evil-ssdp | Spoof SSDP replies and create fake UPnP devices
kandi X-RAY | evil-ssdp Summary
kandi X-RAY | evil-ssdp Summary
evil-ssdp is a Python library. evil-ssdp has no bugs, it has no vulnerabilities, it has a Permissive License and it has low support. However evil-ssdp build file is not available. You can download it from GitHub, GitLab.
This tool responds to SSDP multicast discover requests, posing as a generic UPNP device. Your spoofed device will magically appear in Windows Explorer on machines in your local network. Users who are tempted to open the device are shown a configurable phishing page. This page can load a hidden image over SMB, allowing you to capture or relay the NetNTLM challenge/response. Templates are also provided to capture clear-text credentials via basic authentication and logon forms, and creating your own custom templates is quick and easy. This requires no existing credentials to execute and works even on networks that have protected against Responder attacks by disabling NETBIOS and LLMNR. Any Operating System or application leveraging SSDP/UPNP can be targeted, but most of the current weaponization has been aimed at Windows 10. As a bonus, this tool can also detect and exploit potential zero-day vulnerabilities in the XML parsing engines of applications using SSDP/UPNP. If a vulnerable device is found, it will alert you in the UI and then mount your SMB share or exfiltrate data with NO USER INTERACTION REQUIRED via an XML External Entity (XXE) attack.
This tool responds to SSDP multicast discover requests, posing as a generic UPNP device. Your spoofed device will magically appear in Windows Explorer on machines in your local network. Users who are tempted to open the device are shown a configurable phishing page. This page can load a hidden image over SMB, allowing you to capture or relay the NetNTLM challenge/response. Templates are also provided to capture clear-text credentials via basic authentication and logon forms, and creating your own custom templates is quick and easy. This requires no existing credentials to execute and works even on networks that have protected against Responder attacks by disabling NETBIOS and LLMNR. Any Operating System or application leveraging SSDP/UPNP can be targeted, but most of the current weaponization has been aimed at Windows 10. As a bonus, this tool can also detect and exploit potential zero-day vulnerabilities in the XML parsing engines of applications using SSDP/UPNP. If a vulnerable device is found, it will alert you in the UI and then mount your SMB share or exfiltrate data with NO USER INTERACTION REQUIRED via an XML External Entity (XXE) attack.
Support
Quality
Security
License
Reuse
Support
evil-ssdp has a low active ecosystem.
It has 298 star(s) with 61 fork(s). There are 10 watchers for this library.
It had no major release in the last 6 months.
evil-ssdp has no issues reported. On average issues are closed in 6 days. There are no pull requests.
It has a neutral sentiment in the developer community.
The latest version of evil-ssdp is 08.-beta
Quality
evil-ssdp has 0 bugs and 0 code smells.
Security
evil-ssdp has no vulnerabilities reported, and its dependent libraries have no vulnerabilities reported.
evil-ssdp code analysis shows 0 unresolved vulnerabilities.
There are 0 security hotspots that need review.
License
evil-ssdp is licensed under the MIT License. This license is Permissive.
Permissive licenses have the least restrictions, and you can use them in most projects.
Reuse
evil-ssdp releases are not available. You will need to build from source code and install.
evil-ssdp has no build file. You will be need to create the build yourself to build the component from source.
Installation instructions are not available. Examples and code snippets are available.
It has 981 lines of code, 22 functions and 22 files.
It has medium code complexity. Code complexity directly impacts maintainability of the code.
Top functions reviewed by kandi - BETA
kandi has reviewed evil-ssdp and discovered the below as its top functions. This is intended to give you an instant insight into evil-ssdp implemented functionality, and help decide if they suit your requirements.
- Listen for msearch events
- Send the location of the device
- Process received data
- Create a new UPnP object
- Process command line arguments
- Print details about the device
- Set the SMB server
- Get ip address
Get all kandi verified functions for this library.
evil-ssdp Key Features
No Key Features are available at this moment for evil-ssdp.
evil-ssdp Examples and Code Snippets
No Code Snippets are available at this moment for evil-ssdp.
Community Discussions
No Community Discussions are available at this moment for evil-ssdp.Refer to stack overflow page for discussions.
Community Discussions, Code Snippets contain sources that include Stack Exchange Network
Vulnerabilities
No vulnerabilities reported
Install evil-ssdp
You can download it from GitHub, GitLab.
You can use evil-ssdp like any standard Python library. You will need to make sure that you have a development environment consisting of a Python distribution including header files, a compiler, pip, and git installed. Make sure that your pip, setuptools, and wheel are up to date. When using pip it is generally recommended to install packages in a virtual environment to avoid changes to the system.
You can use evil-ssdp like any standard Python library. You will need to make sure that you have a development environment consisting of a Python distribution including header files, a compiler, pip, and git installed. Make sure that your pip, setuptools, and wheel are up to date. When using pip it is generally recommended to install packages in a virtual environment to avoid changes to the system.
Support
For any new features, suggestions and bugs create an issue on GitHub.
If you have any questions check and ask questions on community page Stack Overflow .
Find more information at:
Reuse Trending Solutions
Find, review, and download reusable Libraries, Code Snippets, Cloud APIs from over 650 million Knowledge Items
Find more librariesStay Updated
Subscribe to our newsletter for trending solutions and developer bootcamps
Share this Page