Skip to content

Latest commit

 

History

History
373 lines (269 loc) · 12.6 KB

DEVELOPMENT.md

File metadata and controls

373 lines (269 loc) · 12.6 KB

🖲️ Bjorn Development

thumbnail_IMG_0546

📚 Table of Contents

🎨 Design

  • Portability: Self-contained and portable device, ideal for penetration testing.
  • Modularity: Extensible architecture allowing addition of new actions.
  • Visual Interface: The e-Paper HAT provides a visual interface for monitoring the ongoing actions, displaying results or stats, and interacting with Bjorn .

📔 Educational Aspects

  • Learning Tool: Designed as an educational tool to understand cybersecurity concepts and penetration testing techniques.
  • Practical Experience: Provides a practical means for students and professionals to familiarize themselves with network security practices and vulnerability assessment tools.

✒️ Disclaimer

  • Ethical Use: This project is strictly for educational purposes.
  • Responsibility: The author and contributors disclaim any responsibility for misuse of Bjorn.
  • Legal Compliance: Unauthorized use of this tool for malicious activities is prohibited and may be prosecuted by law.

🧩 Extensibility

  • Evolution: The main purpose of Bjorn is to gain new actions and extend his arsenal over time.
  • Modularity: Actions are designed to be modular and can be easily extended or modified to add new functionality.
  • Possibilities: From capturing pcap files to cracking hashes, man-in-the-middle attacks, and more—the possibilities are endless.
  • Contribution: It's up to the user to develop new actions and add them to the project.

🔦 Development Status

  • Project Status: Ongoing development.
  • Current Version: Scripted auto-installer, or manual installation. Not yet packaged with Raspberry Pi OS.
  • Reason: The project is still in an early stage, requiring further development and debugging.

🗂️ Project Structure

Bjorn/
├── Bjorn.py
├── comment.py
├── display.py
├── epd_helper.py
├── init_shared.py
├── kill_port_8000.sh
├── logger.py
├── orchestrator.py
├── requirements.txt
├── shared.py
├── utils.py
├── webapp.py
├── __init__.py
├── actions/
│   ├── ftp_connector.py
│   ├── ssh_connector.py
│   ├── smb_connector.py
│   ├── rdp_connector.py
│   ├── telnet_connector.py
│   ├── sql_connector.py
│   ├── steal_files_ftp.py
│   ├── steal_files_ssh.py
│   ├── steal_files_smb.py
│   ├── steal_files_rdp.py
│   ├── steal_files_telnet.py
│   ├── steal_data_sql.py
│   ├── nmap_vuln_scanner.py
│   ├── scanning.py
│   └── __init__.py
├── backup/
│   ├── backups/
│   └── uploads/
├── config/
├── data/
│   ├── input/
│   │   └── dictionary/
│   ├── logs/
│   └── output/
│       ├── crackedpwd/
│       ├── data_stolen/
│       ├── scan_results/
│       ├── vulnerabilities/
│       └── zombies/
└── resources/
    └── waveshare_epd/

⚓ Core Files

Bjorn.py

The main entry point for the application. It initializes and runs the main components, including the network scanner, orchestrator, display, and web server.

comment.py

Handles generating all the Bjorn comments displayed on the e-Paper HAT based on different themes/actions and statuses.

display.py

Manages the e-Paper HAT display, updating the screen with Bjorn character, the dialog/comments, and the current information such as network status, vulnerabilities, and various statistics.

epd_helper.py

Handles the low-level interactions with the e-Paper display hardware.

logger.py

Defines a custom logger with specific formatting and handlers for console and file logging. It also includes a custom log level for success messages.

orchestrator.py

Bjorn’s AI, a heuristic engine that orchestrates the different actions such as network scanning, vulnerability scanning, attacks, and file stealing. It loads and executes actions based on the configuration and sets the status of the actions and Bjorn.

shared.py

Defines the SharedData class that holds configuration settings, paths, and methods for updating and managing shared data across different modules.

init_shared.py

Initializes shared data that is used across different modules. It loads the configuration and sets up necessary paths and variables.

utils.py

Contains utility functions used throughout the project.

webapp.py

Sets up and runs a web server to provide a web interface for changing settings, monitoring and interacting with Bjorn.

▶️ Actions

actions/scanning.py

Conducts network scanning to identify live hosts and open ports. It updates the network knowledge base (netkb) and generates scan results.

actions/nmap_vuln_scanner.py

Performs vulnerability scanning using Nmap. It parses the results and updates the vulnerability summary for each host.

Protocol Connectors

  • ftp_connector.py: Brute-force attacks on FTP services.
  • ssh_connector.py: Brute-force attacks on SSH services.
  • smb_connector.py: Brute-force attacks on SMB services.
  • rdp_connector.py: Brute-force attacks on RDP services.
  • telnet_connector.py: Brute-force attacks on Telnet services.
  • sql_connector.py: Brute-force attacks on SQL services.

File Stealing Modules

  • steal_files_ftp.py: Steals files from FTP servers.
  • steal_files_smb.py: Steals files from SMB shares.
  • steal_files_ssh.py: Steals files from SSH servers.
  • steal_files_telnet.py: Steals files from Telnet servers.
  • steal_data_sql.py: Extracts data from SQL databases.

