SlideShare a Scribd company logo
Skyfall
scanner de vulnerabilidades em web
applications
fork skipfish
Mauro Risonho de Paula Assumpção
firebits
mauro.risonho@gmail.com
http://www.linkedin.com/profile/view?id=35593661&trk=tab_pro
● Google Open Source Jam 2013 – Brazil - SP
● 007 James Bond – Operation Skyfall
● 09/03/2013
● Scanner web
Skyfall (Ideias) ?
Skyfall - repo
Skyfall – on demand
Skyfall01
32Ram
(www.example.com)
Skyfall02
32Ram
(www.tes1.com)
Skyfall023
32Ram
(www.ext2.com)
frontend
32Ram
(www.example.com)
(www.tes1.com)
(www.ext2.com)
Skyfall02
32Ram
(www.tes1.com)
Skyfall02
32Ram
(www.tes1.com)
Skyfall02
32Ram
(www.tes1.com)
REPORTS
OFF
ON
ON
DATABASE ->SSH
● High performance:
– 500+ requests per second against
responsive Internet targets
– 2000+ requests per second on LAN / MAN
networks
– 7000+ requests against local instances
have been observed, with a very modest
CPU, network, and memory footprint.
Skyfall - Features
Skyfall flisol-campinas-2013
● This can be attributed to:
– Multiplexing single-thread, fully asynchronous network
I/O and data processing model that eliminates memory
management, scheduling, and IPC inefficiencies present
in some multi-threaded clients.
– Advanced HTTP/1.1 features such as range requests,
content compression, and keep-alive connections, as
well as forced response size limiting, to keep network-
level overhead in check.
FeaturesSkyfall
● This can be attributed to:
– Smart response caching and advanced
server behavior heuristics are used to
minimize unnecessary traffic.
– Performance-oriented, pure C
implementation, including a custom HTTP
stack.
FeaturesSkyfall
● Ease of use: skyfall is highly adaptive and
reliable. The scanner features:
– Heuristic recognition of obscure path- and query-
based parameter handling Schemes.
– Graceful handling of multi-framework sites where
certain paths obey completely different semantics,
or are subject to different filtering rules.
FeaturesSkyfall
● Ease of use: skyfall is highly adaptive and
reliable. The scanner features:
– Automatic wordlist construction based on site
content analysis.
– Probabilistic scanning features to allow periodic,
time-bound assessments of arbitrarily complex
sites.
FeaturesSkyfall
● Well-designed security checks: the tool is
meant to provide accurate and meaningful
results:
– Handcrafted dictionaries offer excellent coverage
and permit thorough $keyword.$extension testing
in a reasonable timeframe.
– Three-step differential probes are preferred to
signature checks for detecting vulnerabilities.
FeaturesSkyfall
● Well-designed security checks: the tool is
meant to provide accurate and meaningful
results:
– Ratproxy-style logic is used to spot subtle security
problems:
– cross-site request forgery, cross-site script
inclusion, mixed content, issues MIME- and
charset mismatches, incorrect caching directives,
etc.
FeaturesSkyfall
● Well-designed security checks: the tool is
meant to provide accurate and meaningful
results:
– Bundled security checks are designed to handle
tricky scenarios:
● stored XSS (path, parameters, headers), blind SQL or
XML injection, or blind shell injection.
FeaturesSkyfall
● Well-designed security checks: the tool is
meant to provide accurate and meaningful
results:
– Snort style content signatures which will highlight
server errors, information leaks or potentially
dangerous web applications.
– Report post-processing drastically reduces the
noise caused by any remaining false positives or
server gimmicks by identifying repetitive
patterns.
FeaturesSkyfall
● What specific tests are implemented?
– High risk flaws (potentially leading to system
compromise):
● Server-side query injection (including blind vectors,
numerical parameters).
● Explicit SQL-like syntax in GET or POST parameters.
FeaturesSkyfall
● What specific tests are implemented?
– High risk flaws (potentially leading to system
compromise):
● Server-side shell command injection (including blind
vectors).
● Server-side XML / XPath injection (including blind
vectors).
FeaturesSkyfall
