Wide Range Detection of Doublepulsar Implants with Leviathan

29 April 2017

As you all know, we published Leviathan Framework 3 days ago. It has limited pool of exploits but we are trying to add new ones. I was checking to find a doublepulsar detection code in Python for implementing it to Leviathan, found a great one: https://github.com/countercept/doublepulsar-detection-script

It's really easy to implement Python exploits to Leviathan by following our manual. I implemented both SMB and RDP codes. So let's see how Leviathan helps you to detect Doublepulsar implants in wide range. This is a great example which shows Leviathan's custom exploit flexibility.

Discovery Phase

Firstly, you need to discover IP addresses which are running RDP or SMB. You have 3 different options:

1)Discover them with Shodan (Auto-query, Manual-query)

1)Discover them with Censys (Auto-query, Manual-query)

1)Discover them with Masscan

For this example, I used Shodan's auto-query feature for detecting RDP services in Turkey (Discovery --> Shodan --> Automatic Query)

Also, you can use masscan option to discover services in given IP range. This IP range can be the whole Internet :)

Detection

Detection is also easy. Find your discovery id first (Assets --> Show discovered machines --> everything) Copy your discovery id and return back to the main menu.

Go to Custom Exploits section (Attack --> Custom Exploits)

Enter your discovery id, enter the exploit name (detect_doublepulsar_rdp)

Leviathan will run the exploit against the discovered targets.