Skip to content

TacticalGator/modbuster

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

13 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

modbuster

signal-2024-12-02-225241 $~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~$ Art by mel_arts.graphicdesign


Busting ICS/SCADA over modbus


Modbuster is a pure Python 3 command-line tool, powered by pymodbus, specifically designed for penetration testers, red teamers, and security researchers. It enables precise Modbus TCP interactions, including single and multi-read operations for Coils, Discrete Input Ranges, Input Registers, and Holding Registers, as well as single and multi-write capabilities for Coils and Holding Registers. Beyond these operations, it facilitates enumeration of supported Modbus function codes, aiding in vulnerability assessments and device exploration. With its straightforward interface and advanced features, Modbuster is an essential tool for anyone investigating or auditing Modbus environments.


INSTALLATION

  1. Clone the repository
git clone https://github.com/TacticalGator/modbuster
  1. Use pipx to install
cd modbuster && pipx install .


Using pip

  1. Clone the repository
git clone https://github.com/TacticalGator/modbuster
  1. Set up a virtual environment (Recommended & Optional)
python3 -m venv myVenv && source ./myVenv/bin/activate
  1. Install with pip
cd modbuster && pip3 install .



USAGE

modbuster <OPTIONAL_FLAGS> {read,write,getfunctions,diag} <HOST> <ADDRESS> <VALUES>

# modbuster --help
usage: modbuster [-h] [--version] [-s SLAVE] [-p PORT] [-v] [--restart-comm] [--force-listen-only] [--clear-counter] [--clear-overrun]
                 [--getclear-res]
                 {read,write,getfunctions,diag}

  Busting ICS/SCADA over Modbus

examples:
       modbuster read -s 1 127.0.0.1 400001 10
       modbuster write 127.0.0.1 300231 11 22 33 44 55
       modbuster getfunctions 127.0.0.1
       modbuster diag --slave 2 127.0.0.1
       modbuster diag -s 1 127.0.0.1 --force-listen-only

positional arguments:
  {read,write,getfunctions,diag}
                        Command to execute:
                          read          Read holding & input registers, coils, or discrete inputs from a Modbus server
                          write         Write values to registers or coils on a Modbus server
                          getfunctions  Enumerate supported Modbus function codes
                          diag          Perform diagnostic functions

options:
  -h, --help            show this help message and exit
  --version             Show program's version number and exit.
  -s SLAVE, --slave SLAVE
                        Specify the slave ID (default: 0)
  -p PORT, --port PORT  Specify the Modbus server port (default: 502)
  -v, --verbose         Enable detailed output (verbose mode)

*DANGEROUS Diagnostic Command Flags (used exclusively with "diag" command):
  --restart-comm        Restart communication (toggle mode)
  --force-listen-only   Force the device into listen-only mode
  --clear-counter       Clear Modbus communication counters
  --clear-overrun       Clear character overrun counters
  --getclear-res        Retrieve and clear Modbus Plus responses


ADDRESS RANGE

000001 - 065535: Coil Range
100001 - 165535: Discrete Input Range
300001 - 365535: Input Register Range
400001 - 465535: Holding Register Range

EXAMPLES

➡️ 4 Verbs are currently supported:


IMPORTANT:
Both read and write operations use 0-based addressing internally,
However, addresses are often represented as 1-based.


read 📖

➡️ single/multi read across all 4 address ranges

modbuster-read-multi-input_reg
Reading 3 values of Input Register, starting from the address 300001


modbuster-read-single-disc_in
Reading a single value of Discrete Input, at the address 101992


modbuster-read-multi-coil
Reading 16 values of Coil, starting from the address 1


modbuster-read-multi-hold_reg
Reading 10 values of Holding Register, starting from the address 400001


write ✏️

➡️ single/multi write to coil and holding register

modbuster-write-multi_coil
modbuster-write-multi_coil2
Writing 10 of 1 to coil, starting from the address 1


modbuster-write-multi_hold_reg
modbuster-write-multi_hold_reg2
Writing a total of 5 values(11, 22, 33, 44, 55) to Holding Register, starting from thee address 400010


getfunctions 📜

➡️ enumerate supported modbus function of a given target

modbuster-getfunc
Enumerating supported modbus functions using getfunctions verb


diag 🔧

➡️ enumerate a given target via diagnostic functions

modbuster-diag


Dangerous diag ⚠️

DANGEROUS_FLAGS = {
    "--restart-comm": ("diag_restart_communication", "Restart Communication", {'toggle': True}),
    "--force-listen-only": ("diag_force_listen_only", "Force Listen-Only Mode", {'slave': 0}),
    "--clear-counter": ("diag_clear_counters", "Clear Counters", {'slave': 0}),
    "--clear-overrun": ("diag_clear_overrun_counter", "Clear Overrun Counter", {'slave': 0}),
    "--getclear-res": ("diag_getclear_modbus_response", "Get/Clear modbus plus", {'slave': 0}),
}

Use with EXTREME CAUTIONS


ADVANCED USAGE

modbuster-adv_usage
It can be combined with other command line tools such as watch or proxychains4


modbuster-adv_usage2
Same goes for the write operation. Above example conduct a continuous write operation


DISCLAIMER

This tool is provided strictly for educational and research purposes. Its primary objective is to assist security professionals, system administrators, and researchers in identifying and addressing potential vulnerabilities in Modbus-based systems.

