT -p ALL -d 127.0.0.1 -o lo -m state --state ESTABLISHED,NEW,RELATED -j ACCEPT
################################
# Trafic autorisé pour le LAN #
# si mode routeur #
################################
# ID réseau a modifier au besoin (si routeur)
##iptables -t filter -A FORWARD -i $IFACE:1 -s 10.11.12.0/29 -j ACCEPT
##iptables -t filter -A FORWARD -i $IFACE:1 -d 0.0.0.0/0 -m state --state ESTABLISHED,NEW -j ACCEPT
# Envoi des paquets dans leurs chaines de traitements pour les connections entrantes
iptables -A INPUT -i $IFACE -j BlackList
iptables -A INPUT -p ALL -i $IFACE -m state --state ESTABLISHED,RELATED -j ACCEPT
iptables -A INPUT -i $IFACE -j Attacks
iptables -A INPUT -p TCP -i $IFACE -j TCP_INPUT
iptables -A INPUT -p UDP -i $IFACE -j UDP_INPUT
iptables -A INPUT -p ICMP -i $IFACE -j ICMP
############################################
# DISPATCH DANS LES CHAINES OUTPUT
############################################
# Envoi des paquets dans leurs chaines de traitements pour les connections sortantes
iptables -A OUTPUT -o $IFACE -j ACCEPT
iptables -A OUTPUT -p ALL -o $IFACE -m state --state ESTABLISHED,RELATED -j ACCEPT
iptables -A OUTPUT -o $IFACE -j ACCEPT
iptables -A OUTPUT -p TCP -o $IFACE -j ACCEPT
iptables -A OUTPUT -p UDP -o $IFACE -j ACCEPT
iptables -A OUTPUT -p ICMP -o $IFACE -j ACCEPT
iptables -A OUTPUT -m state --state RELATED,ESTABLISHED -j ACCEPT
iptables -A ALLOWED_INPUT -p TCP --syn -j ACCEPT
iptables -A ALLOWED_INPUT -p TCP -m state --state ESTABLISHED,RELATED -j ACCEPT
iptables -A ALLOWED_INPUT -p UDP -j ACCEPT
iptables -A INPUT -m state --state RELATED,ESTABLISHED -j ACCEPT
# ouverture de service si besoin ... (HTTP, SSH, DNS)
#iptables -A TCP_INPUT -p TCP -s 0/0 --dport 80 -j ALLOWED_INPUT
#iptables -A TCP_OUTPUT -p TCP --dport 80 -j ACCEPT
#iptables -A TCP_OUTPUT -p TCP --dport 22 -j ACCEPT
#iptables -A UDP_OUTPUT -p UDP --dport 53 -j ACCEPT
#iptables -A INPUT -s off -j ACCEPT
#iptables -A INPUT -d off -j ACCEPT
#####################
# Scans protections #
#####################
iptables -N rate_limit
iptables -F rate_limit
iptables -A rate_limit -p tcp -m limit --limit 3/min --limit-burst 3 -j ACCEPT
iptables -A rate_limit -p udp -m limit --limit 3/min --limit-burst 3 -j ACCEPT
iptables -A rate_limit -p tcp -j REJECT --reject-with tcp-reset
iptables -A rate_limit -p udp -j REJECT --reject-with icmp-port-unreachable
# En cas de scan icmp ...
iptables -A rate_limit -p icmp -j $Todo --reject-with icmp-host-unreachable
# Autres
iptables -A rate_limit -j DROP
##################################################
# Protection contre attaques de Base #
##################################################
# Global Attack Call
iptables -A Attacks -j SYN_FLOOD
iptables -A Attacks -j FRAG_Attacks
iptables -A Attacks -j RETURN
# Smurf attack / Ping flood
iptables -A INPUT -i $IFACE -p icmp --icmp-type echo-request -m limit --limit 1/second -j ACCEPT
iptables -A INPUT -i $IFACE -p icmp --icmp-type echo-reply -m limit --limit 1/second -j ACCEPT
# Syn Flood
iptables -A SYN_FLOOD -m limit --limit 80/second --limit-burst $Burst -j RETURN
iptables -A SYN_FLOOD -j DROP
# Fragment Attacks **** 1.Classics Frag - 2. XMAS - 3. Null Packets
iptables -A FRAG_Attacks -f -j $Todo
iptables -A FRAG_Attacks -p tcp --tcp-flags ALL ALL -j $Todo # 1
iptables -A FRAG_Attacks -p tcp --tcp-flags ALL NONE -j $Todo # 2
iptables -A FRAG_Attacks -j RETURN # 3
# CHAINE LogAndDrop Syn Flood
iptables -N LogAndDropSynFlood -j LOG --log-level 4 --log-prefix '*** SYNFLOOD ATTACK *** '
iptables -N LogAndDropSynFlood -j $Todo
# CHAINE LogAndDrop Frag Attacks
iptables -N LogAndDropFrag -j LOG --log-level 4 --log-prefix '*** Frag ATTACK *** '
iptables -N LogAndDropFrag -j $Todo