● What specific tests are implemented?
– High risk flaws (potentially leading to system
compromise):
● Format string vulnerabilities.
● Integer overflow vulnerabilities.
● Locations accepting HTTP PUT
FeaturesSkyfall
● What specific tests are implemented?
– Medium risk flaws (potentially leading to data
compromise):
● Stored and reflected XSS vectors in document body
(minimal JS XSS support).
● Stored and reflected XSS vectors via HTTP redirects.
● Stored and reflected XSS vectors via HTTP header
splitting.
FeaturesSkyfall
● What specific tests are implemented?
– Medium risk flaws (potentially leading to data
compromise):
● Directory traversal / LFI / RFI (including constrained
vectors).
● Assorted file POIs (server-side sources, configs, etc).
● Attacker-supplied script and CSS inclusion vectors
(stored and reflected).
FeaturesSkyfall
● What specific tests are implemented?
– Medium risk flaws (potentially leading to data
compromise):
● External untrusted script and CSS inclusion vectors.
● Mixed content problems on script and CSS resources
(optional).
● Password forms submitting from or to non-SSL pages
(optional).
FeaturesSkyfall
● What specific tests are implemented?
– Medium risk flaws (potentially leading to data
compromise):
● Incorrect or missing MIME types on renderables.
● Generic MIME types on renderables.
● Incorrect or missing charsets on renderables.
● Conflicting MIME / charset info on renderables.
● Bad caching directives on cookie setting responses.
FeaturesSkyfall
● What specific tests are implemented?
– Medium risk flaws (potentially leading to data
compromise):
● Incorrect or missing MIME types on renderables.
● Generic MIME types on renderables.
● Incorrect or missing charsets on renderables.
● Conflicting MIME / charset info on renderables.
● Bad caching directives on cookie setting responses.
FeaturesSkyfall
● What specific tests are implemented?
– Internal warnings:
● Failed resource fetch attempts.
● Exceeded crawl limits.
● Failed 404 behavior checks.
● IPS filtering detected.
● Unexpected response variations.
● Seemingly misclassified crawl nodes.
FeaturesSkyfall
● What specific tests are implemented?
– Non-specific informational entries:
● General SSL certificate information.
● Significantly changing HTTP cookies.
● Changing Server, Via, or X-... headers.
● New 404 signatures.
● Resources that cannot be accessed.
● Resources requiring HTTP authentication.
FeaturesSkyfall
● What specific tests are implemented?
– Non-specific informational entries:
● Broken links.
● Server errors.
● All external links not classified otherwise (optional).
● All external e-mails (optional).
● All external URL redirectors (optional).
● Links to unknown protocols.
FeaturesSkyfall
● What specific tests are implemented?
– Non-specific informational entries:
● Form fields that could not be autocompleted.
● Password entry forms (for external brute-force).
● File upload forms.
● Other HTML forms (not classified otherwise).
● Numerical file names (for external brute-force).
● User-supplied links otherwise rendered on a page.
FeaturesSkyfall
● What specific tests are implemented?
– Non-specific informational entries:
● Incorrect or missing MIME type on less significant content.
● Generic MIME type on less significant content.
● Incorrect or missing charset on less significant content.
● Conflicting MIME / charset information on less significant
content.
● OGNL-like parameter passing conventions..
FeaturesSkyfall
DEMOSkyfall
DEMO
DEMOSkyfall
OS = 31 Mb RAM + Skyfall = 1MB
DEMOSkyfall
OS = 31 Mb RAM + Skyfall = 1MB
● Database SQLite3 in memory
● Database SQLite3 in disk - HD
● GUI QT/Frontend Web (ligthing web server +
tags HTML)
● Reports Html, PDF(libharu), DOCX, XML
● + mime types
● MultiScanning URLs
● Scannig plugins joomla, wp, drupal
● Brute-force CAPTCHA
ToDOSkyfall
● skyfallsec
– https://bitbucket.org/skyfallsec
● skipfish
– http://code.google.com/p/skipfish/
● Gcc
– http://gcc.gnu.org/
● Clang
– http://clang.llvm.org/
● Archlinux
● https://www.archlinux.org/
ReferencesSkyfall
THANKS!
ReferencesSkyfall

