Strafer - A Tool To Detect Potential Infections In Elasticsearch Instances


[![](https://1.bp.blogspot.com/-3uVRHmgMPzw/YEGeAYwHheI/AAAAAAAAVlI/J5tPR986h1MC24GWzCA0yeATaQ_GZmvjQCNcBGAsYHQ/w640-h276/strafer_1_strafer.png)](<https://1.bp.blogspot.com/-3uVRHmgMPzw/YEGeAYwHheI/AAAAAAAAVlI/J5tPR986h1MC24GWzCA0yeATaQ_GZmvjQCNcBGAsYHQ/s1744/strafer_1_strafer.png>) Elasticsearch infections are rising exponentially. The adversaries are [exploiting](<https://www.kitploit.com/search/label/Exploiting> "exploiting" ) open and exposed [Elasticsearch](<https://www.kitploit.com/search/label/Elasticsearch> "Elasticsearch" ) interfaces to trigger infections in the cloud and non-cloud deployments. During this talk, we will release a tool named "STRAFER" to detect potential infections in the Elasticsearch instances. The tool allows security researchers, penetration testers, and [threat intelligence](<https://www.kitploit.com/search/label/Threat%20Intelligence> "threat intelligence" ) experts to detect compromised and infected Elasticsearch instances running malicious code. The tool also enables you to conduct efficient research in the field of malware targeting cloud databases. In this version of the tool, the following modules are supported: * Elasticsearch instance [information gathering](<https://www.kitploit.com/search/label/Information%20Gathering> "information gathering" ) and reconnaissance * Elasticsearch instance exposure on the Internet * Detecting potential ransomware infections in the Elasticsearch instances * Detecting potential botnet infections such as meow botnet. * Detecting infected indices in the Elasticsearch instances * Detecting Elasticsearch honeypots Note: This is the first release of the tool and we expect to add more modules in the nearby future. Researched and Developed By: Aditya K Sood and Rohit Bansal **[Download Strafer](<https://github.com/adityaks/strafer> "Download Strafer" )**