Jason Haddix Profile picture
Mar 9 25 tweets 7 min read
📣 Stealth and supercharging your offensive security testing using:

🔥 Axiom 🔥

by @pry0cc & @0xtavian

Resources and musings on this epic framework.

👇a thread👇
So I wont lie, I slept on Axiom by for quite a while. I don’t really know why…

☢️ I know @pry0cc (Ben) personally, he’s epic.
☢️ I love the ideas in the framework.
☢️ I know bug hunters who use their own frameworks similarly as their advantage in the bug bounty scene.
🤦‍♂️ But for some reason, I think the infrastructure cost and the setup intimidated me.

But I can say now that I am 100% a believer.

Installation was a breeze:

github.com/pry0cc/axiom/w…

The cost of a fleet is nominal and it offers so many benefits.
📕 So... what is Axiom and what does it do?

from the docs; "Axiom is a dynamic infrastructure framework to efficiently work with multi-cloud environments."

🤐 But that doesn't really describe its benefits to modern security orgs and bug hunters.
📣 What does the framework mean to offensive security professionals?

It means power, speed, and control.
1⃣ As a offensive security engineer, maintaining your testing infrastructure is a chore. Especially between campaigns where you need to provision new IPs (or bug bounty when you accidentally get backlisted).
With Axiom you can provision and deprovision testing boxes QUICKLY and EASILY on the command line.

This uses your cloud provider and spins up your base snapshot with all the tools you use regularly.
2⃣ Axiom is a framework that can distribute tasks that usually take a buttload of time for security testers.
See, when you’re on a redteam engagement or a bug bounty hunt there are tasks that are bottlenecked by your infrastructure (usually a VPS).

The bottleneck could be RAM, processor power, the speed of the tool you are using, or your network connection.
These tasks are commonly:

⚙️ port scanning
⚙️ subdomain enumeration
⚙️ directory and file bruteforcing
⚙️ vulnerability scanning
⚙️ running other auxiliary command-line tools
Axiom can create “fleets” of servers to distribute these tasks to. Accomplishing them in a fraction of the normal time.

This includes both running the tool on each member of the fleet and...

🔥breaking up input files like wordlists🔥

to distribute across the fleet 💸
Let’s take an example of directory and file bruteforcing (part of Content Discovery):

For one site, you can take a large wordlist & break it into 3, 5, 10 pieces, running each piece concurrently on separate VPS’s, easily with axiom.

Example with ffuf:

gist.github.com/jhaddix/13cd7f…
Why would you want to do this?

🧙 it increases speed

🧙 it distributes the http requests coming from the scan. which can keep you from getting blacklisted by a WAF, Akamai, or Cloudflare.
Now lets say you are on a hunt or campaign with...

☢️200☢️ hosts.

The power of this scaling is 🔥staggering.🔥
This leads to point 3⃣

With a properly tuned fleet and module, you can accomplish a

🥷stealthy🥷

scan and still return it quicky.

Running the scan across a whole attack surface.

No more waiting weeks for a low and slow scan to complete.
The great thing about Axiom is that it can scale anything.

Want to scale a new tool? XNLlinkfinder or Waymore by @xnl_h4ck3r ?

You can create a new module in 2-3 lines of json
Here are some more great resources for scaling and using Axiom in several different contexts:

🥇 @pryr0cc 's Original announcement preso:

🥉 @pryr0cc ‘s advanced guide:

0x00sec.org/t/advanced-axi…
4⃣ @0xtavian ‘s section of the wiki on creating modules, scaling horizontally, and vertically (important):

github.com/pry0cc/axiom/w…
And then we have two dear friends of mine!

5⃣ @stokfredrik on a guided usage:

6⃣ and then @pry0cc himself on @NahamSec ‘s Live Recon show, driving the framework:

🧤 So with all that, I hope the greater security community can learn to fall in love with Axiom like I have this week.

It really does 10x many your security testing processes.

Shoutout to all the tool authors in the base install. You all rock.
That’s it for now!

😎Like, follow, and retweet the 1st post!