More Related Content

PDF
PDF
API Upload Test
PDF
Introduction to Web Application Security - Blackhoodie US 2018
PDF
Cached and Confused: Web Cache Deception in the Wild
PDF
Large-Scale Analysis of Style Injection by Relative Path Overwrite
PDF
Dario Durando - IoT: Battle of Bots [rooted2018]
PDF
Carta de princípios - LIGA
PPT
Modelo de referência e método de avaliação para
API Upload Test
Introduction to Web Application Security - Blackhoodie US 2018
Cached and Confused: Web Cache Deception in the Wild
Large-Scale Analysis of Style Injection by Relative Path Overwrite
Dario Durando - IoT: Battle of Bots [rooted2018]
Carta de princípios - LIGA
Modelo de referência e método de avaliação para

Viewers also liked (6)

PPT
J E R U S A B U L L Y I N G
KEY
Twitter Streaming API
PDF
Site blindado - Como tornar loja virtual mais segura e vender mais
PDF
Skyfall b sides-c00-l-ed5-sp-2013
PDF
LAWDI - Rogue Linked Data
PPT
Nullcon 2011 RFID - NÂO ENVIADO AO EVENTO
J E R U S A B U L L Y I N G
Twitter Streaming API
Site blindado - Como tornar loja virtual mais segura e vender mais
Skyfall b sides-c00-l-ed5-sp-2013
LAWDI - Rogue Linked Data
Nullcon 2011 RFID - NÂO ENVIADO AO EVENTO
Ad

Similar to Skyfall flisol-campinas-2013 (20)

PDF
Black hat dc-2010-egypt-uav-slides
PPT
shostack-blackhat-991.ppt YUGUUYGYGUUYUHJ
PPTX
BSides_Charm2015_Info sec hunters_gathers
PDF
Unmanned Aerial Vehicles: Exploit Automation with the Metasploit Framework
PDF
Web Application Security Testing: Kali Linux Is the Way to Go
PDF
Web Application Security Testing: Kali Linux Is the Way to Go
PDF
Security in CI/CD Pipelines: Tips for DevOps Engineers
PDF
DDD17 - Web Applications Automated Security Testing in a Continuous Delivery...
PPT
Beyond Automated Testing - RVAsec 2016
PDF
Using Guided Missiles in Drive-bys: Automatic Browser Fingerprinting and Expl...
PPTX
Web application vulnerability assessment
DOC
W3af
PPTX
Introduction to penetration testing
PPT
Andrew and Zac RVA-Beyond-Automated-Testing-2016.ppt
PDF
Web Application Security: Introduction to common classes of security flaws an...
PDF
Tw noche geek quito webappsec
PDF
Ethical hacking with Python tools
PDF
Cyber Crime / Cyber Secuity Testing Architecture by MRITYUNJAYA HIKKALGUTTI (...
Black hat dc-2010-egypt-uav-slides
shostack-blackhat-991.ppt YUGUUYGYGUUYUHJ
BSides_Charm2015_Info sec hunters_gathers
Unmanned Aerial Vehicles: Exploit Automation with the Metasploit Framework
Web Application Security Testing: Kali Linux Is the Way to Go
Web Application Security Testing: Kali Linux Is the Way to Go
Security in CI/CD Pipelines: Tips for DevOps Engineers
DDD17 - Web Applications Automated Security Testing in a Continuous Delivery...
Beyond Automated Testing - RVAsec 2016
Using Guided Missiles in Drive-bys: Automatic Browser Fingerprinting and Expl...
Web application vulnerability assessment
W3af
Introduction to penetration testing
Andrew and Zac RVA-Beyond-Automated-Testing-2016.ppt
Web Application Security: Introduction to common classes of security flaws an...
Tw noche geek quito webappsec
Ethical hacking with Python tools
Cyber Crime / Cyber Secuity Testing Architecture by MRITYUNJAYA HIKKALGUTTI (...
Ad

More from Mauro Risonho de Paula Assumpcao (20)

