Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Pentest / Source Code Review #65

Open
moloch-- opened this issue Apr 29, 2019 · 8 comments
Open

Pentest / Source Code Review #65

moloch-- opened this issue Apr 29, 2019 · 8 comments
Assignees
Labels
security Security related issues

Comments

@moloch--
Copy link
Member

Get someone other than myself and Ronan to review the code.

@moloch-- moloch-- added the security Security related issues label Apr 29, 2019
@moloch-- moloch-- added this to the v1.0.0 milestone Apr 29, 2019
@rkervella
Copy link
Member

rkervella commented May 2, 2019

Example considerations (non exhaustive list):

  • Attacker has access to the source (once we open source the project)
  • Multiplayer: unauthorized access to a sliver server
  • Unauthorized access to running agents (i.e: ability to spoof the server / send commands to running slivers)
  • RCE via logged in operator (might be worth to check for escape shell issues in the generate and msf commands)
  • ...

@moloch--
Copy link
Member Author

moloch-- commented May 2, 2019

We may want to document specific security objectives. As you stated, to me there is a clear security boundary between the operator and server, an operator should not inherently be able to run commands or code on the server. I also added an "audit log" to the server for a white team to review, which records all of the (remote) operator's commands that relies on this boundary.

@rkervella
Copy link
Member

Totally agree with this. Also, I don't know the status for other projects, but I think putting detailed GitHub issues with the security label could be enough for the reporting part.

@Eriner
Copy link
Contributor

Eriner commented May 19, 2019

I'd be happy to help in this effort, but I'll need to tackle some other PRs to familiarize myself with the codebase. If I don't circle back to this in a couple of weeks, ping me.

@moloch--
Copy link
Member Author

@altf4 - If R&D wants to chip in :)

@moloch-- moloch-- pinned this issue May 25, 2019
@moloch-- moloch-- assigned altf4, Eriner and dan-bishopfox and unassigned altf4 Jun 1, 2019
@rkervella rkervella unpinned this issue Oct 15, 2019
@rkervella rkervella pinned this issue Oct 17, 2019
@h4ng3r-BF
Copy link
Member

Coverity offers free scan for OSS projects, maybe we should try.

@rkervella
Copy link
Member

From their main page:

Find and fix defects in your Java, C/C++, C#, JavaScript, Ruby, or Python open source project for free

@h4ng3r-BF
Copy link
Member

Sorry golang is aviable in 2019.06 but the scan is still in the 2019.03, maybe in a few months they will upgrade to 2019.06.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
security Security related issues
Projects
None yet
Development

No branches or pull requests

6 participants