Skip to content
This repository has been archived by the owner on Jun 20, 2023. It is now read-only.
/ ByteForce Public archive

Offline Digital Forensics Tool for Binary Files

Notifications You must be signed in to change notification settings

RackunSec/ByteForce

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

26 Commits
 
 
 
 
 
 
 
 

Repository files navigation

ByteForce

Offline Digital Forensics Tool for Binary Files This tool can be used for (offline) digital forensics and malware analysis as it shows all raw bytes of a file and also the ASCII representations. As you can see from the screenshots, I have used it on a few different file types, TXT, PNG, Compiled C code, and even a packet capture file. It has three columns, one to show the byte count on the far left. Then, in the middle the hexadecimal bytes of the file, and on the right the ASCII representations (if there are any) of the hexadecimal bytes.

Screenshot: ByteForce reading a binary file

For the colored output, you will need a 256-color capable terminal emulator. I am using Gnome-Terminal with Weakerthan Linux 7 BETA in the screenshots.

Features

ByteForce has some features that were unexpectedly added. After reading a few sites about malware, including the MalwareByte's weblog, here http://blog.malwarebytes.org/intelligence/2013/03/obfuscation-malwares-best-friend I decided to implement a few of the ideas shared in the article into the code.

HTTP Strings

ByteForce will search Binary files for case-insensitive, plain-text HTTP strings.

XOR Brute Force attack (Case-Insensitive)

The XOR brute force attack will try every byte from 0x01 to 0x1f as a XOR key against the byte found in the file. If the result equals the ASCII value of an "H" or "h" I grab the next byte in the file, perform the XOR and look for a "T" ot "t". I continue until I find "[Hh][Tt]{2}[pP]" and if found, I print the bytes until I get a non printable character. The algorithm I wrote will trace steps back into the opened file's bytes accordingly if a non http ASCII value is found.

Rotate 13 Check

This will perform a simple ROT13() function that I made on the byte before checking it's value for the "[Hh][tT]{2}[pP]" ASCII values that I searched for in the XOR segment above.

XOR-ROT13 Attack

This will perform the brute-force XOR attack after performing the ROT13() function I made on the file's byte before checking it for the "[Hh][tT]{2}[pP]" ASCII values.

PDF Documents

ByteForce has the ability to check the document for a valid PDF header and also to search for plain-text case-insensitive executable file names. This does not deflate/inflate data streams. This is a simple string check on the file.

Screenshot: ByteForce showing a potentially dangerous PDF file made using Metasploit

Screenshots

Screenshot: ByteForce reading a binary file for plain-text HTTP strings, ROT13() HTTP strings and XOR->ROT13() strings

Screenshot: ByteForce reading a PNG file

Screenshot: ByteForce reading a 802.11 WiFi network PCAP file

Compiling

To compile ByteForce, simply type make at the command line. I used no special resources or libraries but a few of the default header files from GNU C. Screenshot: Compiling ByteForce is easy!

TODO

  • Organize the PCAP file output using the RadioTap headers as delimiters
  • Add Base64 decode attempt attack on possible strings
  • PE/MSDOS validation from Headers
  • Search PDFs for file header and executable code
  • Clean up output for "| head" streaming
  • Search documents for hidden executable code

References

About

Offline Digital Forensics Tool for Binary Files

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published