Got an Axiom tip or resource? comment below!
Axiom can be downloaded here:

github.com/pry0cc/axiom

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with Jason Haddix

Jason Haddix Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @Jhaddix

Mar 3
💪 Code Literacy is a Super Power for Hackers 💪

(and Security Literacy is a super power for devs)

Knowing how vulnerabilities are mitigated makes you a 10x engineer (sec or dev)

Check out this thread for some of my fav

🔥FREE🔥

resources. ⬇️

(Also send me more!)
📣 1st off, if you're a 🛠️Hacker🛠️ or security person:

☢️ You don't need to be a dev. You just need to understand the concepts of mitigating common vulnerabilities. Bonus points for knowing frameworks that eliminate them entirely
📣 2nd, if you're a 🛠️Dev🛠️ :

☢️ You don't need to be a hacker. You just need to understand the concepts of exploiting common vulnerabilities. then you use some of these resources to help mitigate them.
Read 14 tweets
Feb 27
🐻 Hacking a Search / Cloud Company 🐻

I once took over a MAJOR foreign search/cloud company.

I had full access to every employees email & full source code for all their apps.

Here's how it did it (legally)… ⬇️🧵
⚠️ This one is from the archives and mobile tools change fast (well… not that fast tbh) so I will attempt to give modern analogs for tools, for those following along at home. ⚠️
📳 I started by downloading all their mobile apps.

The bug bounty scope allowed me to analyze any of their assets.

I noticed that they had several mobile apps, each covering a different software product. I downloaded these to my jailbroken iPad.
Read 29 tweets
Jan 30
🥽 The Anti-Recon Recon Thread 🥽

Recon is important, but some people hate it. I get it.

When you're in the zone & ready to pounce on a target, you just want to start hacking.

Want the best of both worlds? Quick/complete recon, WITH great coverage?

(a long thread)

🧵⬇️
As an offensive security and testing connoisseur, I love recon. But after talking with many other hackers about their flow, It’s always divided.

Others absolutely do not enjoy it at all and are way more comfortable getting on a target as ⚡️fast⚡️ as possible.
So, for those of you in the second camp, what do I recommend for you to get the benefit of great recon without all the headaches? What is considered *great* coverage?
Read 23 tweets
Jan 28
👮 Hacking into several Prisons 👮

Here's how I did it (legally), and what I learned along the way!

A thread for security testers and cyber security pros

🧵👇
This security testing was part of a 🪲bug bounty🪲 program.

The target was shared software that many prisons across the US use.

I started on one of the main domains:

login.hackertarget. site/
The page was a simple login page to administer the prison software from the internet. No real vulnerabilities.

I wasn't provided credentials for the site either.

What it ⚡️DID ⚡️have was a chatbot for "help" in the bottom right corner of the page.
Read 25 tweets
Jan 25
🔍 My ultimate workflow for simple and easy JavaScript Analysis

⚡️ Comprehensive JavaScript analysis in offensive security, appsec testing, and red teaming wins.

Often you can find juicy hidden endpoints, parameters, & domains buried JS!

A thread 🧵 1/x
👇
Often, dynamic tools fail to parse, visit, and understand complex JS. This is because referencing URLs in JS can take many forms (see image):

2/x Image
On the command-line, many top-tier bug hunters used LinkFinder by @gerben_javado to find these hidden endpoints:

github.com/GerbenJavado/L…

Some even extended it to a chrome extension!

github.com/GerbenJavado/L…

BUT there is an easier way...

3/x
Read 12 tweets
Jan 17
🧠A little mental health and #hacking crossover on the topics of cultivating desire and progress.

👠 Cultivating Desire

It can be easy to deviate from your goals.

There's always a new game, show, family situation, etc, that can keep you from moving forward.

Thread🧵👇
🎯So how do you re/focus?

You have to learn to capture desire.

We all get the urge to do cool things, spontaneously, during the day. You have to learn to grab hold of that lighting strike of desire & turn it into a plan.

📝Note it, outline it, & calendar it.

🧵2/x 👇
Personally, I use @trello, pen and paper notes, and Notes on Apple.

@DanielMiessler is famous for ALWAYS carrying a mini pen and notebook on him.

🧵3/x 👇 Image
Read 8 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Don't want to be a Premium member but still want to support us?

Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal

Or Donate anonymously using crypto!

Ethereum

0xfe58350B80634f60Fa6Dc149a72b4DFbc17D341E copy

Bitcoin

3ATGMxNzCUFzxpMCHL5sWSt4DVtS8UqXpi copy

Thank you for your support!

Follow Us on Twitter!

:(