SlideShare a Scribd company logo
Strafer: A Tool to Detect
Infections in Elasticsearch
Instances
About Tool
Disclaimer
https://github.com/adityaks/strafer
Tool presented in this talk is for sharing research with security
community to strengthen the intelligence efforts for enhancing the
security of critical services on the internet.
This talk does not relate to any of our previous or present employers.
About Tool
Strafer Project Team
https://github.com/adityaks/strafer
• Dr. Aditya K Sood
o Security Practitioner and Researcher
o Working in the security field for more than 13 years
o Regular speaker at industry leading security conferences
o Author of “Targeted Cyber Attacks” Book
o W: https://www.adityaksood.com
o T: @adityaksood
o LinkedIn: https://www.linkedin.com/adityaks
• Rohit Bansal
o Principal Researcher, SecNiche Security Labs
o https://secniche.org/
Elasticsearch Threat Research and
Intelligence Collection
Elasticsearch Threat Research and Tool
Development
About Tool
Elasticsearch threats and attacks landscape
About Tool
• Strafer: A tool to detect potential infections in Elasticsearch instances.
• In this version of the tool, the following modules are supported:
o Elasticsearch instance information gathering and reconnaissance (inline).
o Elasticsearch instance exposure on the Internet (authentication checks).
o Detecting potential ransomware infections in the Elasticsearch instances.
o Detecting potential botnet infections such as meow botnet.
o Detecting infected indices in the Elasticsearch instances.
o Detecting Elasticsearch honeypots.
Introducing Strafer
About Tool
Introducing Strafer
About Tool
Detecting Exposed Instances
About Tool
Detecting Ransomware Infections
About Tool
Detecting Botnet Infections
About Tool
Detecting Elasticsearch honeypots
About Tool
Strafer Tool: Working
About Tool
Strafer Tool: Download
https://github.com/adityaks/strafer
About Tool
Questions and Queries

More Related Content

PDF
Enfilade: Tool to Detect Infections in MongoDB Instances
PDF
Cracking the mobile application code
PDF
Understanding ransomware
PPTX
Reduce the Risk of Open Source Security Vulnerabilities
PPTX
Malware: To The Realm of Malicious Code (Training)
PPTX
Down The Rabbit Hole, From Networker to Security Professional
PPT
Brucon presentation
PDF
Getting Started With Hacking Android & iOS Apps? Tools, Techniques and resources
Enfilade: Tool to Detect Infections in MongoDB Instances
Cracking the mobile application code
Understanding ransomware
Reduce the Risk of Open Source Security Vulnerabilities
Malware: To The Realm of Malicious Code (Training)
Down The Rabbit Hole, From Networker to Security Professional
Brucon presentation
Getting Started With Hacking Android & iOS Apps? Tools, Techniques and resources

What's hot (20)

PDF
N. Oskina, G. Asproni - Be your own Threatbuster! - Codemotion Milan 2018
PPTX
The difference between Penetration Testing and Red Team
DOCX
Ian Powers Resume
PPTX
Malware Analysis
PDF
20171106 - Privacy Design Lab - LINDDUN
PPTX
DLL Preloading Attack
PDF
Penetration testing tools and phases
PPTX
PPTX
Rise of software supply chain attack
PPTX
Vulnerability and Exploit Trends: Combining behavioral analysis and OS defens...
PPTX
Path of Cyber Security
PDF
STRIDE Variants and Security Requirements-based Threat Analysis (FFRI Monthly...
PPTX
Continuous security testing - sharing responsibility
PDF
Security of Machine Learning
PPTX
Enterprise security architecture approach
PPTX
(Training) Malware - To the Realm of Malicious Code
PPTX
Explore Security Testing
PDF
TechEvent 2019: Security 101 für Web Entwickler; Roland Krüger - Trivadis
DOC
Strayer sec 420
PPTX
Worst-Case Scenario: Being Detected without Knowing You are Detected
N. Oskina, G. Asproni - Be your own Threatbuster! - Codemotion Milan 2018
The difference between Penetration Testing and Red Team
Ian Powers Resume
Malware Analysis
20171106 - Privacy Design Lab - LINDDUN
DLL Preloading Attack
Penetration testing tools and phases
Rise of software supply chain attack
Vulnerability and Exploit Trends: Combining behavioral analysis and OS defens...
Path of Cyber Security
STRIDE Variants and Security Requirements-based Threat Analysis (FFRI Monthly...
Continuous security testing - sharing responsibility
Security of Machine Learning
Enterprise security architecture approach
(Training) Malware - To the Realm of Malicious Code
Explore Security Testing
TechEvent 2019: Security 101 für Web Entwickler; Roland Krüger - Trivadis
Strayer sec 420
Worst-Case Scenario: Being Detected without Knowing You are Detected
Ad

