Introducing Red Ira - Red Team Infrastructure Automation Suite
v1.0
Red Team Infrastructure
Industry Context
There are many great pre-existing resources among the information security community pertaining to Red Team Infrastructure, why it's needed and best practices in terms of deployment and automation. Some recommended reading preceding this article would be Rasta Mouse's Blog as well as spotless'.
In short, the security industry, technology companies, and enterprises are increasingly utilizing infrastructure-as-code and configuration-as-code approaches to automate the menial tasks of IT provisioning. The days of spinning up new machinery, logging in and configuring software will never end, but the effort which is required becomes exponentially compact as professionals take advantage of "DevOps" software. DevOps provides assurances of repeatability and flexibility across any size infrastructure, freeing up IT teams and System Administrators to work on more important tasks. The true power of DevOps is unleashed when development efforts can be managed, codified, tested and deployed flexibly and automatically, requiring human intervention only when the changes at hand impede the continuous integration & deployment process.
In the context of so-called "OffSecOps" (offensive security operations), the industry is increasingly favoring malleability and resilience when running offensive information security campaigns. OffSecOps often encompasses multiple facets of the traditional security engagement in addition to more modern, adversarial emulation scenarios. Crafting the infrastructure in such a way that is both quickly tailored to the target, as well as flexible in the face of competing Blue Teams is paramount.
The Red Team Infrastructure Wiki hashes out specifications of building good Red Team Infrastructure in precise detail, and serves as a great reference for any Red Team looking to supercharge their operations. As harmj0y outlined in his phenomenal SO-CON 2020 talk, OffSecOps automation doesn't end at infrastructure & configuration - but can be extended to every limb of the offensive security lifecycle. From payload development, social engineering, C2, all the way to post-exploitation tasks & reporting - OffSecOps really sets the sky as the limit for security ops moving forward. Security teams can no longer ignore the impending wave of the DevOps revolution occurring industry-wide, lest they do so at the peril of their own cost & time.
Project Purpose
I set out to begin automating Red Team Infrastructure and software configurations that could be tailored easily to individual client engagements, as well as created, maintained and destroyed in the cloud with ease. For this first iteration, a full Cobalt Strike C2 as well as a Gophish server with SMTP relaying would need to be working out-of-the-box, with minimal setup required. Each deployment would include the following:
LetsEncrypt signed TLS for each domain
Pre-configuration of each application
Pre-populated DNS, such as A, NS, DKIM and SPF records
Malleable redirectors fronting each application
Simplifying and serializing the state-changing operations into a single ingestion point, as well as leveraging file formats which could be easily consumed by micro-services would allow for the framework to be implemented into an Offensive CI pipeline in the future. Furthermore, I wanted to offer more granular network isolation using AWS than was offered in previously developed tools. Depicted below is the project's phase 1 initial architecture proposal (fireballs indicate burnable infrastructure) :
Software Considerations
At the time of writing, I have no association with any of the software companies mentioned in this blog, and all of my opinions are strictly preference based.
Selecting an infrastructure-as-code and configuration-as-code framework is the first step taken in architecting a continuous integration scheme. The following design parameters were selected:
Repeatability: Ease-of-scale and extensible programming features
Malleability: Create, modify and destroy the deployments at will
Idempotency: Ease-of-development & ability to change production deployments on the spot
Pick what works: Strong preference for a tool set which SMEs in the industry already use and have made available, so as to save development time and complexity costs
Ultimately, Terraform and Ansible were selected, with justifications outlined in the following sections. Fundamentally, the choice came between choosing a containerized orchestration route and resource-based management. The containerized approach of using a technology like Kubernetes with Docker is powerful due to its ability to rapidly deploy predictable containers that 'just work', and to drive deployments at scale. While K8s checked the repeatability box, the other 3 considerations strongly favored the Terraform / Ansible stack.
Terraform
Terraform's strength lies in its ability to quickly construct bare-bones infrastructure on any number of managed cloud providers and open source cloud hosting stacks, using the straightforward HCL declarative configuration language that Hashicorp came up with. HCL & Terraform are built on graph theory, providing a level of modularity which allows for components to be seamlessly abstracted and built upon, even with a minimal knowledge of the language. Furthermore, it allows for the core Terrform workflow to be dead simple, allowing not only for scale across multiple teams and deployments, but for ease of use both in an automated CI environment as well as a manual CLI operation.
There are several approaches to team-based Terraform deployments, each with its own individual merits. For example, SaaS services such as scalr and Terraform Cloud exist to manage concurrent Terraform automation modules across teams. With a strong preference to open source and a being a huge fan of Gitlab, ChatOps, and xpn's previous work on Terraform / Ansible based security integration in Gitlab CI, I favored an approach which would allow for 'plug-n-play' deployments. In other words, tuning a Gitlab CI pipeline to serialize simple changes, which would be picked up as a state change for complex Terraform / Ansible configuration management within the pipeline. This is discussed more in-depth in the Typical Use Cases section.