PDF
Árvores de decisão no FreeBSD com R - PagSeguro
PDF
BSDDAY 2019 - Data Science e Artificial Intelligence usando Freebsd
PDF
Tendências, Tecnicas e soluções no combate aos ataques de APTs e AVTs
ODP
Owasp IoT top 10 + IoTGOAT Cyber Security Meeting Brazil 3rd 2015
ODP
2015 mindthesec mauro risonho de paula assumpcao rev01 firebits
PDF
OpenVAS - Scanner em Vulnerabilidades Open Source (fork Nessus GPL2)
ODP
Owasp owtf the offensive (web) testing framework + ptes penetration testing e...
PPT
UNICAMP-DevCamp-2014-OpenVAS-ICTS-PROTIVIT-firebits-rev01
ODP
2013 - 4 Google Open Source Jam
PPT
Nessus Scanner Vulnerabilidades
PPT
OWASP AppSec 2010 BRAZIL Information Extraction Art of Testing Network Periph...
PPT
Nullcon 2011 RFID - NÂO ENVIADO AO EVENTO
PPT
Oficina de Análise em Vulnerabilidades - Openvas4 - GaroaHC
PPT
3 google open souce jam- a - hardening
PDF
Backtrack 4 rc1 fatec mogi-mirim
PDF
Backtrack 4 Rc1 Volcon2
PDF
PDF
PDF
Palestras Como Ele Achou Estas Falhas V.1.0
Árvores de decisão no FreeBSD com R - PagSeguro
BSDDAY 2019 - Data Science e Artificial Intelligence usando Freebsd
Tendências, Tecnicas e soluções no combate aos ataques de APTs e AVTs
Owasp IoT top 10 + IoTGOAT Cyber Security Meeting Brazil 3rd 2015
2015 mindthesec mauro risonho de paula assumpcao rev01 firebits
OpenVAS - Scanner em Vulnerabilidades Open Source (fork Nessus GPL2)
Owasp owtf the offensive (web) testing framework + ptes penetration testing e...
UNICAMP-DevCamp-2014-OpenVAS-ICTS-PROTIVIT-firebits-rev01
2013 - 4 Google Open Source Jam
Nessus Scanner Vulnerabilidades
OWASP AppSec 2010 BRAZIL Information Extraction Art of Testing Network Periph...
Nullcon 2011 RFID - NÂO ENVIADO AO EVENTO
Oficina de Análise em Vulnerabilidades - Openvas4 - GaroaHC
3 google open souce jam- a - hardening
Backtrack 4 rc1 fatec mogi-mirim
Backtrack 4 Rc1 Volcon2
Palestras Como Ele Achou Estas Falhas V.1.0

Recently uploaded (20)

PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PDF
Hybrid model detection and classification of lung cancer
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PPTX
Chapter 5: Probability Theory and Statistics
PDF
1 - Historical Antecedents, Social Consideration.pdf
PPTX
cloud_computing_Infrastucture_as_cloud_p
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
PPTX
OMC Textile Division Presentation 2021.pptx
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Zenith AI: Advanced Artificial Intelligence
PPTX
TLE Review Electricity (Electricity).pptx
PDF
Encapsulation theory and applications.pdf
PDF
Web App vs Mobile App What Should You Build First.pdf
PDF
Enhancing emotion recognition model for a student engagement use case through...
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
Univ-Connecticut-ChatGPT-Presentaion.pdf
Hybrid model detection and classification of lung cancer
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
Chapter 5: Probability Theory and Statistics
1 - Historical Antecedents, Social Consideration.pdf
cloud_computing_Infrastucture_as_cloud_p
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
OMC Textile Division Presentation 2021.pptx
Digital-Transformation-Roadmap-for-Companies.pptx
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Zenith AI: Advanced Artificial Intelligence
TLE Review Electricity (Electricity).pptx
Encapsulation theory and applications.pdf
Web App vs Mobile App What Should You Build First.pdf
Enhancing emotion recognition model for a student engagement use case through...
gpt5_lecture_notes_comprehensive_20250812015547.pdf
Programs and apps: productivity, graphics, security and other tools
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf

