Skip to content

K1nd4SUS/cerbero

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

cerbero

A packet filtering tool for A/D CTFs.

GitHub_banner

Table of contents

Intro

This tool is able to filter packets based on their payload by using regular expressions.

Why this tool

During an A/D, we often had to drop some malicious packets, but to do it properly we had to understand how the service worked and in which programming language it was written. This process is a waste of time. With this tool we can instead drop the malicious packets before they are received from the vulnerable service, making the process simple and implementation agnostic (basically it works like a WAF that process all packets).

Is it against the rules to use this tool

Probably not, but we do not take any responsibility for its use.

Structure of the project

This hyper-professional diagram represents on a conceptual level how this tool is structured:

diagram

Usage

  1. Deploy cerbero-web with docker compose
  2. Download the cerbero binary on the vuln-box

Warning: cerbero-web must be set up before trying to connect the firewall, this means that before starting the cerbero binary you MUST complete the services setup on cerbero-web.

Contributing

If you wish to contribute to the project, make sure to read the contributing guide first.