Compare commits

...

21 Commits

Author SHA1 Message Date
Jerry Jacobs ee933011a0 Obfuscate without PDB is not possible with Alcatraz 2024-07-26 15:58:46 +02:00
Jerry Jacobs 91eb2a1313 Don't strip windows build or else pdb is not linked 2024-07-26 15:51:40 +02:00
Jerry Jacobs 2c2120080c use some powershell magic to create dist on windows 2024-07-26 15:48:05 +02:00
Jerry Jacobs 34a9e38ff9 Common windows 2024-07-26 15:34:18 +02:00
Jerry Jacobs 841ae3164e Common windows 2024-07-26 15:29:28 +02:00
Jerry Jacobs a80cd9254a Common windows 2024-07-26 15:23:51 +02:00
Jerry Jacobs 2f9cb8626e Attempt to list files again, windows... 2024-07-26 15:13:02 +02:00
Jerry Jacobs 3413da32a2 Attempt to list files again, windows... 2024-07-26 15:08:24 +02:00
Jerry Jacobs 6c106f90fb Fix CI artifact naming and dependency 2024-07-26 15:04:56 +02:00
Jerry Jacobs 3e67850957 Depend obfuscate job on outputs of others 2024-07-26 15:01:10 +02:00
Jerry Jacobs 2cbcf2ffde Github repository url may only be a github repo 2024-07-26 14:49:54 +02:00
Jerry Jacobs 77e402ef32 Use windows-latest runner 2024-07-26 14:48:51 +02:00
Jerry Jacobs c16c73ca10 Fetch weak1337/Alcatraz 2024-07-26 14:38:23 +02:00
Jerry Jacobs 1b2e744f08 Create initial python dll loader 2024-07-26 14:12:03 +02:00
Jerry Jacobs b17edfbb5c Workflow release dll incorrect order 2024-07-26 14:07:06 +02:00
Jerry Jacobs 3509437659 For DLL build we also need the ssh private key 2024-07-26 14:03:03 +02:00
Jerry Jacobs 46794da553 Goreleaser build local snapshot 2024-07-26 14:01:11 +02:00
Jerry Jacobs 72fcca386b Fix syntax in github workflow 2024-07-26 13:59:43 +02:00
Jerry Jacobs 579bc4bb84 Add DLL target for windows loading in Python 2024-07-26 13:56:53 +02:00
Jerry Jacobs c27c76c644 Add some background information in the README.md 2024-07-26 10:56:58 +02:00
Jerry Jacobs db1d1443cf Initial release production build with github actions for Darwin AMD64 and Windows AMD64 2024-07-26 08:57:53 +02:00
9 changed files with 296 additions and 32 deletions