Skyfall flisol-campinas-2013

  • 1. Skyfall scanner de vulnerabilidades em web applications fork skipfish Mauro Risonho de Paula Assumpção firebits mauro.risonho@gmail.com http://www.linkedin.com/profile/view?id=35593661&trk=tab_pro
  • 2. ● Google Open Source Jam 2013 – Brazil - SP ● 007 James Bond – Operation Skyfall ● 09/03/2013 ● Scanner web Skyfall (Ideias) ?
  • 4. Skyfall – on demand Skyfall01 32Ram (www.example.com) Skyfall02 32Ram (www.tes1.com) Skyfall023 32Ram (www.ext2.com) frontend 32Ram (www.example.com) (www.tes1.com) (www.ext2.com) Skyfall02 32Ram (www.tes1.com) Skyfall02 32Ram (www.tes1.com) Skyfall02 32Ram (www.tes1.com) REPORTS OFF ON ON DATABASE ->SSH
  • 5. ● High performance: – 500+ requests per second against responsive Internet targets – 2000+ requests per second on LAN / MAN networks – 7000+ requests against local instances have been observed, with a very modest CPU, network, and memory footprint. Skyfall - Features
  • 7. ● This can be attributed to: – Multiplexing single-thread, fully asynchronous network I/O and data processing model that eliminates memory management, scheduling, and IPC inefficiencies present in some multi-threaded clients. – Advanced HTTP/1.1 features such as range requests, content compression, and keep-alive connections, as well as forced response size limiting, to keep network- level overhead in check. FeaturesSkyfall
  • 8. ● This can be attributed to: – Smart response caching and advanced server behavior heuristics are used to minimize unnecessary traffic. – Performance-oriented, pure C implementation, including a custom HTTP stack. FeaturesSkyfall
  • 9. ● Ease of use: skyfall is highly adaptive and reliable. The scanner features: – Heuristic recognition of obscure path- and query- based parameter handling Schemes. – Graceful handling of multi-framework sites where certain paths obey completely different semantics, or are subject to different filtering rules. FeaturesSkyfall
  • 10. ● Ease of use: skyfall is highly adaptive and reliable. The scanner features: – Automatic wordlist construction based on site content analysis. – Probabilistic scanning features to allow periodic, time-bound assessments of arbitrarily complex sites. FeaturesSkyfall
  • 11. ● Well-designed security checks: the tool is meant to provide accurate and meaningful results: – Handcrafted dictionaries offer excellent coverage and permit thorough $keyword.$extension testing in a reasonable timeframe. – Three-step differential probes are preferred to signature checks for detecting vulnerabilities. FeaturesSkyfall
  • 12. ● Well-designed security checks: the tool is meant to provide accurate and meaningful results: – Ratproxy-style logic is used to spot subtle security problems: – cross-site request forgery, cross-site script inclusion, mixed content, issues MIME- and charset mismatches, incorrect caching directives, etc. FeaturesSkyfall
  • 13. ● Well-designed security checks: the tool is meant to provide accurate and meaningful results: – Bundled security checks are designed to handle tricky scenarios: ● stored XSS (path, parameters, headers), blind SQL or XML injection, or blind shell injection. FeaturesSkyfall
  • 14. ● Well-designed security checks: the tool is meant to provide accurate and meaningful results: – Snort style content signatures which will highlight server errors, information leaks or potentially dangerous web applications. – Report post-processing drastically reduces the noise caused by any remaining false positives or server gimmicks by identifying repetitive patterns. FeaturesSkyfall
  • 15. ● What specific tests are implemented? – High risk flaws (potentially leading to system compromise): ● Server-side query injection (including blind vectors, numerical parameters). ● Explicit SQL-like syntax in GET or POST parameters. FeaturesSkyfall
  • 16. ● What specific tests are implemented? – High risk flaws (potentially leading to system compromise): ● Server-side shell command injection (including blind vectors). ● Server-side XML / XPath injection (including blind vectors). FeaturesSkyfall
