Advertisement
Guest User

Untitled

a guest
Mar 15th, 2017
1,010
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 6.14 KB | None | 0 0
  1. Pterodactyl – A “custom hardware solution to support media copying”; it uses small single-board computers like Raspberry Pi to copy data from an asset computer
  2. SparrowHawk – Keylogger intended for use across multiple architectures and Unix-based platforms
  3. DerStarke – Boot-level rootkit implant for Apple computers
  4. GyrFalcon – Tracks the client of an OpenSSH connection and collects password, username and connection data
  5. SnowyOwl – Uses OpenSSH session to inject code to target asset
  6. HarpyEagle – Hardware-specific tool to gain root access to Apple’s Airport Extreme and Time Capsule
  7. BaldEagle – An exploit for Unix systems’ Hardware Abstraction Layer
  8. MaddeningWhispers – Remote access to devices compromised with the Vanguard exploit
  9. CRUCIBLE – An “automated exploit identification” tool
  10. YarnBall – Covert USB storage for deployment of payloads and storage of exfiltrated data
  11. GreenPacket – Router implant kit
  12. QuarkMatter – Another boot-level rootkit implant for Apple computers
  13. Weeping Angel – Smart TV implant kit (we wrote about it separately)
  14. Hive – Basic implant suite for Windows and Unix setups aimed at “providing an initial foothold for the deployment of other full featured tools”
  15. Honeycomb – Server for data coming from Swindle or Blot proxy servers
  16. CutThroat – Virtual machine system apparently for hosting proxy servers to send asset data to
  17. Bee Sting – iFrame injection technique for HTTP connections
  18. Sontaran – An attempt to compromise the Siemens OpenStage VoIP phone
  19. Secret Squirrel (SQRL) – ???
  20. Remote Development Branch
  21.  
  22. There isn’t much data on RDB; the only tool listed is for getting at secure databases, so that’s a hint.
  23.  
  24. Umbrage – This team, among other things, seems to have collected hacker tools and techniques in use around the web, and also sorted through the Hacking Team leak for useful code and documentation — helpful for development or attribution of hacks
  25. ShoulderSurfer – Tool used to extract data from Microsoft Exchange databases
  26. Operational Support Branch
  27.  
  28. In addition to maintaining some useful all-purpose utilities, OSB creates custom solutions for individual operations or assets, with a focus on compromising Windows machines and apps.
  29.  
  30. Time Stomper – Used to modify timestamps on files so that they match what an operation or asset requires
  31.  
  32.  
  33. Munge Payload – Tool for encrypting payloads and/or modifying them to avoid detection
  34. Magical Mutt – Appears to be a malware-style DLL injector and process monitor
  35. Flash Bang – Hijack that breaks out of the Internet Explorer sandboxed process and then escalates privileges on the target machine
  36. RickyBobby – Basic Windows implant comprising DLLs and scripts that sends its info to listening post server app Cal — yes, they’re Talladega Nights references
  37. Fight Club – Set of infected VLC, WinRAR, TrueCrypt, Shamela and Microsoft Office Standalone installers that deployed RickyBobby instances, for placement on thumbdrives used in an operation
  38. Melomy DriveIn – Hijack of a VLC DLL that launches a RickyBobby instance — unclear if it’s the one in Fight Club
  39. Rain Maker – Compromised portable VLC player that covertly collects files from an air-gapped computer when launched from a user’s USB drive
  40. Improvise – Set of interoperable tools used to collect and exfiltrate data from a Windows, Mac or Linux machine — with bar-themed names (Margarita, Dancefloor, Jukebox) corresponding to the OS
  41. Basic Bit – Keylogger for Windows machines
  42. Fine Dining – Not software exactly but apparently a menu that operatives can order from to get a custom tool for an operation — a fake PDF that launches on a Mac and scours the drive for all audio files, for instance
  43. HammerDrill – CD/DVD monitoring tool that also allows files to be compromised as they’re being written to a disc
  44. Taxman – ???
  45. HyenasHurdle – ???
  46. Automated Implant Branch
  47.  
  48. AIB seems to concern itself with self-running implants. Many of these are not documented or described, but have file lists that reveal a little about their purpose.
  49.  
  50. Frog Prince – Fully integrated implant system inclusive of command and control, listening post and implant software
  51. Grasshopper – Highly configurable tool used to place various implants on Windows machines (Cricket is a relative)
  52. Caterpillar – Tool for preparing files acquired from a system for secure transport
  53. AntHill – Appears to be a file management component for installed implants
  54. The Gibson – Appears to be a component of command and control servers and listening posts.
  55. Galleon – Set of nautically themed scripts and tools for securely copying files to a target computer
  56. Assassin – ???
  57. HercBeetle – ???
  58. CandyMountain – ???
  59. Hornet – ???
  60. Cascade – ???
  61. MagicVikings – ???
  62. Network Devices Branch
  63.  
  64. This branch is all about routers and switches, from industrial-level gear to home devices, all of which require device or class-specific exploits and kits. The leaks largely consist of highly technical test results and developer instructions that only hint at the software’s capabilities.
  65.  
  66. Cannoli – Implant for Linksys devices
  67. WAG200G – Implant installer for Linksys routers that works alongside Cannoli
  68. Slasher – Appears to be a port monitor
  69. Cinnamon – Implant for Cisco routers
  70. Earl Grey – Another implant possibly for Cisco routers
  71. Aquaman – Implant for Linux-based systems, possibly routers (HGs or home gateways) in particular
  72. Bumble – Implant for HP routers
  73. Perseus – Appears to be an implant for routers using PowerPC architecture
  74. Panda Poke – A “credless” exploit (i.e. requires no login credentials) for Huawei router devices
  75. Panda Flight – Covert tunneling tool for Huawei devices
  76. Panda Sneeze – Unclear purpose but part of the Panda suite along with PandaMitt, PandaScore and others
  77. ChimayRed – Exploit used against MikroTik routers running RouterOS that allows payloads to be installed on the device
  78. Felix – Appears to be a listening post for MikroTik routers
  79. HG – Possibly HunGrrr, general-purpose tool for accessing remote networking devices; used as a component or step in many tests and projects
  80. BuzFuz – ???
  81. Cytolysis – ???
  82. Powerman – ???
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement