GithubHelp home page GithubHelp logo

iqtlabs / daedalus Goto Github PK

View Code? Open in Web Editor NEW
39.0 5.0 12.0 2.24 MB

Exploring various defensive response options for effectively securing a 5G core-network

License: Apache License 2.0

JavaScript 0.17% Python 35.58% Dockerfile 15.16% Shell 45.22% C 3.86%
5g defense sdr security attack open5gs ueransim srsran limesdr bladerf

daedalus's Introduction

Daedalus

NOTE: Ubuntu 22.04 compatibility

Daedalus uses Dovesnap, which currently requires iptables-legeacy.

Please run:

sudo update-alternatives --set iptables /usr/sbin/iptables-legacy && sudo nft flush ruleset

And then reboot, before installing Daedalus.

Background

A 5G core network can experience attacks from the radio (RAN) and the Data-Network side of the architecture. In most cases, the defense strategy for a 5G core-network is similar to that of securing an enterprise network. However, there are subtle differences between a 5G and an enterprise network that make the defenses different for each.

This project explores mechanisms to make informed decisions from a variety of response options that can be used to mitigate attack effectiveness by steering malicious actors to domains that the defender can better control for securing a 5G core-network.

We have developed a set of attack classes and defense responses designed to achieve various outcomes in the way that the attacker exploits the network. These scenarios are listed in the matrix below.

We have identified five key modes of attack. They are

  • reconaissance and discovery: gaining knowledge about a network
  • theft and exfiltration: unauthorized removal data/information
  • access and privilege escalation: gaining unauthorized access to the network
  • destruction: destruction of data, information or anything needed for the network to function
  • denial and disruption: preventing or degrading services and access to the network by authorized users

Alternatetively, each of these attack modes can be countered with one of the following defenese responses:

  • none: do nothing
  • denial and fire-walling: denying/blocking network access to the attacker
  • deception: trick the attacker to steal information of little to no value
  • degradation: reduce the attackers effectiveness by breaking up data so it is not available all in one place
  • quarantine and isolation: contain the attack to a portion of the network that is easier to defend or has little value
  • throttling: significantly increase the amount of time the attacker needs to achieve objectives

We use the Red-Team/Blue-Team approach where the red-team serves as the attacker and the blue-team as the defender. The red-team has minimal knowledge of blue-team defenses as it develops an attack strategy. The blue-team is passive in the attack exercises, only recording what is needed to reproduce the scenario. The goal is not to necessarily develop new exploits, but rather to use known exploits, tools and techniques to navigate the attack surface.

Setting up the scenarios for the defender can be tedious and time expensive. That's why we've created a tool to make it easy to build and tear down 4G/5G environments both through virtual simulation and with real hardware options using a variety of supported SDRs. Learn more about getting started with the tool here.

Use cases

daedalus's People

Contributors

anarkiwi avatar cglewis avatar emmair avatar rashley-iqt avatar renovate-bot avatar renovate[bot] avatar

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar  avatar  avatar  avatar  avatar

daedalus's Issues

How to get started

I attended your talk at Defcon and wanted to try this.
I were hoping to just download some dockers and start the 5g but it turned out to be much harder. I never got it to work.

Could you update your guide to help getting started ?

I run Kali and have both a vmware, virtualbox and docker + BladeRF x40 would that be possible to get up and running with this ?

Dependency Dashboard

This issue lists Renovate updates and detected dependencies. Read the Dependency Dashboard docs to learn more.

Open

These updates have all been created already. Click a checkbox below to force a retry/rebase of any.

Ignored or Blocked

These are blocked by an existing closed PR and will not be recreated unless you click a checkbox below.

