SlideShare a Scribd company logo
Enfilade: A Tool to Detect
Infections in MongoDB Instances
About Tool
Disclaimer
https://github.com/adityaks/strafer
Tool presented in this talk is for sharing research with security
community to strengthen the intelligence efforts for enhancing the
security of critical services on the internet.
Note: Due to Covid-19 Delta variant challenge and travel restrictions, we were
not able to present in-person at the BlackHat USA Arsenal 2021.
About Tool
Development
This is the first release of the tool and we expect to add more modules in the nearby future. This
work is done in collaboration with the Research Team at the Office of the CTO, F5
(https://www.f5.com/company/octo)
BlackHat Arsenal USA 2021
About Tool
Enfilade Project Team
https://github.com/adityaks/strafer
• Dr. Aditya K Sood
o Security Practitioner and Researcher
o Working in the security field for more than 13 years
o Regular speaker at industry leading security conferences
o Author of “Targeted Cyber Attacks” and “Empirical Cloud Security” Books
o W: https://www.adityaksood.com
o T: @adityaksood
o LinkedIn: https://www.linkedin.com/adityaks
• Rohit Bansal
o Principal Researcher, SecNiche Security Labs
o https://secniche.org/
MongoDB Threats Research. And
Intelligence Collection
MongoDB Threats Research and
Tool Development
About Tool
Mongodb threats and attacks landscape
About Tool
• Enfilade: A tool to detect potential infections in MongoDB instances
• In this version of the tool, the following modules are supported:
o MongoDB instances information gathering and reconnaissance (inline)
o MongoDB instances exposure on the Internet (authentication checks)
o MongoDB instances admin privileges assessment
o Detecting potential ransomware infections in the MongoDB instances
o Basic
o Intrusive
o Detecting potential botnet infections such as meow botnet
o Basic
o Intrusive
Introducing Enfilade
About Tool
Introducing Enfilade
About Tool
Detecting unauthenticated mongodb instances
About Tool
Privilege abuse: admin access (user creation)
About Tool
Detecting Ransomware Infections (Basic)
About Tool
Detecting Ransomware Infections (Intrusive)
About Tool
Detecting MEOW Botnet Infections (Basic)
About Tool
Detecting MEOW Botnet Infections (Intrusive)
About Tool
Enfilade Tool: Demo
About Tool
Enfilade Tool: Download
https://github.com/adityaks/enfilade
About Tool
Questions and Queries

More Related Content

PDF
Understanding ransomware
PDF
Detecting Ransomware/Bot Infections in Elasticsearch
PDF
Cracking the mobile application code
PPTX
Malware: To The Realm of Malicious Code (Training)
PPTX
Down The Rabbit Hole, From Networker to Security Professional
PPT
Brucon presentation
PDF
Getting Started With Hacking Android & iOS Apps? Tools, Techniques and resources
PPTX
Berkarir di Cyber Security
Understanding ransomware
Detecting Ransomware/Bot Infections in Elasticsearch
Cracking the mobile application code
Malware: To The Realm of Malicious Code (Training)
Down The Rabbit Hole, From Networker to Security Professional
Brucon presentation
Getting Started With Hacking Android & iOS Apps? Tools, Techniques and resources
Berkarir di Cyber Security

What's hot (20)

