Remove cache files

This commit is contained in:
pe3zx 2018-05-25 19:01:53 +07:00
parent dac950dbd2
commit a44b5cfc3e
5 changed files with 0 additions and 227 deletions

View File

@ -1,26 +0,0 @@
strip_pdf() {
echo "Original Metadata for $1"
exiftool $1
echo "Removing Metadata...."
echo ""
qpdf --linearize $1 striped1-$1
exiftool -all:all= striped1-$1
qpdf --linearize striped1-$1 striped2-$1
rm striped1-$1
rm striped1-$1_original
echo "New Metadata for striped2-$1"
exiftool striped2-$1
echo ""
echo "Securing striped2-$1...."
password=$(cat /dev/urandom | tr -dc 'a-zA-Z0-9' | fold -w 40 | head -n 1)
echo "Password will be: $password"
echo ""
qpdf --linearize --encrypt "" $password 128 --print=full --modify=none --extract=n --use-aes=y -- striped2-$1 striped-$1
rm striped2-$1
echo "Final status of striped-$1"
pdfinfo striped-$1
}

View File

@ -1 +0,0 @@
# Beyond Good ol' Run key

View File

@ -1,6 +0,0 @@
# Detecting APT 28
- Using Event ID 4688 with Command Line logging enabled can trigger on Word calling cscript, wscript, and PowerShell as this is NOT normal.
- A DLL is used to infect the system using a batch file to load it which runs `RunDll32`. Alerts on `RunDll32` using 4688 with Command Line logging could trigger on this behavior.
- If using Windows Firewall logging, which does NOT require using the Windows Firewall, Detecting the IPs used to communicate to the C2 server with 5156 events.
- Monitoring changes to well known AutoRun registry locations could detect this behavior using a 4657 event. An Autoruns scanner like LOG-MD can also discover these malicious changes. This payload used the following key: `HKCU\Environment\UserInitMprLogonScrip`

View File

@ -1,9 +0,0 @@
# Detecting DDE
Can be done by looking for Windows Event Logs on Microsoft Office category in event 300 which should be contain alerts display that an Office application launched something. By the way, if there is no pop-up displayed during the attack, there will be no alert in logs. In this case, incident responder can catach this attack by looking for new process event which must be configure by the following command. When process auditing turned on, suspicious event can be seen in Microsoft Windows Security auditing, event 4688.
```
reg add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\Audit /f /t REG_SZ /v ProcessCreationIncludeCmdLine_Enabled=1
auditpol /set /Category:"Detailed Tracking" /subcategory:"Process Creation" /success:enable /failure:enable
```

