8000 GitHub - ErdemOzgen/blackdagger-github-infra: Github Action Infra for Red Teaming Activities
[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to content

ErdemOzgen/blackdagger-github-infra

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

16 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Blackdagger GitHub Infra

github-infra-logo blackdagger-logo

Introduction

Blackdagger GitHub Infra revolutionizes DAST (Dynamic Application Security Testing) by leveraging GitHub Actions runners for enhanced operational security. This guide will walk you through setting up and using the system for your security testing needs.

Why Use GitHub Runners for DAST?

  • Enhanced OPSEC: Perform scans from GitHub's trusted infrastructure
  • Avoid Detection: Reduce likelihood of detection by web defenses
  • Bypass IP Blocking: Get around IP-based blocking mechanisms
  • Stealthy Operations: Conduct security testing with minimal digital footprint

Blackdagger: Cyber Workflow Automation Framework

Blackdagger is a single binary tool that is capable of managing and automating complex workflows for various purposes. To improve the experience of users while using Blackdagger, various repositories that contains tested YAML files for complex workflows, easy-to-setup infrastructure for CART and DevSecOps purposes are suggested by the team. With major additions to these repositories, everything that makes Blackdagger better is collected under a framework called Blackdagger: Cyber Workflow Automation Framework.

The framework consist of 5 components:

  • Blackdagger: Core of the framework for orchestrating the components and workflows
  • Blackcart: A specialized Docker container optimized for Continuous Automated Red Teaming (CART) and DevSecOps pipeline tasks.
  • Blackdagger YAMLs: Pre-tested example workflows, demonstrating real-world DevSecOps and CART use-cases, facilitating quick adoption and adaptation.
  • Blackdagger Github Infra (this repository): A suite of advanced workflows utilizing GitHub Actions infrastructure for enhanced defense evasion techniques, scalability, and performance.
  • Blackdagger Web Kit: A browser extension integrating all core functionalities, enabling direct interaction and execution of Blackdagger workflows from within the browser.

framework-diagram

Each component is compatible with each other to run on any environment, for any case and as easy, fast and effective as possible. The framework also enables adding, removing or modifying components to add extra features for new purposes.

Setup Instructions

Step 1: Fork the Repository

  1. Visit the blackdagger-github-infra GitHub repository
  2. Click the "Fork" button in the upper right corner
  3. Wait for the repository to be forked to your account
  4. After the repository is forked, go to "Actions" tab and enable workflows

Step 2: Generate a GitHub Personal Access Token

  1. Go to your GitHub account settings
  2. Navigate to Developer Settings > Personal Access Tokens > Tokens (classic)
  3. Click "Generate new token"
  4. Select the following permissions:
    • repo (Full control of private repositories)
    • workflow (Update GitHub Action workflows)
  5. Set an expiration date as needed
  6. Click "Generate token"
  7. Copy the token immediately (you won't be able to see it again)

Step 3: Configure Blackdagger Web Kit

  1. Install the Blackdagger Web Kit extension in your browser
  2. Open the Web Kit interface
  3. Navigate to the DAST settings section
  4. Fill in the required fields:
    • Username: Your GitHub username
    • Repository Name: Your forked repository name (typically "blackdagger-github-infra")
    • GitHub Token: Paste the personal access token you generated

Blackdagger Web Kit Interface

Screenshot of the Blackdagger Web Kit (BWK) interface that allows users to execute attack YAMLs through GitHub. This web interface enables security professionals to configure and launch security tests directly from the browser while utilizing GitHub's runners in the background.

Step 4: Launch Security Tests

  1. From the Blackdagger Web Kit interface, browse available YAML configurations:
    • Subdomain enumeration tools (subfinder, assetfinder)
    • Web scanning tools (httpx, nuclei, ffuf)
    • API scanning tools (zap-api-scanner)
    • And more!
  2. Select the desired YAML configuration for your testing needs
  3. Configure target parameters as required
  4. Click "Launch" to begin your security test

Attack Initiation Screen

Image showing the attack initiation screen, which confirms that a security test has been successfully launched. This interface provides confirmation that the Blackdagger system is now executing the configured test through GitHub's infrastructure.

Available YAML Configurations

The repository includes numerous pre-configured YAML files for different security testing scenarios:

Tool Description File
AMAS Asset Management and Analysis amas.yaml
Assetfinder Subdomain discovery assetfinder.yaml
BBOT Security reconnaissance bbot.yaml
Certgrabber Certificate enumeration certgrabber.yaml
FFUF Web fuzzing ffuf.yaml
GAU URL discovery gau.yaml
HTTP Request Basic HTTP testing httprequest.yml
HTTPX HTTP probe httpx.yaml
IIS Scanner IIS server scanning iis-scanner.yaml
Java IIS Java application scanning java-iis.yaml
Nuclei Vulnerability scanner nuclei-scan.yml
Nuclei v2 Enhanced vulnerability scanner nuclei-scanV2.yml
Subfinder Subdomain discovery subfinder.yaml
ZAP API Scanner API security scanning zap-api-scanner.yaml
ZAP Web application scanning zap.yaml

Monitoring Your Scans

  1. Once a scan is launched, you can monitor its progress:
    • Through the Blackdagger Web Kit interface
    • Via GitHub Actions in your forked repository
  2. Results will be available once the workflow completes

Architecture Overview

Architecture Diagram

Blackdagger integrates with GitHub infrastructure to perform security testing and enumeration. This architecture enables attacks and reconnaissance to be executed through GitHub runners, providing enhanced operational security by leveraging GitHub's trusted infrastructure.

Additional Resources

Troubleshooting

If you encounter issues:

  1. Verify your GitHub token has the correct permissions
  2. Ensure your forked repository is properly configured
  3. Check GitHub Actions logs for detailed error information
  4. Make sure the Web Kit extension is properly installed and configured

Security Considerations

Remember to use these tools responsibly and ethically. Always ensure you have proper authorization before performing security testing against any system or application.

About

Github Action Infra for Red Teaming Activities

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Contributors 2

  •  
  •  
0