-
Notifications
You must be signed in to change notification settings - Fork 14
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
cloud: add AWS cracking automation #9
Conversation
The repository contains files for Terraform and Ansible in order to assist users who need to run password cracking sessions in the Cloud.
Merging so that I can advertise and see if anyone is interested in the new functionality. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Like you, I don't know if this will be in demand, but I was curious to take a look at the diff here and noticed a few minor things.
Also, I suggest we standardize on "john" instead of "jtr" (or "JtR") in various component names, identifiers, etc.
remote_user: ubuntu | ||
tasks: | ||
- name: Transfer the script | ||
copy: src=../build-john.sh dest=/home/ubuntu/build-john.sh mode=0777 |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Perhaps change 0777 to 0700 here.
description = "The secutiry groups inbound rules." | ||
type = map(object({description = string, cidr_blocks = list(string)})) | ||
default = { | ||
22 = { description = "Inbound SSH rule", cidr_blocks = [ "45.170.58.160/32" ] } |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Hard-coded IP address here. (Also, typo in "secutiry" in at least two places.)
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I can switch to "YOUR_IP_HERE/32". I can't think of another good numerical value.
It is useful for provisioning and destroying instances: it is fast, repeatable and error free. There is no possibility to forget to delete an instance or the EBS disk. It makes sense if someone wants to start a few instances and try a wordlist here, or a mask there, maybe incremental over there.
With the tool someone can safely run a cracking session that lasts for weeks on the tier free. |
The repository contains files for Terraform and Ansible in order to
assist users who need to run password cracking sessions in the Cloud.