Skip to content

Cryodes

Shepherd edited this page Dec 9, 2022 · 4 revisions

THE USE OF THE SOFTWARE IN THIS SECTION IS DANGEROUS. PROVIDED FOR EDUCATIONAL PURPOSES.

THE SSG AND ANY PARTIES THERE IN DO NOT HOLD RESPONSIBILITY FOR THE MISUSE OF THIS SOFTWARE.

Before use.

Understand that Cryodes are setup in a way that it will not inherently biff your system. As of initial writing Cryodes have not been fully implemented into Cryptex as we are doing a full patch on the topic we are calling 'devnull' which will focus on the development of Cryptographic malware, PoC obfuscation and system mining programmes.

How we achieve safety is by containing each cryode in its own directory and the code is designed to inherently avoid interaction with any file outside of the specified directory. That isn't to say, the code cannot be modified once on your machine to interact in a way in which you feel is appropriate the ideals of a PoC is to act as a building block for you - the learner, to adapt to code to your needs as you learn and grow to understand it.


Cryode 1 - Loki

Loki is a simple ransomware which encrypts files in its directory using fernet and creates a key for later decryption, do not remove this key. Future functions of Loki will have you able to specify a given file or directory and it can assist in encryption/decryption of the given file or sub-directories of a specific directory location. As well as this the foundation for RSA-4096 pub/priv key generation on-request has already been setup too.

Any file/s inside the loki directory (besides the loki.py and fernet key) will be encrypted/decrypted when you run loki. As such you can treat is as a 'vault' of sorts or place the loki.py into any directory in which you which to encrypt the content files (for safety purposes loki.py doesn't inherently encrypt subdirectories of any directory it's placed into) just remember not to remove the produced key for the given directory until you've unencrypted the files or you may never gain access back. Loki by the nature of fernet, will not recycle keys and will always generate new ones.

Pre-Implimentation instructions:

  1. Navigate to the loki directory in Cryptex
cd ~/git/Cryptex/cryodes/loki
  1. Make a test file
touch example.txt && echo "This is some text" > example.txt
  1. Encrypt
python3 loki.py -encrypt

You will notice that it generates a fernet.key - DO NOT LOSE THIS, AS YOU WILL NOT BE ABLE TO DECRYPT DATA WITHOUT IT. It'll generate a new key for each directory you run the loki.py in, do not remove the directories key unless you've decrypted the data in that directory first.

  1. Decrypt
python3 loki.py -decrypt

Standalone available at: https://github.com/ItsJustShepherd/Loki

Cryode 2 - Netjack

Netjack is an early-development password/wordlist generator that comes with a pre-setup configuration capable of exploiting a potential 960,000, or north of one-million Netgear routers with number variations applied, due to an innate security flaw in their security key generation by factory-default. As such we here at SSG managed to crack 5-netgear routers within 45-minutes using our curated generator - bespoke and purpose built to attack the flawed Netgear WPA-PBKDF2-PMKID+EAPOL captures, however it is you get the captures is your choice but we always opt you go the legal route and attack your own systems!

Along with the pre-built Netgear wordlist usable for router exploitation (notably the Nighthawk series) we've also began a community powered password wordlist coined 'cryptlist' which we'll be adding to as time goes by. As mentioned right now it's early-dev as of 10/12/2022 and pushed by Shepherd, with programming support from Marvhus. It marks the second installation to the Cryode series.

Wiki Sidebar


🖐️ Get in touch

You can join in on chatting with the dev team on our discord server

Discord Server

🔧 Issues

If you face any problems while using the application, please open an issue here

🤝 Contributing

Contributions, feedback, and bug reports are welcome! Feel free to check out our issues page to find out what you could do! but before contrubuting make sure to check out CONTRIBUTING.md.

Clone this wiki locally