# CHAINE LogAndDrop XMAS
iptables -N LogAndDropFragMas -j LOG --log-level 4 --log-prefix '*** XMAS ATTACK *** '
iptables -N LogAndDropFragMas -j $Todo
# CHAINE LogAndDrop Null Packet
iptables -N LogAndDropFragNull -j LOG --log-level 4 --log-prefix '*** NULL ATTACK *** '
iptables -N LogAndDropFragNull -j $Todo
EOF
print colored("\nConfiguration IPV6 ...",'bold blue');
ip6tables_conf($Mode,$Todo,$Burst) || say colored(" [NO]\n\n",'bold red');
say colored(" [OK]\n\n",'bold green');
close(IPTABLES_CONF);
return(TRUE);
}
sub iptables_flush{
unless(open(IPTABLES_FLUSH ,"> iptables_flush.sh")){
warn("[-] $! \012\015");
exit(FALSE);
}
print`rm /etc/init.d/iptables_config.sh`;
print IPTABLES_FLUSH <<EOF;
#!/bin/bash -e
iptables -F
iptables -X
iptables -t nat -F
iptables -t nat -X
iptables -t mangle -F
iptables -t mangle -X
iptables -P INPUT ACCEPT
iptables -P FORWARD ACCEPT
iptables -P OUTPUT ACCEPT
# IPV6
ip6tables -F
ip6tables -X
EOF
my $ReloadService=print(`chmod a+x iptables_flush.sh
bash iptables_flush.sh`);
close(IPTABLES_FLUSH);
return(TRUE);
}
sub ip6tables_conf{
my @ModeValues=@_;
my $Mode =$ModeValues[0]; # mode choisi
my $Todo =$ModeValues[1]; # DROP / REJECT
my $Burst=$ModeValues[2]; # Burst-limit
unless(open(IP6TABLES_CONF ,"> ip6tables_config.sh")){
warn("[-] $! \012\015");
exit(FALSE);
}
print IP6TABLES_CONF <<EOF;
#!/bin/bash -e
### BEGIN INIT INFO
# Provides: ip6tables_config : $Mode
# Required-Start: $IFACE
# Default-Start: 2 3 4 5
# Default-Stop: 0 1 6
# Short-Description: Lightweight network security system
# Description: Security system that will
# analyse traffic from the network cards and will
# match against a set of known attacks based on IPV6
### END INIT INFO
# Politique par défaut
ip6tables -P INPUT DROP
ip6tables -P OUTPUT DROP
ip6tables -P FORWARD DROP
# Autoriser la boucle locale et l interface (statefull)
ip6tables -A INPUT -t filter -p ALL -s 0/0 -d 0/0 -i lo -m state --state ESTABLISHED,NEW,RELATED -j ACCEPT
ip6tables -A INPUT -i $IFACE -m state --state ESTABLISHED,RELATED -j ACCEPT
# Traitement ICMPV6
ip6tables -A INPUT -i $IFACE -p icmpv6 --icmpv6-type echo-request -j $Todo
# DROP en INPUT TCP et UDP (la chaine FORWARD au cas ou ...)
ip6tables -I INPUT -i $IFACE -p tcp --syn -j DROP
ip6tables -I FORWARD -i $IFACE -p tcp --syn -j $Todo
ip6tables -I INPUT -i $IFACE -p udp ! --dport 32768:60999 -j DROP
ip6tables -I FORWARD -i $IFACE -p udp ! --dport 32768:60999 -j $Todo
# Autres
ip6tables -A INPUT -p ALL -i $IFACE -j $Todo --reject-with icmp6-adm-prohibited
EOF
close(IP6TABLES_CONF);
return(TRUE);
}
=info
[1] Description:
Tool developed for IPTABLES/IP6TABLES configurations generation.
This Version permit to protect you from many network attacks
and / or scans.
[2] Parameters / Options:
This tool require only one required parameter.
-mode: select which mode you want to configure IPTABLES for (not case sensitive)
.Defensive: configure IPTABLES to be carefull, apply DROP rules on DoS/DDoS, it protect you as well as possible.
.Offensive: configure IPTABLES to be agressive and apply REJECT rules on DoS/DDoS, so it protect you too ;)
.Nude: flush all IPTABLES rules !
Note: there is no default value!
[3] Example:
./Securize.pl --mode=offensive
[4] Securizer todo list:
- Build a dynamic configuration (adapted configuration to received packets)
- Add "parano" mode
- Add an port-knocking functionality
- Add others services configurations (SNORT, Fail2ban...)
- Optimizations ??
[5] Contact (to whip me \o/):
-Emails:
kmkz[at]tuxfamily[dot]org (for fun)
mail[dot]bourbon[at]gmail[dot]com
-Tweeter: kmkz_security
-linkedin:
[FR] linkedin.com/pub/jean-marie-bourbon/56/928/469
[EN] linkedin.com/pub/jean-marie-bourbon/56/928/469/en
-IRC nickname: kmkz
=cut
__END__