CURRYFINGER - SNI & Host header spoofing utility
Unix philosophy your way to finding the real host behind the CDN.
Travis dropped
CURRYFINGER
measures a vanilla request for a particular URL against requests directed to specific IP addresses with forced TLS SNI and HTTP Host headers. The tool takes a string edit distance, and emits matches according to a rough similarity metric threshold.
There are many guides that explain the process of finding servers that may actually host a CDN fronted domain, which all boil down to;
- Plug the domain name into
$OSINTTool
; shodan, censys, etc. - Collect IP addresses.
- ????
- Profit
Motivation
“But Travis,” you say “we already have a tool for this, why do we need yet another one?”
Many guides point to an open source tool, christophetd/CloudFlair, that roughly does this;
- Downloads CloudFlare’s IP ranges.
- Checks whether a supplied domain resolves to an IP within those ranges.
- Queries the Censys API for IPs serving X.509 certificates with the provided domain in the
CN=
(CommonName) attribute. - Loads each IP, and compares the result against a control.
Unfortunately, cloudflair.py
is a little slow, and it fails to indentify true-positives in many cases. Concretely, downloading CloudFlare’s IP lists on every run compounds already slow python
warm-up times - and, maybe more importantly, cloudflair.py
will not work on non-CloudFlair CDNs.
Why not just commit to an existing project? One; Python has its uses, but writing highly performant multi-threaded scanners is not one of them. Two; we get value from separating the concerns of identifying targets and verifying them, to try other, more egregious methods at finding candidate origin servers than commercial OSINT platforms.
CURRYFINGER
demonstrates the kind of effective PoC you can pump out in a few hours using Golang. It has been battle tested against thousands of domains, across hundreds of thousands of requests, and run on dozens of servers. I’ll share that information in another post, but let’s just take a look at one example;
Head 2 Head & Demo
Here, we put cloudflair.py
up against CURRYFINGER
in an attempt to identify the real server behind the popular “chat” website chaturbate.com
.
Left Pane - CloudFlair
We launch ./cloudflair.py -o chatbate.txt chaturbate.com
- kicking off the process of finding targets and carrying out similarity analysis.
Right Pane - CURRYFINGER
We find targets by querying the Shodan REST API; curl "https://api.shodan.io/shodan/host/search?key=$SHO&query=ssl%3A\"chaturbate.com\"" | jq ".matches|.[].ip_str" | tr -d "\"\t " | tee chaturbate.com.txt
Then we invoke CURRYFINGER
on the results to find which IPs seem like the real origin servers behind the CDN; ./CURRYFINGER -file chaturbate.com.txt -show=false -url https://chaturbate.com 2>/dev/null | tee res.txt
Then we drop the CloudFlare IP addresses from the results; grep ^match res.txt | grep -v 104.16|cut -d " " -f 2
We finally manually examine the full response by forcing curl
to resolve a domain with a specific IP; curl -vik --resolve chaturbate.com:443:$IP https://chaturbate.com
Destruction
So What
tl;dr; cloudflair.py
is still running after CURRYFINGER
completes and we’ve verified the results. By the time cloudflair.py
finishes, it has failed to identify the correct server, even though Censys found the IP, and cloudflair.py
checked it.
Operator Notes
-file string
-
You can specify IP addresses to test via
stdin
, or you can throw a filename here. -mbits int
-
This is the number of bytes we’ll consider out of the replies from servers. 500 Bytes is a good default. You can bump this up if you get too many false positives.
-perc int
-
We divide the total examined bytes by levenshtein edit distance, and call that a ‘percentage’ fun fact; the edit distance can exceed the original sample. It works well enough as a measurement, and empirical results over 15,000 hits show roughly show the 25th percentile at
-perc 74
. Our default of 50 is good. -show bool
-
Setting
-show=true
will emit both measurement samples tostderr
, which is fine for debugging, but you’ll want to set this to-show=false
. -threads int
-
How many simultaneous threads will be used to perform requests. I’ve used up to fifty-thousand concurent threads over thousands of ips. It works just fine.
-timeout duration
-
This timeout applies to the total connection to a target server. The default timeout is extremely conservative, values down to
-timeout 1s
are just fine. If you’re saturating your pipe with-threads 500000
then you’re going to want to increase timeout, or decrease threads. YMMV. -ua string
-
We usually generate a random User Agent string for requests, but you can specify one here. I wouldn’t.
-url string
-
The
https://
prefixed url we’re going to grab for our tests.
Getting IP Addresses
If you have a free Shodan account, you have an API Key;
You can also grab CIDR ranges for popular cloud hosting providers, and masscan -p443
them. I’ll explore this option in another article.
Ulimits
CURRYFINGER
does full connects, and doesn’t know what your ulimit
s are. So, juice those up before a run; ulimit -n 60000
. Yep.
VHOST check; lots of domains, just a few IPs
With a pile of IP addresses in targetIPs.com.txt
and a pile of domains in targetDOMAINS.txt
you can quickly test for the presence of every domain on every IP by using GNU parallel
.
All together now; match subdomains
Pull subdomains for a target domain before running CURRYFINGER
now you’re cooking with concentrated freedom. Of course, use whatever tools you want, amass
, subbrute
, Censys, Shodan, masscan
, whatever.
Here’s what that looks like using turbolist3r.py
;