The author(s) and contributors of this tool explicitly do not endorse, condone, or assume responsibility for the misuse of this tool for illegal, unethical, or unauthorized activities. By using this tool, you acknowledge, understand, and agree to the following terms:

  1. Authorized Use Only

    • This tool is to be used only with explicit authorization from the owner or administrator of the target systems or networks.
    • Unauthorized access, testing, or any form of use against systems for which you lack proper permissions may constitute a violation of applicable laws and regulations, including but not limited to:
      • Computer Misuse Acts
      • Hacking or Unauthorized Access Laws
      • Industrial Control Systems (ICS) Security Standards
      • Privacy and Data Protection Regulations
    • You are solely responsible for obtaining the necessary permissions before engaging in any activities involving this tool.
  2. Educational and Research Intent

    • This tool is intended to:
      • Foster understanding of the Modbus protocol and its implementation in industrial systems.
      • Aid in identifying and mitigating vulnerabilities within authorized systems.
      • Support security education, ethical hacking practices, and secure design in industrial environments.
    • It is not designed or intended for:
      • Malicious activities such as exploiting vulnerabilities, disrupting operations, or unauthorized surveillance.
      • Engaging in activities that violate ethical standards or professional guidelines.
  3. No Warranties or Guarantees

    • This tool is provided "AS IS" without any express or implied warranties or guarantees. This includes but is not limited to:
      • Guarantees of accuracy, reliability, or performance in any environment.
      • Compatibility with all Modbus implementations or network setups.
      • Protection from unintended consequences, including potential system disruption or data loss.
    • Users assume all risks associated with deploying, running, or testing this tool.
  4. Limitation of Liability

    • The author(s) and contributors disclaim all liability for any damages or losses, whether direct, indirect, incidental, or consequential, arising from the use or misuse of this tool. Examples include but are not limited to:
      • Disruption of operational systems or processes.
      • Loss of data or financial impacts resulting from testing activities.
      • Legal actions taken against users for unauthorized or unethical use.
    • Users bear full responsibility for understanding and mitigating any risks involved in using this tool.
  5. Ethical and Legal Compliance

    • Users of this tool agree to act responsibly, ethically, and in accordance with all applicable laws, regulations, and standards in their jurisdiction.
    • Ethical guidelines include, but are not limited to:
      • Respecting the rights and privacy of system owners, operators, and users.
      • Reporting identified vulnerabilities responsibly, adhering to Coordinated Vulnerability Disclosure (CVD) practices or equivalent frameworks.
      • Avoiding activities that cause unnecessary harm, damage, or disruption to any system.
  6. Contribution and Redistribution

    • Contributions to the development of this tool are welcomed and encouraged. However, contributors must adhere to the same principles outlined in this disclaimer.
    • Redistribution, modification, or sharing of this tool (including forks or derivatives) must retain this disclaimer to ensure that future users understand its intended purpose and limitations.
  7. Reporting and Disclosure

    • If this tool reveals vulnerabilities in a Modbus-based system, the user is strongly encouraged to report these findings to the system owner, vendor, or a relevant security team in a responsible manner.
    • Follow industry standards for disclosure, such as:
      • Coordinated Vulnerability Disclosure (CVD) protocols.
      • Adhering to applicable government or industry frameworks for ICS security.
  8. Acknowledgment of Risks

    • Users acknowledge that:
      • Testing Modbus systems, even with authorization, can carry inherent risks, including potential operational disruptions.
      • This tool does not include safeguards to prevent accidental harm to systems during its use. It is the user's responsibility to deploy the tool in a controlled, authorized, and secure manner.
      • The improper use of this tool may result in personal, legal, or financial consequences for which the author(s) bear no responsibility.
  9. Acceptance of Terms

    • By downloading, cloning, or using this tool, you:
      • Affirm that you have read, understood, and agreed to this disclaimer.
      • Accept all risks and responsibilities associated with its use.
      • Agree to use the tool only for lawful, ethical, and authorized purposes.
    • If you do not agree to these terms, you are prohibited from using this tool in any capacity.