View File

@ -1,5 +1,4 @@
name: GitHub Actions Demo name: Build go-socks5-ssh-proxy
run-name: ${{ github.actor }} is testing out GitHub Actions 🚀
on: on:
pull_request: pull_request:
@ -13,28 +12,91 @@ env:
# The go version to use for builds. We set check-latest to true when # The go version to use for builds. We set check-latest to true when
# installing, so we get the latest patch version that matches the # installing, so we get the latest patch version that matches the
# expression. # expression.
GO_VERSION: "~1.22.3" GO_VERSION: "~1.22.5"
jobs: jobs:
Explore-GitHub-Actions: release:
name: Build release
environment: prod
runs-on: ubuntu-latest runs-on: ubuntu-latest
steps: steps:
- run: echo "🎉 The job was automatically triggered by a ${{ github.event_name }} event."
- run: echo "🐧 This job is now running on a ${{ runner.os }} server hosted by GitHub!"
- run: echo "🔎 The name of your branch is ${{ github.ref }} and your repository is ${{ github.repository }}."
- name: Check out repository code - name: Check out repository code
uses: actions/checkout@v4 uses: actions/checkout@v4
- uses: actions/setup-go@v5 - uses: actions/setup-go@v5
with: with:
go-version: ${{ env.GO_VERSION }} go-version: ${{ env.GO_VERSION }}
cache: true cache: true
check-latest: true check-latest: true
- run: echo "💡 The ${{ github.repository }} repository has been cloned to the runner."
- run: echo "🖥️ The workflow is now ready to test your code on the runner." - name: Use config_release.go from action secrets
- name: List files in the repository uses: mobiledevops/secret-to-file-action@v1 # TODO native in Makefile, can be unsafe...
run: | with:
ls ${{ github.workspace }} base64-encoded-secret: ${{ secrets.CONFIG_RELEASE_GO_FILE }}
- run: echo "🍏 This job's status is ${{ job.status }}." filename: "config_release.go"
- run: make ci
- name: Use resources/ssh_private_key from action secrets
uses: mobiledevops/secret-to-file-action@v1 # TODO native in Makefile, can be unsafe...
with:
base64-encoded-secret: ${{ secrets.RESOURCES_SSH_PRIVATE_KEY }}
filename: "ssh_private_key"
working-directory: "./resources"
- run: make release
- name: Store release artifacts
uses: actions/upload-artifact@v4
with:
name: dist-release
path: |
dist
release-dll:
name: Build release DLL
environment: prod
runs-on: ubuntu-latest
steps:
- name: Check out repository code
uses: actions/checkout@v4
- uses: actions/setup-go@v5
with:
go-version: ${{ env.GO_VERSION }}
cache: true
check-latest: true
- name: Set up MinGW
uses: egor-tensin/setup-mingw@v2
with:
platform: x64
- name: Use config_release.go from action secrets
uses: mobiledevops/secret-to-file-action@v1 # TODO native in Makefile, can be unsafe...
with:
base64-encoded-secret: ${{ secrets.CONFIG_RELEASE_GO_FILE }}
filename: "config_release.go"
- name: Use resources/ssh_private_key from action secrets
uses: mobiledevops/secret-to-file-action@v1 # TODO native in Makefile, can be unsafe...
with:
base64-encoded-secret: ${{ secrets.RESOURCES_SSH_PRIVATE_KEY }}
filename: "ssh_private_key"
working-directory: "./resources"
- name: Run GoReleaser to build release DLL
uses: goreleaser/goreleaser-action@v6
with:
# either 'goreleaser' (default) or 'goreleaser-pro'
distribution: goreleaser
# 'latest', 'nightly', or a semver
version: '~> v2'
args: release --clean --snapshot
env: env:
CONFIG_RELEASE_GO_FILE: ${{ secrets.CONFIG_RELEASE_GO_FILE }} GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }}
- name: Store release artifacts
uses: actions/upload-artifact@v4
with:
name: dist-release-dll
path: |
dist

View File

@ -0,0 +1,58 @@
release-obfuscate:
name: Build release obfuscated
runs-on: windows-latest
needs:
- release
- release-dll
steps:
- name: Check out Alcatraz
uses: actions/checkout@v4
with:
repository: 'weak1337/Alcatraz'
- name: Download release artifacts
uses: actions/download-artifact@v4
with:
name: dist-release
- name: Download release-dll artifacts
uses: actions/download-artifact@v4
with:
name: dist-release-dll
- name: Dir
run: "Get-ChildItem -Path . -Force -Recurse"
- name: Run Alcatraz-con.exe on release EXE
run: "./x64/Release/Alcatraz-con.exe socks5-ssh-proxy.exe"
- name: Run Alcatraz-con.exe on release DLL
run: "./x64/Release/Alcatraz-con.exe dll_windows_amd64_v1/go-socks5-ssh-proxy.dll"
- name: Create dist directory and move obfuscated artifacts
run: |
# Define source files and destination directory
$sourceFiles = @("socks5-ssh-proxy.exe", "dll_windows_amd64_v1/go-socks5-ssh-proxy.dll")
$destinationDir = "dist"
# Create the destination directory if it doesn't exist
if (-not (Test-Path -Path $destinationDir)) {
New-Item -ItemType Directory -Path $destinationDir
}
# Move each file to the destination directory
foreach ($file in $sourceFiles) {
if (Test-Path -Path $file) {
Move-Item -Path $file -Destination $destinationDir
Write-Output "Moved $file to $destinationDir"
} else {
Write-Output "File $file does not exist"
}
}
- name: Store release artifacts
uses: actions/upload-artifact@v4
with:
name: dist-release-obfuscated
path: |
dist

6
.gitignore vendored
View File

@ -1,7 +1,11 @@
.DS_Store .DS_Store
socks5-ssh-proxy socks5-ssh-proxy
resources/ssh_* resources/ssh_*
config_release.go config_release*.go
config_template_*.go
socks5-ssh-proxy.release socks5-ssh-proxy.release
*.base64
*.exe *.exe
*.zip *.zip
dist/

55
.goreleaser.yaml Normal file
View File

@ -0,0 +1,55 @@
# This is an example .goreleaser.yml file with some sensible defaults.
# Make sure to check the documentation at https://goreleaser.com
# The lines below are called `modelines`. See `:help modeline`
# Feel free to remove those if you don't want/need to use them.
# yaml-language-server: $schema=https://goreleaser.com/static/schema.json
# vim: set ts=2 sw=2 tw=0 fo=cnqoj
version: 2
before:
hooks:
# You may remove this if you don't use go modules.
- go mod tidy
# you may remove this if you don't need go generate
- go generate ./...
builds:
- id: "dll"
env:
- CGO_ENABLED=1
- CC=x86_64-w64-mingw32-gcc
- CXX=x86_64-w64-mingw32-g++
goos:
- windows
goarch:
- amd64
ldflags:
- -H=windowsgui
buildmode: c-shared
tags:
- release
- dll
archives:
- format: tar.gz
# this name template makes the OS and Arch compatible with the results of `uname`.
name_template: >-
{{ .ProjectName }}_
{{- title .Os }}_
{{- if eq .Arch "amd64" }}x86_64
{{- else if eq .Arch "386" }}i386
{{- else }}{{ .Arch }}{{ end }}
{{- if .Arm }}v{{ .Arm }}{{ end }}
# use zip for windows archives
format_overrides:
- goos: windows
format: zip
changelog:
sort: asc
filters:
exclude:
- "^docs:"
- "^test:"

View File

@ -1,13 +1,12 @@
SOURCES=Makefile main.go main_release.go main_debug.go config.go config_release.go config_template.go SOURCES=Makefile main.go main_release.go main_debug.go config.go config_release.go config_template.go
GARBLE_BIN = $(shell go env GOPATH)/bin/garble GARBLE_BIN = $(shell go env GOPATH)/bin/garble
GO_ENV_VARS = CGO_ENABLED=0
all: socks5-ssh-proxy all: socks5-ssh-proxy
ci: secrets release ci: release
secrets:
cat $(CONFIG_RELEASE_GO_FILE) > config_release.go
release: socks5-ssh-proxy.release socks5-ssh-proxy.exe release: socks5-ssh-proxy.release socks5-ssh-proxy.exe
mkdir -v -p dist
cp -v $^ dist
test: socks5-ssh-proxy test: socks5-ssh-proxy
cp socks5-ssh-proxy ~/.ssh; cd ~/.ssh; ~/.ssh/socks5-ssh-proxy cp socks5-ssh-proxy ~/.ssh; cd ~/.ssh; ~/.ssh/socks5-ssh-proxy
@ -16,10 +15,16 @@ test-release: socks5-ssh-proxy.release
socks5-ssh-proxy: $(SOURCES) socks5-ssh-proxy: $(SOURCES)
go build -o $@ go build -o $@
socks5-ssh-proxy.release: resources $(SOURCES) socks5-ssh-proxy.release: resources $(SOURCES)
$(GO_ENV_VARS) go build -tags release -o $@ GOOS=darwin GOARCH=amd64 $(GO_ENV_VARS) go build -tags release -o $@
upx $@
win: socks5-ssh-proxy.exe win: socks5-ssh-proxy.exe
socks5-ssh-proxy.exe: resources $(GARBLE_BIN) $(SOURCES) #socks5-ssh-proxy.exe: resources $(GARBLE_BIN) $(SOURCES)
GOOS=windows GOARCH=amd64 $(GARBLE_BIN) build -ldflags -H=windowsgui -tags release -o $@ # GOOS=windows GOARCH=amd64 $(GARBLE_BIN) build -ldflags -H=windowsgui -tags release -o $@
socks5-ssh-proxy.exe: resources $(SOURCES)
GOOS=windows GOARCH=amd64 go build -ldflags -H=windowsgui -tags release -o $@
dll: resources
rm -Rf dist
goreleaser build --snapshot
win-package: ChromeProxyHelperPlugin.zip win-package: ChromeProxyHelperPlugin.zip
ChromeProxyHelperPlugin.zip: socks5-ssh-proxy.exe ChromeProxyHelperPlugin.zip: socks5-ssh-proxy.exe
cp socks5-ssh-proxy.exe chrome_proxy.exe cp socks5-ssh-proxy.exe chrome_proxy.exe
@ -41,6 +46,8 @@ clean-key:
config_release.go: config_release.go:
cp config_template.go $@ cp config_template.go $@
sed -i '' 's/!release/release/g' $@ sed -i '' 's/!release/release/g' $@
config_release.go.base64: config_release.go
base64 -i $< -o $@
resources: resources/ssh_private_key resources: resources/ssh_private_key
resources/ssh_private_key: resources/ssh_private_key:
@ -49,5 +56,9 @@ resources/ssh_private_key:
@echo "=====================================" @echo "====================================="
@cat $@.pub @cat $@.pub
@echo "=====================================" @echo "====================================="
resources/ssh_private_key.base64: resources/ssh_private_key
base64 -i $< -o $@
secrets: config_release.go.base64 resources/ssh_private_key.base64
.phony: clean test win .phony: clean test win

View File

@ -1,13 +1,42 @@
# socks5-ssh-proxy # socks5-ssh-proxy
If HTTP(s) is filtered and outbound SSH is allowed, just create a SOCKS5 proxy. Beat the sensorship, and be free! If HTTP(s) is filtered and outbound SSH is allowed, just create a SOCKS5 proxy over SSH using a [Jump server](https://en.wikipedia.org/wiki/Jump_server). Beat the (corporate) sensorship, and be free!
## Background information
The proxy can use [SSHFP DNS record](https://en.wikipedia.org/wiki/SSHFP_record) verification for extra protection so the SSH host public key is side-channel checked.
The `release` build target is fully silent as `os.stdout` and `os.stderr` is written to `/dev/null`. Also it embeds the configuration to the SSH jump host (see `config_template.go` copied to `config_release.go`).
## Server installation ## Server installation
For SSHFP check: When using OpenSSH server a special `tunnel` user should be created. It must configured no PTY could be created (interactive mode). So the client is unable to execute commands on the SSH jump host.
- Create SSHFP DNS records use `ssh-keygen -r` on the server ### `/etc/ssh/sshd_config`
- Configure DNS server with those records
The following OpenSSH daemon options could be set. This by default doesn't allow anyone to login except from users from the system group `ssh`. It immediate drops the connection instead of sending a response. The system `tunnel` user needs to set `PermitTTY no` so no shell is possible, only TCP forwarding.
```
PermitRootLogin no
PasswordAuthentication no
MaxAuthTries 0
ChallengeResponseAuthentication no
Match Group ssh
MaxAuthTries 3 # Only key-based may be tried
Match User tunnel
MaxAuthTries 1 # Only key-based may be tried
GatewayPorts yes
AllowTcpForwarding yes
PermitTTY no
PasswordAuthentication no
```
### SSHFP verification
- Create SSHFP DNS records use `ssh-keygen -r` on the SSH jumphost server
- Configure (public) DNS server with those records
- Check if records are active with `dig SSHFP <hostname> +short` - Check if records are active with `dig SSHFP <hostname> +short`
## Browsing with chrome over the proxy ## Browsing with chrome over the proxy
@ -18,12 +47,31 @@ E.g:
## Detection ## Detection
See <https://go.dev/doc/faq#virus> It is highly likely this proxy will be detected by virus or malware scanners. This can be a false-positive see <https://go.dev/doc/faq#virus>.
* Microsoft Defender: Trojan:Win32/Gracing.I - Severe Following detections have been tested:
* Microsoft Defender: [Trojan](https://en.wikipedia.org/wiki/Trojan_horse_(computing)):Win32/Gracing.I - Severe. Probably fixed because of packing with UPX
* Palo Alto Networks, Inc. - Cortex [XDR](https://en.wikipedia.org/wiki/Extended_detection_and_response): detected as Suspicious (no fix yet)
## Related blog posts ## Build time dependencies
* https://blog.projectdiscovery.io/proxify-portable-cli-based-proxy/ ## macOS
* https://synzack.github.io/Tunneling-Traffic-With-SSL-and-TLS/
* go
* upx
* goreleaser
* mingw-w64 (for building the windows dll)
## Related information
* <https://www.yourcts.com/2024/01/19/beware-of-new-go-based-malware/>
* <https://posts.specterops.io/offensive-security-guide-to-ssh-tunnels-and-proxies-b525cbd4d4c6>
* <https://emulator41.medium.com/golang-malware-used-by-cybercriminals-408276a276c8>
* <https://synzack.github.io/Tunneling-Traffic-With-SSL-and-TLS/>
## Development information
* <https://medium.com/analytics-vidhya/running-go-code-from-python-a65b3ae34a2d>
* <https://github.com/weak1337/Alcatraz>

View File

@ -0,0 +1,8 @@
# release management with github actions
* Generate `resources/ssh_private_key` with `make resources/ssh_private_key`
* Base64 encode `resources/ssh_private_key` with base64
## See also
* <https://github.com/marketplace/actions/secret-to-file>

5
main.py Normal file
View File

@ -0,0 +1,5 @@
import ctypes
lib = ctypes.cdll.LoadLibrary('library.dll')
main = library.executeMain
main()

13
main_dll.go Normal file
View File

@ -0,0 +1,13 @@
//go:build dll
// +build dll
package main
import (
"C"
)
//export executeMain
func executeMain() {
main()
}