More from Aditya K Sood (20)

PDF
Emerging Trends in Online Social Networks Malware
PDF
BlackHat 2014 Briefings - Exploiting Fundamental Weaknesses in Botnet C&C Pan...
PDF
BlackHat Arsenal 2014 - C-SCAD : Assessing Security Flaws in C-SCAD WebX Clie...
PDF
Network Security : Book Review : Targeted Cyber Attacks : Aditya K Sood
PDF
Abusing Glype Proxies - Attacks, Exploits and Defences
PDF
NIframer - CPanel IFrame Injector (Bash based) - Virus Bulletin Magazine
PDF
CrossTalk - The Art of Cyber Bank Robbery - Stealing your Money Through Insid...
PDF
BlackHat USA 2013 Arsenal - Sparty : A FrontPage and SharePoint Security Audi...
PDF
ToorCon 14 : Malandroid : The Crux of Android Infections
PDF
DEF CON 20 - Botnets Die Hard - Owned and Operated
PDF
Hackers on Planet Earth (HOPE - 2012) Advancements in Botnet Attacks
PDF
NGR Bot Analysis Paper
PDF
Virus bulletin 2011 Conference Paper - Browser Exploit Packs - Exploitation T...
PDF
Commercial Cyber Crime - Social Networks Malware
PDF
Virus Bulletin 2011 Conference - Browser Exploit Packs - Death by Bundled Exp...
PDF
OWASP AppSec USA 2011 - Dismantling Web Malware
PDF
Browser Malware Taxonomy
PDF
BruCon (Brussels 2011) Hacking Conference - Botnets and Browsers (Brothers in...
PDF
PenTest Magazine Teaser - Mobile Hacking
PDF
Dissecting Java Server Faces for Penetration Testing
Emerging Trends in Online Social Networks Malware
BlackHat 2014 Briefings - Exploiting Fundamental Weaknesses in Botnet C&C Pan...
BlackHat Arsenal 2014 - C-SCAD : Assessing Security Flaws in C-SCAD WebX Clie...
Network Security : Book Review : Targeted Cyber Attacks : Aditya K Sood
Abusing Glype Proxies - Attacks, Exploits and Defences
NIframer - CPanel IFrame Injector (Bash based) - Virus Bulletin Magazine
CrossTalk - The Art of Cyber Bank Robbery - Stealing your Money Through Insid...
BlackHat USA 2013 Arsenal - Sparty : A FrontPage and SharePoint Security Audi...
ToorCon 14 : Malandroid : The Crux of Android Infections
DEF CON 20 - Botnets Die Hard - Owned and Operated
Hackers on Planet Earth (HOPE - 2012) Advancements in Botnet Attacks
NGR Bot Analysis Paper
Virus bulletin 2011 Conference Paper - Browser Exploit Packs - Exploitation T...
Commercial Cyber Crime - Social Networks Malware
Virus Bulletin 2011 Conference - Browser Exploit Packs - Death by Bundled Exp...
OWASP AppSec USA 2011 - Dismantling Web Malware
Browser Malware Taxonomy
BruCon (Brussels 2011) Hacking Conference - Botnets and Browsers (Brothers in...
PenTest Magazine Teaser - Mobile Hacking
Dissecting Java Server Faces for Penetration Testing
Ad

Recently uploaded (20)

PPTX
A Presentation on Artificial Intelligence
PPTX
Cloud computing and distributed systems.
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Network Security Unit 5.pdf for BCA BBA.
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PPTX
Spectroscopy.pptx food analysis technology
PPTX
Machine Learning_overview_presentation.pptx
PDF
Spectral efficient network and resource selection model in 5G networks
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PPT
Teaching material agriculture food technology
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
A Presentation on Artificial Intelligence
Cloud computing and distributed systems.
The Rise and Fall of 3GPP – Time for a Sabbatical?
“AI and Expert System Decision Support & Business Intelligence Systems”
Unlocking AI with Model Context Protocol (MCP)
Network Security Unit 5.pdf for BCA BBA.
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Spectroscopy.pptx food analysis technology
Machine Learning_overview_presentation.pptx
Spectral efficient network and resource selection model in 5G networks
20250228 LYD VKU AI Blended-Learning.pptx
Teaching material agriculture food technology
Chapter 3 Spatial Domain Image Processing.pdf
Digital-Transformation-Roadmap-for-Companies.pptx
Programs and apps: productivity, graphics, security and other tools
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
NewMind AI Weekly Chronicles - August'25-Week II
Mobile App Security Testing_ A Comprehensive Guide.pdf
Reach Out and Touch Someone: Haptics and Empathic Computing

Detecting Ransomware/Bot Infections in Elasticsearch