Skip to content

Latest commit

 

History

History
82 lines (49 loc) · 2.29 KB

README.md

File metadata and controls

82 lines (49 loc) · 2.29 KB

DGAme-Over: fighting malware easily

Usage

Build images

(cd dns/local/ && docker build -t local-dns -f dns.dga.Dockerfile .)
(cd dns/attacker-dns/ && docker build -t attacker-dns -f dns.dga.Dockerfile .)
(cd machines/victim/ && docker build -t victim -f victim.dga.Dockerfile .)
(cd machines/c2-server/ && docker build -t c2-server .)

Launch proof of concept

docker-compose up

Access visualization

Go to the skydive UI.

Generate domains

cd victim
python3 dgacollection/DGA.py

Network Architecture

  • Custom Network (dga_environment): 10.0.0.0/24
    • DNS victim (serving victim-domain.com): 10.0.0.2
    • victim machines (running the DGA): 10.0.0.3
    • DNS attackers : 10.0.0.251
    • C2-server (?????????.???): 10.0.0.250

Explanations

The attacking DNS (10.0.0.251) registers randomly one of the 100 first domains generated for the C2-server (10.0.0.250). When the victim (10.0.0.3) queries the local DNS (10.0.0.3) (who only knows the location of the victim domain), the query is passed to other DNS (including the attacker's one).

That way the victim (in fact the malware) when spraying DNS request will receive NXDOMAIN for most urls except for the one registered by the attacker. In our PoC, we consider that the single fact that the response is not a NXDOMAIN is enough to assess that the malware has successfully connected to the c2-server.

Techno

Without DGAme-over

DNS owned by the attacker

a

Local victim's DNS

b

DGA output from the malware on the victim's machine

c

With DGAme-over

DNS owned by the attacker

a

Local victim's DNS

b

DGA output from the malware on the victim's machine

c

Prize

This project won the technical and public prize of the cybersecurity Hackathon organized by Ecole 42 and Thales (https://ushallnotpass.org/).