Skip to Content

Overlord


Posted by Michalis Nicolaou

02 October 2019


           

Creating a secure infrastructure for social engineering campaigns or red teaming operations is a hustle. A lot of organizations are keeping their infrastructure always on and make minor configuration changes (e.g. on the redirectors or the mail servers) but that is not cost effective. Luckily for us, tools exist (like Terraform and ansible) to automate the configuration process to spin up virtual environments on cloud providers. Great articles were created to deploy a robust red team infrastructure using these technologies and open source projects are available on Github. One of these tools is RedBaron, which leverages these technologies to create a basic Red Team Infrastructure, but it requires knowledge on their TF configuration language. This is where Overlord comes in.

Overlord is a tool that provides a python-based console CLI which abstracts the user from the terraform implementation. Briefly, it is a Terraform “code generator” which takes a JSON file that is generated from the user and creates a Terraform file to be executed. It heavily uses the RedBaron implementation as a main resource, but additional modules and configurations were made to make the overall experience easier to follow by anyone.

To better understand how the tool works, let’s take a look at the diagram bellow. By running Overlord, a new project is created. In this example we will include an HTTP C2 and a webserver with their redirectors, a mail server and Gophish client which is used to connect and send the emails for our campaign.

To setup the infrastructure shown on the diagram we will need API keys from our providers (AWS and Digital Ocean). Using the usemodule command, we can configure each module to our needs. Let’s take a closer look on how the C2 module works. On the module you can choose your provider (in this case AWS with the set provider command). We want to install Metasploit and leave the redirector set to 1.

Using the add command the module is added to our campaign. If we want to create a redirector in another provider, we can use the redirector module and add the ID of the C2 which was created for us as shown on the picture bellow:

To add a DNS record, we use the dns_record module. To add the rdir.overlord.red record we need to set the name to rdir, set the type to A and set the record to record -m <module_id> -d overlord.red.

Using similar steps, you can create the infrastructure of the diagram. When you are finished you can use the create command to save and store the files in the project directory. With the deploy command, overlord will start creating the machines on Digital Ocean and AWS.


How does it work?

The configuration of all the modules can be found in the config/config.json file. You can modify each module to suit your needs (e.g. change the default provider from Digital Ocean to AWS or choose a different region). The Project directory contains the variables.json file, which can store your API keys and domains. If this file exists, it pre-loads when Overlord runs and populates the variables so they can be used without typing your domains and API keys every time. Overlord reads the filenames on the redbaron/data/scripts/tools directory and creates a list of tools which can be used to install tools on the C2 server. You can add your own by adding them in the same directory.

For more detailed information about Overlord, you can visit the GitHub page: https://github.com/qsecure-labs/overlord

We hope that you will find this tool useful in your engagements!