View File

@ -1,185 +0,0 @@
# Windows Privileged Access Reference
<table>
<tr>
<th>Connectionmethod</th>
<th>Logon type</th>
<th>Reusable credentials on destination</th>
<th>Comments</th>
</tr>
<tr>
<td>Log on at console</td>
<td>Interactive</td>
<td>v</td>
<td>Includes hardware remote access / lights-out cards and network KVMs.</td>
</tr>
<tr>
<td>RUNAS</td>
<td>Interactive</td>
<td>v</td>
<td></td>
</tr>
<tr>
<td>RUNAS /NETWORK</td>
<td>NewCredentials</td>
<td>v</td>
<td>Clones current LSA session for local access, but uses new credentials when connecting to network resources.</td>
</tr>
<tr>
<td>Remote Desktop (success)</td>
<td>RemoteInteractive</td>
<td>v</td>
<td>If the remote desktop client is configured to share local devices and resources, those may be compromised as well.</td>
</tr>
<tr>
<td>Remote Desktop (failure - logon type was denied)</td>
<td>RemoteInteractive</td>
<td>-</td>
<td>By default, if RDP logon fails credentials are only stored very briefly. This may not be the case if the computer is compromised.</td>
</tr>
<tr>
<td>Net use * \\SERVER</td>
<td>Network</td>
<td>-</td>
<td></td>
</tr>
<tr>
<td>Net use * \\SERVER /u:user</td>
<td>Network</td>
<td>-</td>
<td></td>
</tr>
<tr>
<td>MMC snap-ins to remote computer</td>
<td>Network</td>
<td>-</td>
<td>Example: Computer Management, Event Viewer, Device Manager, Services</td>
</tr>
<tr>
<td>PowerShell WinRM</td>
<td>Network</td>
<td>-</td>
<td>Example: Enter-PSSession server</td>
</tr>
<tr>
<td>PowerShell WinRM with CredSSP</td>
<td>NetworkClearText</td>
<td>v</td>
<td>New-PSSession server-Authentication Credssp-Credential cred</td>
</tr>
<tr>
<td>PsExec without explicit creds</td>
<td>Network</td>
<td>-</td>
<td>Example: PsExec \\server cmd</td>
</tr>
<tr>
<td>PsExec with explicit creds</td>
<td>Network + Interactive</td>
<td>v</td>
<td>PsExec \\server -u user -p pwd cmdCreates multiple logon sessions.</td>
</tr>
<tr>
<td>Remote Registry</td>
<td>Network</td>
<td>-</td>
<td></td>
</tr>
<tr>
<td>Remote Desktop Gateway</td>
<td>Network</td>
<td>-</td>
<td>Authenticating to Remote Desktop Gateway.</td>
</tr>
<tr>
<td>Scheduled task</td>
<td>Batch</td>
<td>v</td>
<td>Password will also be saved as LSA secret on disk.</td>
</tr>
<tr>
<td>Run tools as a service</td>
<td>Service</td>
<td>v</td>
<td>Password will also be saved as LSA secret on disk.</td>
</tr>
<tr>
<td>Vulnerability scanners</td>
<td>Network</td>
<td>-</td>
<td>Most scanners default to using network logons, though some vendors may implement non-network logons and introduce more credential theft risk.</td>
</tr>
<tr>
<td>IIS "Basic Authentication"</td>
<td>NetworkCleartext(IIS 6.0+)Interactive(prior to IIS 6.0)</td>
<td>v</td>
<td></td>
</tr>
<tr>
<td>IIS "Integrated Windows Authentication"</td>
<td>Network</td>
<td>-</td>
<td>NTLM and Kerberos Providers.</td>
</tr>
</table>
<table>
<tr>
<th>Logon type</th>
<th>#</th>
<th>Authenticators accepted</th>
<th>Reusable credentials in LSA session</th>
<th>Examples</th>
</tr>
<tr>
<td>Interactive (a.k.a., Logon locally)</td>
<td>2</td>
<td>Password, Smartcard,other</td>
<td>Yes</td>
<td>Console logon;RUNAS;Hardware remote control solutions (such as Network KVM or Remote Access / Lights-Out Card in server)IIS Basic Auth (before IIS 6.0)</td>
</tr>
<tr>
<td>Network</td>
<td>3</td>
<td>Password,NT Hash,Kerberos ticket</td>
<td>No (except if delegation is enabled, then Kerberos tickets present)</td>
<td>NET USE;RPC calls;Remote registry;IIS integrated Windows auth;SQL Windows auth;</td>
</tr>
<tr>
<td>Batch</td>
<td>4</td>
<td>Password (usually stored as LSA secret)</td>
<td>Yes</td>
<td>Scheduled tasks</td>
</tr>
<tr>
<td>Service</td>
<td>5</td>
<td>Password (usually stored as LSA secret)</td>
<td>Yes</td>
<td>Windows services</td>
</tr>
<tr>
<td>NetworkCleartext</td>
<td>8</td>
<td>Password</td>
<td>Yes</td>
<td>IIS Basic Auth (IIS 6.0 and newer);Windows PowerShell with CredSSP</td>
</tr>
<tr>
<td>NewCredentials</td>
<td>9</td>
<td>Password</td>
<td>Yes</td>
<td>RUNAS /NETWORK</td>
</tr>
<tr>
<td>RemoteInteractive</td>
<td>10</td>
<td>Password, Smartcard,other</td>
<td>Yes</td>
<td>Remote Desktop (formerly known as "Terminal Services")</td>
</tr>
</table>