For the last couple of years, infosec players such as Rasta Mouse, spotless and byt3bl33d3r have all embraced Terraform as a go-to for rapid infrastructure construction as well, which is discussed in greater detail in the Existing Offensive Toolkits section.
Ansible
Like most software ecosystems, DevOps tool chains have many strong opinions preceding them, and Ansible is no stranger to phrases such as "why not just use Docker Compose?!" Ansible's fundamental flaw is the playbooks which comprises its configuration-as-code operations can be broken easily by an upstream repository / dependency change, depending on where & how the configuration is being invoked. With Docker containers, you know exactly what to expect when you run the container, or so we are told (this obviously changes as Docker compositions become more complex and contain more and more containers).
From an offensive security perspective, Ansible really shines in its idempotency and inventory system. This allows for intentional, concurrent configuration drift to occur on multiple machines at any given point in time. For example, if a systemd unit needed to be modified, Ansible would only modify the machines' states based on any (if any) changes in the playbook in relation to what is already present/missing on the target. Imagine a scenario in which a blue team discovers C2 infrastructure: you would want to stop all services until a certain point in the future, in order give your team some buffer time to switch to a backup domain for the remainder of the engagement, before quickly re-deploying.
The combination of the core Terraform workflow and Ansible's idempotent aware configuration-as-code model make for a flexible framework of maintaining multiple pieces of infrastructure at scale, with speed and simplicity baked in as the design philosophy of the frameworks themselves.
Existing Offensive Toolkits
With any new project, it is almost always best to pick something that is already proven to work and build upon it to suit the use case. The following projects were identified and analyzed for usability, active maintenance, and underlying stack:
byt3bl33d3r's Red Baron project
lsuto & discoking's kubered project
Red Ira Software Design & Summary
Baseline Project
Red Baron was chosen as the baseline software; with maintenance as recent as 2 years in the past, with multiple contributors to the code base, it would most closely fit the criterion for the software considerations posed in the previous section. In addition to its well-established Terraform modules, the following features were very useful and saved alot of time in initial development:
Project structure for AWS and other common cloud providers
SSH key & config write-outs
Rudimentary Ansible integration
Design Decisions
Due to the following design decisions, I spun a new project rather than forking Red Baron:
Deployments would require modification of cut-and-dry configuration JSON templates only, for future micro-service / CI ingestion
All configuration would be done by Ansible, automatically.
In-line scripts would remain an option (recommended against), but be removed.
Top-level modules would be created through stacked Terraform sub-modules, to make composition easier in the future
Publicly facing assets would only expose ports & services necessary for their core offensive function to the internet.
All administrative functions to be exposed to the internal operators' private network only.
Underlying infrastructure would be obscured to external parties.
Since the original project was based on an infamous WW1 fighter pilot, I named the project after Richard Ira Bong, an American WW2 Ace and Medal of Honor recipient.
Improvements Summary
The following improvements (in a nutshell) were made to the original Red Baron code:
Terraform upgrade to v0.14.4
Includes new Terraform syntax paradigms, such as :
Non-interpolated variable invocation
explicit
depends
patternslocal variables
Upgraded acme providers
Complete, hands-off Cobalt Strike and Gophish Ansible playbooks
Using up-to-date software distros: Ansible v2.10.4 (via python3), Cobalt Strike 4.2, and Gophish 0.11.0
Added J2 templates & C2 profiles that can be fed into the playbooks.
Cleaned up code
Removed count where unnecessary
Simplified outputs
Simplified modules
Added explicit type constraints where possible
Boilerplate base variable files for unmanaged infrastructure declaration
Deployment specific module abstractions (infra as well as Ansible modules)
Cobalt strike, Gophish
Red Ira Software Implementation
Currently, Red Ira is implemented only for AWS.
Network Isolation
As outlined in the Red Team Infrastructure Wiki, securing Red Team Infrastructure encompasses standard defense-in-depth measures such as limiting service exposure, employing access control policies, and keep machines up to date. Red-Baron was a bit lenient with the standard inbound port exposure, so a least-privilege model was implemented to isolate all back-end infrastructure, with the redirectors being solely exposed to the internet with their respective functional service port(s).
This model requires that the creation of a VPC, private subnet, public subnet, and any custom security groups applying to those subnets within the environment_variables.auto.tfvars.json file. The automation of VPC & subnet creation was not needed by my team in phase 1, but is consideration for the next release. This is outlined in the README. The base_variables.tf file works in conjunction with the environment_variables file by carrying unmanaged variables, such as AMI IDs, across deployments without the need to re-define them per module. base_variables.tf files are then placed in each module's folder to represent those unmanaged variable provisions at runtime when Terraform builds its DAG for that module.
