Supports basic queries by IP which all users, community and enterprise, have access to. Easy to extend for enterprise-only APIs.
Add this to your claude_desktop_config.json
file (editing as needed for paths and your API key):
{
"mcpServers": {
Supports basic queries by IP which all users, community and enterprise, have access to. Easy to extend for enterprise-only APIs.
Add this to your claude_desktop_config.json
file (editing as needed for paths and your API key):
{
"mcpServers": {
Censys
AlienVault Open Threat Exchange (OTX)
Elasticsearch
import java.io.IOException; | |
import java.net.MalformedURLException; | |
import java.net.URL; | |
import java.net.URLConnection; | |
import java.util.ArrayList; | |
import java.util.List; | |
import java.util.Map; | |
import java.security.MessageDigest; | |
/* |
<?xml version="1.0" encoding="UTF-8"?> | |
<!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd"> | |
<!-- "https://malware.news/t/20-common-tools-techniques-used-by-macos-threat-actors-malware/46801" --> | |
<!-- "https://objective-see.org/blog/blog_0x71.html" --> | |
<plist version="1.0"> | |
<dict> | |
<key>Label</key> | |
<string>com.mylaptop.watchhostconfig</string> | |
<key>ProgramArguments</key> | |
<array> |
rule JavaDeswerializePayload | |
{ | |
meta: | |
author = "@jnazario" | |
date = "2022-01-27" | |
version = 1 | |
strings: | |
$s1 = "java.lang.Runtime.getRuntime().exec" ascii fullword | |
$s2 = "javaSerializedData" ascii fullword |
-- MySQL dump 10.13 Distrib 8.0.26, for Linux (x86_64) | |
-- | |
-- Host: localhost Database: staff | |
-- ------------------------------------------------------ | |
-- Server version 8.0.26 | |
-- | |
-- Table structure for table `person` | |
-- |
Found a request in my HTTP honeypot I couldn't explain. Investigation revealed it's been scanning widely and attempting to exploit a FreePBX command injection vulnerability and install a webshell.
77.247.108.81 - - [21/Sep/2021:18:54:34 -0400] "GET /gbr.php HTTP/1.1" 400 226 "-" "gbrmss/7.29.0" "ct:text/html"
Using this IP I spotted this link which showed me the form data: https://threatwar.com/attackers/695a2a8e-3cb6-4d74-8af8-d5058079a909
Based on the request there this appears to be an RCE injected via the "language" header. Exploit here: https://www.exploit-db.com/exploits/40434
From there I investigated the initial dropper:
open System.Text | |
/// https://fsharpforfunandprofit.com/posts/serializating-your-domain-model/ | |
#I "/usr/local/share/dotnet/sdk/NuGetFallbackFolder/newtonsoft.json/9.0.1/lib/net40/" | |
#r "/usr/local/share/dotnet/sdk/NuGetFallbackFolder/newtonsoft.json/9.0.1/lib/net40/Newtonsoft.Json.dll" | |
module Json = | |
open Newtonsoft.Json | |
import networkx as nx | |
import matplotlib.pyplot as plt | |
g = nx.DiGraph(((1,2), (2,3), (3,4), (2,4))) | |
def wolfram(g): | |
ns = [ (x, n) for x,n in g.out_degree() if n == 2 ] | |
print(list(ns)) | |
nns = [] | |
for x, _ in ns: |
using System.IO; | |
using System.Net; | |
using System.Text; | |
var api_id = Environment.GetEnvironmentVariable("CENSYS_API_ID"); | |
var api_secret = Environment.GetEnvironmentVariable("CENSYS_API_SECRET"); | |
var credentials = System.Convert.ToBase64String(Encoding.ASCII.GetBytes(api_id + ":" + api_secret)); | |
var wc = new WebClient(); |