Skip to content

andrewsmhay/coromandel

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

24 Commits
 
 
 
 
 
 
 
 

Repository files navigation

##Coromandel

###About A Coromandel Screen is a wooden folding screen coated in dark lacquer that is carved before being painted with gold or varied colors. Some may be decorated with precious stones. (Source)

Coromandel, the tool, was designed to isolate an individual cloud server instance for analysis so that it may be investigated without fear of introducing addtional artifacts not explicitly introduced by the responder and their tools.

###Usage


$ ruby coromandel.rb
                                 _     _ 
 ___ ___ ___ ___ _____ ___ ___ _| |___| |
|  _| . |  _| . |     | .'|   | . | -_| |
|___|___|_| |___|_|_|_|__,|_|_|___|___|_|

 Created by: Andrew Hay / @andrewsmhay 
 http://github.com/coromandel

Please specify the cloud provider from the list below

(1)  Amazon EC2 (VPC only)
(2)  Amazon EC2-Classic (not yet available)
(3)  GoGrid (not yet available)
(4)  OpenStack (not yet available)
(5)  Rackspace Cloud (not yet available)
(6)  CloudStack (not  yet available)
(7)  Windows Azure (not yet available)
(8)  Google Compute Engine (not yet available)
(9)  Red Hat Cloud Infrastructure (not yet available)
(10) HP Cloud (not yet available)
(11) Terremark (not yet available)
(12) SAVVIS (not yet available)
(13) SingleHop (not yet available)
(14) Joyent (not yet available)
(15) Oracle Cloud (not yet available)
(16) IBM SmartCloud Enterprise (not yet available)
(17) VMware ESXi (not yet available)
(18) Kernel-based Virtual Machine (KVM - not yet available)
(19) Citirix XenServer (not yet available)

Please select the cloud provider ID: 1

You Selected Amazon EC2

   Instance		VPC ID			Public DNS									Public IP		Internal DNS
1) i-0f42be62	vpc-27cb4148	ec2-54-208-29-105.compute-1.amazonaws.com	54.208.29.105	ip-10-0-0-88.ec2.internal

Please select the number of the instance to isolate: 1

All traffic will be blocked to and from this instance.
You will, however, be able to allow access from your analysis station(s).

Enter a unique identifier for this case or incident: casejun172013

Enter the IP address(es) of your analysis station(s) (e.g. 1.2.3.4, 5.6.7.8, etc.): 1.1.1.1, 2.2.2.2

Which TCP port(s) do you wish to open (e.g. 80, 22, etc.): 22, 80, 443

Allow ICMP from analyst station to the target? [Y/N]: Y

===casejun172013===
1.1.1.1, 2.2.2.2 will be allowed to communicate with i-0f42be62 on ports 22, 80, 443.

===New Instance Access Information===

Instance Name	VPC ID			Public DNS									Public IP 		Internal DNS
i-0f42be62		vpc-27cb4148	ec2-54-208-25-165.compute-1.amazonaws.com	54.208.25.165	ip-10-0-0-88.ec2.internal

You may now access i-0f42be62 by connecting to 54.208.25.165 from 1.1.1.1, 2.2.2.2.

Thank you for using Coromandel, happy forensicating!

###Contact

To provide any feedback or ask any questions please reach out to Andrew Hay on Twitter at @andrewsmhay.

About

AWS Security Group Isolator

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors

Languages