📇 Data Structure

Network Knowledge Base (netkb.csv)

Located at data/netkb.csv. Stores information about:

  • Known hosts and their status. (Alive or offline)
  • Open ports and vulnerabilities.
  • Action execution history. (Success or failed)

Preview Example:

netkb1 netkb2

Scan Results

Located in data/output/scan_results/. This file is generated everytime the network is scanned. It is used to consolidate the data and update netkb.

Example:

Scan result

Live Status (livestatus.csv)

Contains real-time information displayed on the e-Paper HAT:

  • Total number of known hosts.
  • Currently alive hosts.
  • Open ports count.
  • Other runtime statistics.

📖 Detailed Project Description

👀 Behavior of Bjorn

Once launched, Bjorn performs the following steps:

  1. Initialization: Loads configuration, initializes shared data, and sets up necessary components such as the e-Paper HAT display.
  2. Network Scanning: Scans the network to identify live hosts and open ports. Updates the network knowledge base (netkb) with the results.
  3. Orchestration: Orchestrates different actions based on the configuration and network knowledge base. This includes performing vulnerability scanning, attacks, and file stealing.
  4. Vulnerability Scanning: Performs vulnerability scans on identified hosts and updates the vulnerability summary.
  5. Brute-Force Attacks and File Stealing: Starts brute-force attacks and steals files based on the configuration criteria.
  6. Display Updates: Continuously updates the e-Paper HAT display with current information such as network status, vulnerabilities, and various statistics. Bjorn also displays random comments based on different themes and statuses.
  7. Web Server: Provides a web interface for monitoring and interacting with Bjorn.

▶️ Running Bjorn

📗 Manual Start

To manually start Bjorn (without the service, ensure the service is stopped « sudo systemctl stop bjorn.service »):

cd /home/bjorn/Bjorn

# Run Bjorn
sudo python Bjorn.py

🕹️ Service Control

Control the Bjorn service:

# Start Bjorn
sudo systemctl start bjorn.service

# Stop Bjorn
sudo systemctl stop bjorn.service

# Check status
sudo systemctl status bjorn.service

# View logs
sudo journalctl -u bjorn.service

🪄 Fresh Start

To reset Bjorn to a clean state:

sudo rm -rf /home/bjorn/Bjorn/config/*.json \
    /home/bjorn/Bjorn/data/*.csv \
    /home/bjorn/Bjorn/data/*.log \
    /home/bjorn/Bjorn/data/output/data_stolen/* \
    /home/bjorn/Bjorn/data/output/crackedpwd/* \
    /home/bjorn/Bjorn/config/* \
    /home/bjorn/Bjorn/data/output/scan_results/* \
    /home/bjorn/Bjorn/__pycache__ \
    /home/bjorn/Bjorn/config/__pycache__ \
    /home/bjorn/Bjorn/data/__pycache__ \
    /home/bjorn/Bjorn/actions/__pycache__ \
    /home/bjorn/Bjorn/resources/__pycache__ \
    /home/bjorn/Bjorn/web/__pycache__ \
    /home/bjorn/Bjorn/*.log \
    /home/bjorn/Bjorn/resources/waveshare_epd/__pycache__ \
    /home/bjorn/Bjorn/data/logs/* \
    /home/bjorn/Bjorn/data/output/vulnerabilities/* \
    /home/bjorn/Bjorn/data/logs/*

Everything will be recreated automatically at the next launch of Bjorn.

❇️ Important Configuration Files

🔗 Shared Configuration (shared_config.json)

Defines various settings for Bjorn, including:

  • Boolean settings (manual_mode, websrv, debug_mode, etc.).
  • Time intervals and delays.
  • Network settings.
  • Port lists and blacklists. These settings are accessible on the webpage.

🛠️ Actions Configuration (actions.json)

Lists the actions to be performed by Bjorn, including (dynamically generated with the content of the folder):

  • Module and class definitions.
  • Port assignments.
  • Parent-child relationships.
  • Action status definitions.

📟 E-Paper Display Support

Currently, hardcoded for the 2.13-inch V2 & V4 e-Paper HAT. My program automatically detect the screen model and adapt the python expressions into my code.

For other versions:

  • As I don't have the v1 and v3 to validate my algorithm, I just hope it will work properly.

🍾 Ghosting Removed!

In my journey to make Bjorn work with the different screen versions, I struggled, hacking several parameters and found out that it was possible to remove the ghosting of screens! I let you see this, I think this method will be very useful for all other projects with the e-paper screen!

✍️ Development Guidelines

➕ Adding New Actions

  1. Create a new action file in actions/.
  2. Implement required methods:
    • __init__(self, shared_data)
    • execute(self, ip, port, row, status_key)
  3. Add the action to actions.json.
  4. Follow existing action patterns.

🧪 Testing

  1. Create a test environment.
  2. Use an isolated network.
  3. Follow ethical guidelines.
  4. Document test cases.

💻 Web Interface

  • Access: http://[device-ip]:8000
  • Features:
    • Real-time monitoring with a console.
    • Configuration management.
    • Viewing results. (Credentials and files)
    • System control.

🧭 Project Roadmap

🪛 Current Focus

  • Stability improvements.
  • Bug fixes.
  • Service reliability.
  • Documentation updates.

🧷 Future Plans

  • Additional attack modules.
  • Enhanced reporting.
  • Improved user interface.
  • Extended protocol support.

📜 License

2024 - Bjorn is distributed under the MIT License. For more details, please refer to the LICENSE file included in this repository.