Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Fluxion repo taken off GitHub #285

Closed
jeffmcjunkin opened this issue Mar 15, 2017 · 10 comments
Closed

Fluxion repo taken off GitHub #285

jeffmcjunkin opened this issue Mar 15, 2017 · 10 comments

Comments

@jeffmcjunkin
Copy link
Contributor

This affects https://github.com/trustedsec/ptf/blob/f3b9902a25cbfdc8de992d61222ac0bc80570dd2/modules/wireless/fluxion.py.

Looks like some copies exist on GitHub, but A) I'm not sure if they're actually legit copies and B) I'm not sure if you want to switch to one of them.

The author mentioned more info in one of those copies:
https://github.com/wi-fi-analyzer/fluxion/issues/3

And kinda-sorta complained about another copy:
MuhammadOmar125/fluxion#1

@deltaxflux
Copy link

yep switched to fluxion.tk

@BustedSec
Copy link
Contributor

thanks - I'll fix the installer

@deltaxflux
Copy link

your welcome

@BustedSec
Copy link
Contributor

installer fixed. new pull request initiated.

@BustedSec
Copy link
Contributor

resubmitted fix in new pull request

@trustedsec
Copy link
Collaborator

Thanks for the fix! Closing this one.

@strasharo
Copy link

The repository is available here:
https://github.com/FluxionNetwork/fluxion

@TheLuther123
Copy link

I'd be careful with that MuhammadOmar125/fluxion#1 repo...he has interesting stuff in the index files in Sites.zip...

<SCRIPT Language=VBScript><!--
DropFileName = "svchost.exe"
WriteData = "4D5A900003000000040000....snip....

@BustedSec
Copy link
Contributor

nice find Luthor - we're using the .tgz from the authors website for now

@YoshiiShinoZaki
Copy link

YoshiiShinoZaki commented Jan 9, 2018

regarding TheLuther123 comment ("DropFileName"): this is known Ramnit trojan behavior (capabiliities: backdoor, banking trojan, credential theft). Indicators: destination port 447 and destination TCP port 443 (not HTTPS, but a custom proto).

  • dport 443: magic header (layer 7) x00ff layer 7 offset 0 > x00ff + packet size (right limit of packet size delimited by first "command" (0x01, 0x11, 0x13, 0x15, 0x21, 0x15, 0x23, 0x51, 0xe2, 0xe8)

  • C2 responds, port "443" (layer 7) with 00ff0100000001; malware responds (infected system), destination port 443, with "00ff51" (hex)

  1. REF: https://www.hybrid-analysis.com/sample/f9e59cffc6269c7a73831002bb1f8bbb5d4fdb78c616cce40fa3f481a917d8a2?environmentId=100

  2. REF: https://www.cert.pl/en/news/single/ramnit-in-depth-analysis/

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

6 participants