What is AtlasReaper?
AtlasReaper is a command-line tool developed for offensive security purposes, primarily focused on reconnaissance of Confluence and Jira platforms. It provides various features helpful for credential farming, social engineering, and information gathering in Atlassian environments.Key Features
Confluence Reconnaissance
Search, enumerate, and interact with Confluence spaces, pages, and attachments
Jira Operations
Create issues, add comments, manage attachments, and enumerate projects
Credential Farming
Embed 1x1 pixel images to perform credential harvesting attacks
Cookie-Based Auth
Uses browser session tokens for authentication
Anonymous Access
Supports anonymous access when configured
Social Engineering
Create issues, add comments, and embed content for social engineering
Command Structure
AtlasReaper uses a hierarchical command structure:Available Commands
- Confluence
- Jira
- Common
Confluence operations:
attach- Attach files to pagesdownload- Download attachmentsembed- Embed 1x1 pixel images (credential farming)link- Add links to pageslistattachments- Enumerate attachmentslistpages- Enumerate pageslistspaces- Enumerate spacessearch- Search content with wildcard support
Authentication
Session Token Authentication
AtlasReaper supports cookie-based authentication using session tokens from user browsers:1
Extract Session Tokens
Use SharpChrome or similar tools to dump cookies:
2
Locate Atlassian Cookies
Look for cookies scoped to
*.atlassian.net:cloud.session.tokentenant.session.token
3
Use in Commands
Provide the cookie value via the
--cookie option:Anonymous Access
If Confluence or Jira allows anonymous access, you can omit the cookie parameter:Test for anonymous access by running commands without the
--cookie parameter.Use Cases
Reconnaissance Scenarios
Information Gathering
Information Gathering
Objective: Enumerate available resources and gather intelligence
- List all Confluence spaces and pages
- Enumerate Jira projects and issues
- Search for sensitive information (credentials, keys, internal URLs)
- Download attachments containing valuable data
- Enumerate user lists for social engineering
Credential Farming
Credential Farming
Objective: Harvest credentials via embedded content
- Embed 1x1 pixel images pointing to attacker-controlled servers
- Monitor for authentication attempts (NTLM hashes)
- Leverage Responder or similar tools to capture credentials
- Target high-traffic pages for maximum exposure
Social Engineering
Social Engineering
Lateral Movement
Lateral Movement
Objective: Expand access within the organization
- Search for internal URLs and endpoints
- Enumerate API keys and tokens in documentation
- Identify VPN configurations and access methods
- Discover internal tools and services
- Map organizational structure via user enumeration
Quick Start Examples
Confluence Operations
Jira Operations
Operational Workflow
Initial Reconnaissance
Credential Farming Attack
Detection Considerations
Detection Indicators
API Activity:- Unusual API request patterns
- Rapid enumeration of resources
- Anonymous access attempts (if disabled)
- Session token usage from unexpected locations
- File upload/download patterns
- Multiple page/issue creations from single account
- Embedding of external images
- Mass attachment downloads
- Unusual search queries (wildcards, sensitive terms)
- Comment spam or phishing attempts
- Connections to unknown external image hosts
- Outbound authentication attempts
- UNC path connections (for credential harvesting)
Defensive Recommendations
Detection Strategies
Detection Strategies
- Monitor Confluence/Jira audit logs for suspicious activity
- Alert on anonymous access attempts (if disabled)
- Track API usage patterns for anomalies
- Monitor for external image embedding
- Detect mass enumeration attempts
- Watch for unusual session token usage patterns
- Alert on file downloads from sensitive spaces
Prevention Strategies
Prevention Strategies
- Disable anonymous access if not required
- Implement strict session token policies
- Use IP allowlisting for Atlassian access
- Enforce MFA for all users
- Restrict permissions for space/project creation
- Block external image embedding
- Implement DLP for sensitive content
- Regularly audit user permissions
Architecture
Target Platforms
Confluence
- Confluence Cloud (*.atlassian.net)
- Self-hosted Confluence (server/data center)
- Anonymous and authenticated access
- REST API interactions
Jira
- Jira Cloud (*.atlassian.net)
- Self-hosted Jira (server/data center)
- Issue tracking and project management
- User enumeration capabilities
Authentication Flow
Limitations
- Testing Coverage: Not thoroughly tested in all environments - unexpected behavior may occur
- Authentication Methods: Only supports
cloud.session.tokenortenant.session.tokenfrom browsers- API tokens not currently supported
- Personal access tokens not supported
- OAuth not supported
- Attribution: Write operations (create/comment/attach) will be attributed to the session token’s user or “anonymous”
- Rate Limiting: May encounter API rate limits during aggressive enumeration
- Error Handling: Some edge cases may cause crashes or unexpected behavior
OPSEC Considerations
Operational Security
Operational Security
- Attribution: All actions are logged under the session token’s username
- Timing: Space out requests to avoid detection
- Volume: Limit enumeration to avoid triggering alerts
- Content: Craft believable issues/comments for social engineering
- Cleanup: Consider removing embedded content after farming
Credential Farming OPSEC
Credential Farming OPSEC
- Use HTTPS for harvesting server (avoid cleartext)
- Host harvesting infrastructure on legitimate-looking domains
- Employ logging and monitoring of incoming connections
- Use short-lived campaigns to minimize detection window
- Clean up embedded images after successful harvest
Session Token Handling
Session Token Handling
- Session tokens may expire or be revoked
- Multiple concurrent uses may trigger anomaly detection
- Original user may notice unusual activity
- Session tokens typically tied to IP address
- Consider token rotation if available
Command Reference
Confluence Commands
| Command | Description |
|---|---|
| attach | Attach a file to a Confluence page |
| download | Download attachments from Confluence |
| embed | Embed 1x1 pixel image for credential farming |
| link | Add a link to a Confluence page |
| listattachments | List attachments on a page |
| listpages | List pages in Confluence spaces |
| listspaces | List all Confluence spaces |
| search | Search Confluence content with wildcards |
Jira Commands
| Command | Description |
|---|---|
| addcomment | Add a comment to a Jira issue |
| attach | Attach a file to a Jira issue |
| createissue | Create a new Jira issue |
| download | Download attachments from an issue |
| listattachments | List attachments on an issue |
| listissues | List issues in Jira projects |
| listprojects | List all Jira projects |
| listusers | List Atlassian users |
| searchissues | Search Jira issues |
Additional Resources
Blog Post
Sowing Chaos and Reaping Rewards in Confluence and Jira
GitHub Repository
Official AtlasReaper repository
Usage Guide
Practical usage examples
Contributing
If you encounter issues or have suggestions:- Submit a pull request
- Open an issue on GitHub
Author
AtlasReaper is developed by @werdhaihai at SpecterOps.