PDF
N. Oskina, G. Asproni - Be your own Threatbuster! - Codemotion Milan 2018
PPTX
Malware Analysis
PPTX
Reduce the Risk of Open Source Security Vulnerabilities
PPTX
How to assign a CVE to yourself?
PPTX
Path of Cyber Security
PPTX
The difference between Penetration Testing and Red Team
PPTX
DLL Preloading Attack
PPTX
(Training) Malware - To the Realm of Malicious Code
PPTX
Cyber Threat Simulation Training
PPTX
Invincea fake british airways ticket spear-phish malware 03-21-2014
PPTX
Rise of software supply chain attack
PPTX
Tech ThrowDown: Invincea FreeSpace vs EMET 5.0
PPTX
Jerod Brennen - What You Need to Know About OSINT
PDF
Weaponizing OSINT – Hacker Halted 2019 – Michael James
PPTX
PPTX
Detection and Analysis of 0-Day Threats
PPTX
Android malware analysis
PPTX
Continuous security testing - sharing responsibility
PPTX
Mmw mac malware-mac
PPTX
Hacking Mobile Apps
N. Oskina, G. Asproni - Be your own Threatbuster! - Codemotion Milan 2018
Malware Analysis
Reduce the Risk of Open Source Security Vulnerabilities
How to assign a CVE to yourself?
Path of Cyber Security
The difference between Penetration Testing and Red Team
DLL Preloading Attack
(Training) Malware - To the Realm of Malicious Code
Cyber Threat Simulation Training
Invincea fake british airways ticket spear-phish malware 03-21-2014
Rise of software supply chain attack
Tech ThrowDown: Invincea FreeSpace vs EMET 5.0
Jerod Brennen - What You Need to Know About OSINT
Weaponizing OSINT – Hacker Halted 2019 – Michael James
Detection and Analysis of 0-Day Threats
Android malware analysis
Continuous security testing - sharing responsibility
Mmw mac malware-mac
Hacking Mobile Apps
Ad

Similar to Enfilade: Tool to Detect Infections in MongoDB Instances (20)

PDF
HackInBo2k16 - Threat Intelligence and Malware Analysis
PPTX
Hacktoberfest'24 _ GDG on Campus BU.pptx
PPTX
Open Source Insight: Who Owns Linux? TRITON Attack, App Security Testing, Fut...
PPTX
Intro to Malware Analysis
PPTX
Peerlyst Delhi NCR Chapter Meet
PPTX
Top 10 Mobile Hacking Tools – 2025 Edition
PPTX
Getting started with android
PPTX
Reveal the Security Risks in the software Development Lifecycle Meetup 060320...
PDF
I haz you and pwn your maal whitepaper
PDF
Getting started with Android pentesting
PDF
So... you want to be a security consultant
PPTX
Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...
PDF
Building Custom Android Malware BruCON 2013
PDF
Bug Bounty Blueprint : A Beginner's Guide
PDF
Android Malware Detection Literature Review
PDF
Exploring the Social Engineering Toolkit (Set) Using Backtrack 5R3
PPTX
[CB16] Security in the IoT World: Analyzing the Security of Mobile Apps for A...
PPTX
Software Security Assurance for DevOps - Hewlett Packard Enterprise + Black Duck
ODP
Barcamp: Open Source and Security
PDF
Android Secure Coding
HackInBo2k16 - Threat Intelligence and Malware Analysis
Hacktoberfest'24 _ GDG on Campus BU.pptx
Open Source Insight: Who Owns Linux? TRITON Attack, App Security Testing, Fut...
Intro to Malware Analysis
Peerlyst Delhi NCR Chapter Meet
Top 10 Mobile Hacking Tools – 2025 Edition
Getting started with android
Reveal the Security Risks in the software Development Lifecycle Meetup 060320...
I haz you and pwn your maal whitepaper
Getting started with Android pentesting
So... you want to be a security consultant
Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...
Building Custom Android Malware BruCON 2013
Bug Bounty Blueprint : A Beginner's Guide
Android Malware Detection Literature Review
Exploring the Social Engineering Toolkit (Set) Using Backtrack 5R3
[CB16] Security in the IoT World: Analyzing the Security of Mobile Apps for A...
Software Security Assurance for DevOps - Hewlett Packard Enterprise + Black Duck
Barcamp: Open Source and Security
Android Secure Coding
Ad

More from Aditya K Sood (20)