Detected dependencies

docker-compose
environments/scenario1/host2/tomcat_vuln_server/docker-compose.yml
environments/scenario1/host3/desktop/docker-compose.yml
environments/scenario2/docker-compose-5g-nsa-cpn.yml
environments/scenario2/docker-compose-5g-nsa-rfn-ue.yml
environments/scenario2/docker-compose-5g-nsa-upn-bladerf-enb.yml
environments/scenario2/docker-compose-5g-nsa-upn-enb.yml
environments/scenario2/docker-compose-5g-nsa-upn-ettus-enb.yml
environments/scenario2/docker-compose-5g-nsa-upn.yml
environments/scenario2/docker-compose-5g-nsa.yml
environments/scenario2/host2/docker-compose-5g-nsa-cpn.yml
environments/scenario2/host2/docker-compose-5g-nsa-upn.yml
environments/scenario2/host2/docker-compose-5g-nsa.yml
environments/scenario2/host2/docker-compose-desktops.yml
environments/scenario2/host3/dba/docker-compose.yml
environments/scenario2/host3/desktop/docker-compose.yml
environments/scenario2/host3/docker-compose-5g-nsa-cpn.yml
environments/scenario2/host3/docker-compose-5g-nsa-upn.yml
environments/scenario2/host3/docker-compose-5g-nsa.yml
environments/scenario2/host3/docker-compose-desktops.yml
dockerfile
blue/5G/daedalus/5G/UERANSIM/Dockerfile
  • ubuntu 22.04
  • ubuntu 22.04
blue/5G/daedalus/5G/open5gs/Dockerfile
  • ubuntu 22.04
  • ubuntu 22.04
blue/5G/daedalus/5G/srsRAN/Dockerfile
  • ubuntu 22.04
  • ubuntu 22.04
  • ubuntu 22.04
  • ubuntu 22.04
blue/nfsconfuser/Dockerfile
  • debian stable
environments/scenario1/host2/httpd_server/Dockerfile
environments/scenario1/host2/nfs_server/Dockerfile
environments/scenario1/host2/nfs_server_extra/Dockerfile
environments/scenario1/host2/ssh_server/Dockerfile
environments/scenario1/host2/ssh_server2/Dockerfile
environments/scenario1/host2/tomcat_server_extra/Dockerfile
  • vulhub/tomcat 9.0
environments/scenario1/host2/tomcat_vuln_server/Dockerfile
  • vulhub/tomcat 8.0
environments/scenario2/Dockerfile
  • ubuntu 20.04
environments/scenario2/host2/Dockerfile
  • ubuntu 20.04
environments/scenario2/host2/mongoloader/Dockerfile
  • vulhub/libssh 0.8.1
environments/scenario2/host2/srsLTE/Dockerfile
  • ubuntu 18.04
environments/scenario2/host2/srsLTE/Dockerfile.bladeRF
  • ubuntu 20.04
environments/scenario2/host3/Dockerfile
  • ubuntu 20.04
environments/scenario2/host3/dba/Dockerfile
environments/scenario2/host3/mongoloader/Dockerfile
  • vulhub/libssh 0.8.1
environments/scenario2/host3/srsLTE/Dockerfile
  • ubuntu 20.04
environments/scenario2/host3/srsLTE/Dockerfile.bladeRF
  • ubuntu 20.04
environments/scenario2/srsLTE/Dockerfile
  • ubuntu 20.04
github-actions
.github/workflows/docker-open5gs.yaml
  • actions/checkout v4@b4ffde65f46336ab88eb53be808477a3936bae11
  • docker/setup-qemu-action v3
  • docker/setup-buildx-action v3
  • docker/build-push-action v5
.github/workflows/docker-srsran.yaml
  • actions/checkout v4@b4ffde65f46336ab88eb53be808477a3936bae11
  • docker/setup-qemu-action v3
  • docker/setup-buildx-action v3
  • docker/build-push-action v5
.github/workflows/docker-ueransim.yaml
  • actions/checkout v4@b4ffde65f46336ab88eb53be808477a3936bae11
  • docker/setup-qemu-action v3
  • docker/setup-buildx-action v3
  • docker/build-push-action v5
.github/workflows/pypi.yaml
  • actions/checkout v4@b4ffde65f46336ab88eb53be808477a3936bae11
.github/workflows/secrets-scan.yml
  • actions/checkout v4@b4ffde65f46336ab88eb53be808477a3936bae11
  • actions/github-script v7
  • actions/upload-artifact v4.3.1
.github/workflows/stale.yml
  • actions/stale v9
.github/workflows/test.yaml
  • actions/checkout v4@b4ffde65f46336ab88eb53be808477a3936bae11
  • codecov/codecov-action v4.3.0
  • actions/checkout v4@b4ffde65f46336ab88eb53be808477a3936bae11
  • actions/checkout v4@b4ffde65f46336ab88eb53be808477a3936bae11
  • actions/checkout v4@b4ffde65f46336ab88eb53be808477a3936bae11
  • ubuntu 22.04
  • ubuntu 22.04
  • ubuntu 22.04
  • ubuntu 22.04
pep621
blue/pyproject.toml
  • docker ==7.0.0
  • dovesnap ==1.1.23
  • plumbum ==1.8.2
  • inquirer ==3.2.4
  • test/attrs ==23.2.0
  • test/codecov ==2.1.13
  • test/pylint ==3.1.0
  • test/pytype ==2024.3.19
  • test/pytest ==8.1.1
  • test/pytest-cov ==5.0.0
  • test/ruamel.yaml ~=0.17
  • setuptools >= 62.0.0
pip_requirements
blue/generate_fs/requirements.txt
blue/nfsconfuser/confused/requirements.txt

  • Check this box to trigger a request for Renovate to run again on this repository

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    ๐Ÿ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. ๐Ÿ“Š๐Ÿ“ˆ๐ŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google โค๏ธ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.