  • 17. ● What specific tests are implemented? – High risk flaws (potentially leading to system compromise): ● Format string vulnerabilities. ● Integer overflow vulnerabilities. ● Locations accepting HTTP PUT FeaturesSkyfall
  • 18. ● What specific tests are implemented? – Medium risk flaws (potentially leading to data compromise): ● Stored and reflected XSS vectors in document body (minimal JS XSS support). ● Stored and reflected XSS vectors via HTTP redirects. ● Stored and reflected XSS vectors via HTTP header splitting. FeaturesSkyfall
  • 19. ● What specific tests are implemented? – Medium risk flaws (potentially leading to data compromise): ● Directory traversal / LFI / RFI (including constrained vectors). ● Assorted file POIs (server-side sources, configs, etc). ● Attacker-supplied script and CSS inclusion vectors (stored and reflected). FeaturesSkyfall
  • 20. ● What specific tests are implemented? – Medium risk flaws (potentially leading to data compromise): ● External untrusted script and CSS inclusion vectors. ● Mixed content problems on script and CSS resources (optional). ● Password forms submitting from or to non-SSL pages (optional). FeaturesSkyfall
  • 21. ● What specific tests are implemented? – Medium risk flaws (potentially leading to data compromise): ● Incorrect or missing MIME types on renderables. ● Generic MIME types on renderables. ● Incorrect or missing charsets on renderables. ● Conflicting MIME / charset info on renderables. ● Bad caching directives on cookie setting responses. FeaturesSkyfall
  • 22. ● What specific tests are implemented? – Medium risk flaws (potentially leading to data compromise): ● Incorrect or missing MIME types on renderables. ● Generic MIME types on renderables. ● Incorrect or missing charsets on renderables. ● Conflicting MIME / charset info on renderables. ● Bad caching directives on cookie setting responses. FeaturesSkyfall
  • 23. ● What specific tests are implemented? – Internal warnings: ● Failed resource fetch attempts. ● Exceeded crawl limits. ● Failed 404 behavior checks. ● IPS filtering detected. ● Unexpected response variations. ● Seemingly misclassified crawl nodes. FeaturesSkyfall
  • 24. ● What specific tests are implemented? – Non-specific informational entries: ● General SSL certificate information. ● Significantly changing HTTP cookies. ● Changing Server, Via, or X-... headers. ● New 404 signatures. ● Resources that cannot be accessed. ● Resources requiring HTTP authentication. FeaturesSkyfall
  • 25. ● What specific tests are implemented? – Non-specific informational entries: ● Broken links. ● Server errors. ● All external links not classified otherwise (optional). ● All external e-mails (optional). ● All external URL redirectors (optional). ● Links to unknown protocols. FeaturesSkyfall
  • 26. ● What specific tests are implemented? – Non-specific informational entries: ● Form fields that could not be autocompleted. ● Password entry forms (for external brute-force). ● File upload forms. ● Other HTML forms (not classified otherwise). ● Numerical file names (for external brute-force). ● User-supplied links otherwise rendered on a page. FeaturesSkyfall
  • 27. ● What specific tests are implemented? – Non-specific informational entries: ● Incorrect or missing MIME type on less significant content. ● Generic MIME type on less significant content. ● Incorrect or missing charset on less significant content. ● Conflicting MIME / charset information on less significant content. ● OGNL-like parameter passing conventions.. FeaturesSkyfall
  • 29. DEMOSkyfall OS = 31 Mb RAM + Skyfall = 1MB
  • 30. DEMOSkyfall OS = 31 Mb RAM + Skyfall = 1MB
  • 31. ● Database SQLite3 in memory ● Database SQLite3 in disk - HD ● GUI QT/Frontend Web (ligthing web server + tags HTML) ● Reports Html, PDF(libharu), DOCX, XML ● + mime types ● MultiScanning URLs ● Scannig plugins joomla, wp, drupal ● Brute-force CAPTCHA ToDOSkyfall
  • 32. ● skyfallsec – https://bitbucket.org/skyfallsec ● skipfish – http://code.google.com/p/skipfish/ ● Gcc – http://gcc.gnu.org/ ● Clang – http://clang.llvm.org/ ● Archlinux ● https://www.archlinux.org/ ReferencesSkyfall