Cut and Dry Variable Inputs
In its current state, Red Ira can be fed the required variables for any given deployment using a deployment's corresponding JSON file, or as variables through the command line. For example, the complete AWS deployment template is implemented in JSON as follows, allowing for any number of Cobalt Strike C2 and Gophish phishing deployments to be spawned concurrently:
Module Abstractions
Since Terraform was designed from the ground-up with modularity in mind, my opinion is that best practice should include repeatable modules which adhere to a single responsibility and can easily be copied around as boilerplate code.
Ansible Abstractions
Invoking Ansible through Red Baron, or any Terraform code, is a bit of a hack. Furthermore, it is often recommended to keep configuration separate from Infrastructure. Some benefits of separation are:
Allows for easier root cause analysis when the pipeline errors out
Keeps discrete language functionality, i.e. Terraform & Ansible, separate so as to improve readability maintainability in a build
In the case of CI builds, I found it advantageous to keep Ansible invocations nested within Terraform modules, so that infrastructure I/O could be more seamlessly integrated with configuration inputs. For example, a Cobalt Strike deployment would need to know public IP addresses of the deployment as well as a TLS keypair, and SSH key. Since the majority of these items were already defined as Terraform I/O variables, connecting the Ansible kickoff within Terraform also prevents the possibility of variable de-synchronization in a future build; which is likely in the former approach of tracking Ansible separately in the CI definition.
The original Red Baron Ansible implementation required providing base variables in the Ansible module to communicate, and in-lined the necessary variables for a particular playbook as --extra-args
:
I used this module as a base to construct playbook specific modules, first by modifying the provisioner to run on python3
and inline the inventory rather than creating a dynamic inventory. In this manner inventory doesn't need to be tracked, and each Ansible module is invoked in separate instances per each definition. Constructing a dynamic inventory will most likely be needed in the future, as more complex playbooks are invoked, for example RedELK.
Cobalt Strike & Gophish Ansible Modules
Using the base Ansible module, abstracting the Cobalt Strike role I created (with the help of chryzsh) into a Terraform module was relatively straightforward. First the variables which are needed by Ansible are tracked within a Terraform variables.tf file, as follows:
The role is then invoked following another call to a core_config.yml playbook as:
The core_config.yml playbook contains the following core dependency installs through apt, and is a replacement for the original inline script invocations that Red Baron utilized:
The Gophish Ansible module uses the same approach and can be found here.
Cobalt Strike & Gophish Infrastructure Modules
After abstracting the implementation specific Ansible modules, the entire infrastructure module is put in place, which:
Spins up the relevant EC2 instances
Sets DNS records in Route53
Creates TLS keypair with LetsEncrypt
Runs the Ansible module
Below is an example of a Cobalt Strike HTTP C2 implementation:
Top Level Deployment Modules
Putting it all together, the modules can be placed in a deployment, with the above example being declared as simply as:
Typical Use Cases
Gitlab CI
The following approach is essentially taking Gitlab CI and transforming it into a MacGyver'd sclar/Terraform Cloud style workspace management system. The idea is to deploy the Infrastructure with simple Slack commands through Gitlab CI using Gitlab ChatOps. This approach will be covered more in-depth in a future blog entry, but a typical workflow would execute as follows:
An operator would use a custom slash command in Slack, with the 'cut-and-dry' variables - i.e. the pared down variable requirements for each individual Red Ira deployment, as arguments. Gitlab ChatOps is perfect for this. Each particular customer environment would map to a Terraform workspace and the ChatOps command could be invoked as follows from Slack:
Workspace Management
The above command, on the back-end, would need to perform some workspace management. This is due to the way Terraform manages variables on disk directly when working with the open source CLI.
The following would need to be implemented, assuming the complete deployment would always reside in the root directory, as a Ruby ChatOps command:
Terraform
workspace
command for customer name (creates if doesn't exist)The corresponding variables file, in this case aws_complete.auto.tfvars.json, would need to be renamed in a convention that could identify the customer, for example,
aws_complete.Customer_Name.auto.tfvars.json
. This step can be avoided if the CI runners are made separately for each customer.If a pre-existing customer workspace is already deployed in the folder, the Ruby appends
.old
to the file extension, to ensure that Terraform doesn't pick it up. Concurrency is assured since the commands run on the same CI runner.If the same customer's variables file already exists, it is renamed back from
.old
back to.json
and the JSON is appended to as directed from the slash command.
The corresponding Gitlab CI job is fired off.
Unit tests are run with unit testing frameworks such as Molecule and InSpec.
Terraform
plan
andapply
are invoked.The job finishes or fails, and reports back to Slack the results via a Slack webhook.
The Code
The code is open source and located here.
Future
There are a number of improvements that are planned for Red Ira in the future, including:
Pwndrop for payload server
Domain Fronting Implementation
RedELK Implementation
Dynamic Terraform created Ansible Inventories
Hosted Zone / Create VPC implementation, as needed or if requested
Molecule & InSpec integration tests
References
Last updated