Skip to content

S-Clustr-Simple

Latest
Compare
Choose a tag to compare
@MartinxMax MartinxMax released this 31 Jul 09:38
· 3 commits to master since this release
f9f8b6f

S-Clustr (Shadow Cluster) Simple

Python-3.9 Hacker_tool S-H4CK13 APT IOT OT IT Botnet Siemens-PLC

Pseudo Compiler

This pseudo compiler constructs an effective control payload for the (Shadow Cluster) client using pseudo C language code.

$ python scc.py

alt text

  1. The top section allows you to adjust the font size.
  2. Checking the checkbox generates a random key, with a default length of 12 characters. If unchecked, you can manually input the encryption key, but it must be longer than 6 characters.
  3. Code editor box, used for writing pseudo C language programs. The shadow header file includes three basic functions: run, stop, and delay. You can write the control logic in the main function.
  4. Output window displays the execution results, including the payload path and the key.
  5. Compile: When the program is completed, the code will be formatted, syntax-checked, and then the control payload will be generated.
  6. Format: Beautifies the input box code into C language format.

After compilation, the payload will be generated in the sccopt directory.

alt text

You can send this encrypted program to your friends in the botnet club.

alt text

Running the Shadow Cluster Client with the clustr Package

A test program scctest.py is available in the current directory.

$ python scctest.py

Input the node IP and connect.

The screen will flash red and blue for 3 seconds, then it will attempt to connect to the server one by one (simulating controlled devices connecting). When the panel turns from black to red, it indicates a successful connection in a stopped state. When the device receives a command, the panel will turn green.

alt text

Start the Shadow Cluster client and use the load command to exploit it (provided the rhost, rport, and rkey parameters are correctly set).

$ python S-Clustr_Client.py

S-Clustr(V1.1.0 Simple)> load <key> <clustr package>

alt text

PS

Interestingly, you can think of this simulation program as one that maliciously alters the traffic lights in a large area of the real world (including streetlights and power equipment systems).

Creating an exe application? A 128x128 large "dot matrix" screen to display an image or GIF?

alt text

https://www.youtube.com/watch?v=tWOqI9tmi3Q

Description

Type Controlled Device Wired Wireless 4G Security Encryption Protocol
Embedded Arduino × × TCP/IP
Embedded Ai-Thinker AIR780E × × × TCP/IP
Embedded ESP8266 × × × TCP/IP
Embedded AT89C51 × × × TCP/IP
Embedded STM32[103fc6t6] × × × TCP/IP
PLC SIEMENS S7-1200 × × TCP/IP
PLC SIEMENS S7-200 × × TCP/IP
Controlled PC Platform Protocol Security Encryption
Windows TCP/IP Optional
Linux TCP/IP Optional
Mac OS TCP/IP Optional
Server Files Description
S-Clustr_Server Server
S-Clustr_Client Attacker Client
DebugDevice Simulates embedded device connecting to server
Generate One-click generation of embedded device programs
Testpc Windows host connecting to server
blacklist.conf Blacklist, marks IP groups that are prohibited from connecting
Server.conf Configuration parameters for the server
Version.conf Version information
Linux_Installer.sh Linux environment dependency installer
Windows_Installer.bat Windows environment dependency installer
Parameter_Description-EN.xls [English] Description of parameters in Server.conf
Parameter_Description-ZH.xls [Chinese] Description of parameters in Server.conf