sean666888 / subterfuge

Automatically exported from code.google.com/p/subterfuge
GNU General Public License v3.0
0 stars 0 forks source link

Subterfuge Documentation #62

Closed GoogleCodeExporter closed 9 years ago

GoogleCodeExporter commented 9 years ago
Currently, Subterfuge lacks any kind of equitable documentation. I'd like to do 
due diligence and change that. Right now we are about half of the way done. 
Look out for it in early September! Here's my foreword:

Original issue reported on code.google.com by Mtoussain@gmail.com on 22 Aug 2012 at 7:47

GoogleCodeExporter commented 9 years ago
The question I get asked all the time is: Why Subterfuge? It’s exceedingly 
hard to see any positive side to the tool, and that is by design. While there 
might be a place for Subterfuge in every penetration testers toolkit, the fact 
is that its genre of attack, Man-in-the-Middle, is usually second in level of 
restriction to Denial of Service. Subterfuge is here to demonstrate a problem. 
I heartily believe that perception is reality, and as such Subterfuge exist to 
give the perception of inescapable danger on public networks. Tools like 
Firesheep have aided public knowledge of these kinds of vulnerabilities, but 
because most of the tools in this sphere are painful to configure, and 
impossible for a non-savvy user to understand the level of risk is difficult to 
understand.
Subterfuge is a game changer. When using the tool simplicity is inescapable, 
and the risk is self-evident. Furthermore, its visualization capabilities 
through features like the Network View and Credential Harvester make it an 
outstanding mechanism to demonstrate the power of cyber techniques.
If I had to site one experience that validates the existence of a tool like 
Subterfuge I would have to point to a class I taught at the United States Air 
Force Academy. The undergraduate students were not necessarily Computer Science 
Majors, or even technically oriented, but the moment I switched Subterfuge on 
and the credentials started rolling in a collective gasp went up in the room. 
You could definitely say that they got the concept. That’s one group of 
people I’m not worried will be doing their banking in the airport anytime 
soon.
Moreover, this tool does have a place in a penetration testers toolkit. 
Man-in-the-Middle Attacks are powerful. Nothing demonstrates this better then 
Subterfuge. The idea of failing to test a network for vulnerabilities that 
could allow an attacker to gain and leverage this position is erroneous. As the 
Man-in-the-Middle Framework Subterfuge, more then any other tool allows for and 
makes this kind of security validation easy.
Note that Subterfuge was built to demonstrate security vulnerabilities; any 
usage outside of this field may be suspect. I won’t berate the reader with a 
tirade of possible consequences save to say that Subterfuge is a tool with 
inherently malicious purposes, and that to use it as such may not be strictly 
legal in most situations.
That’s it! I hope you enjoy subterfuge…

Matthew Toussain
~ 0sm0s1z

Original comment by Mtoussain@gmail.com on 24 Aug 2012 at 9:16

GoogleCodeExporter commented 9 years ago
It's done! Check it out at http://kinozoa.com/blog/?page_id=65

Original comment by Mtoussain@gmail.com on 17 Mar 2013 at 12:06