PDF
Emerging Trends in Online Social Networks Malware
PDF
BlackHat 2014 Briefings - Exploiting Fundamental Weaknesses in Botnet C&C Pan...
PDF
BlackHat Arsenal 2014 - C-SCAD : Assessing Security Flaws in C-SCAD WebX Clie...
PDF
Network Security : Book Review : Targeted Cyber Attacks : Aditya K Sood
PDF
Abusing Glype Proxies - Attacks, Exploits and Defences
PDF
NIframer - CPanel IFrame Injector (Bash based) - Virus Bulletin Magazine
PDF
CrossTalk - The Art of Cyber Bank Robbery - Stealing your Money Through Insid...
PDF
BlackHat USA 2013 Arsenal - Sparty : A FrontPage and SharePoint Security Audi...
PDF
ToorCon 14 : Malandroid : The Crux of Android Infections
PDF
DEF CON 20 - Botnets Die Hard - Owned and Operated
PDF
Hackers on Planet Earth (HOPE - 2012) Advancements in Botnet Attacks
PDF
NGR Bot Analysis Paper
PDF
Virus bulletin 2011 Conference Paper - Browser Exploit Packs - Exploitation T...
PDF
Commercial Cyber Crime - Social Networks Malware
PDF
Virus Bulletin 2011 Conference - Browser Exploit Packs - Death by Bundled Exp...
PDF
OWASP AppSec USA 2011 - Dismantling Web Malware
PDF
Browser Malware Taxonomy
PDF
BruCon (Brussels 2011) Hacking Conference - Botnets and Browsers (Brothers in...
PDF
PenTest Magazine Teaser - Mobile Hacking
PDF
Dissecting Java Server Faces for Penetration Testing
Emerging Trends in Online Social Networks Malware
BlackHat 2014 Briefings - Exploiting Fundamental Weaknesses in Botnet C&C Pan...
BlackHat Arsenal 2014 - C-SCAD : Assessing Security Flaws in C-SCAD WebX Clie...
Network Security : Book Review : Targeted Cyber Attacks : Aditya K Sood
Abusing Glype Proxies - Attacks, Exploits and Defences
NIframer - CPanel IFrame Injector (Bash based) - Virus Bulletin Magazine
CrossTalk - The Art of Cyber Bank Robbery - Stealing your Money Through Insid...
BlackHat USA 2013 Arsenal - Sparty : A FrontPage and SharePoint Security Audi...
ToorCon 14 : Malandroid : The Crux of Android Infections
DEF CON 20 - Botnets Die Hard - Owned and Operated
Hackers on Planet Earth (HOPE - 2012) Advancements in Botnet Attacks
NGR Bot Analysis Paper
Virus bulletin 2011 Conference Paper - Browser Exploit Packs - Exploitation T...
Commercial Cyber Crime - Social Networks Malware
Virus Bulletin 2011 Conference - Browser Exploit Packs - Death by Bundled Exp...
OWASP AppSec USA 2011 - Dismantling Web Malware
Browser Malware Taxonomy
BruCon (Brussels 2011) Hacking Conference - Botnets and Browsers (Brothers in...
PenTest Magazine Teaser - Mobile Hacking
Dissecting Java Server Faces for Penetration Testing

Recently uploaded (20)

PDF
Approach and Philosophy of On baking technology
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
cuic standard and advanced reporting.pdf
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Machine learning based COVID-19 study performance prediction
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Encapsulation theory and applications.pdf
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Unlocking AI with Model Context Protocol (MCP)
DOCX
The AUB Centre for AI in Media Proposal.docx
PPTX
Programs and apps: productivity, graphics, security and other tools
PPT
Teaching material agriculture food technology
PDF
Empathic Computing: Creating Shared Understanding
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Approach and Philosophy of On baking technology
Spectral efficient network and resource selection model in 5G networks
Reach Out and Touch Someone: Haptics and Empathic Computing
MIND Revenue Release Quarter 2 2025 Press Release
cuic standard and advanced reporting.pdf
The Rise and Fall of 3GPP – Time for a Sabbatical?
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Diabetes mellitus diagnosis method based random forest with bat algorithm
Machine learning based COVID-19 study performance prediction
NewMind AI Weekly Chronicles - August'25 Week I
Encapsulation theory and applications.pdf
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Unlocking AI with Model Context Protocol (MCP)
The AUB Centre for AI in Media Proposal.docx
Programs and apps: productivity, graphics, security and other tools
Teaching material agriculture food technology
Empathic Computing: Creating Shared Understanding
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...

Enfilade: Tool to Detect Infections in MongoDB Instances