Original sending to Mockbin (use a new mockbin)
[byte[]]$NTLMType2 =
@(
0x4e,0x54,0x4c,0x4d,
0x53,0x53,0x50,0x00,
0x02,0x00,0x00,0x00,
0x00,0x00,0x00,0x00,
0x00,0x28,0x00,0x00,
| - name: PrintDemon | |
| description: | | |
| Atomic Test to emulate PrintDemon. | |
| [Reference](https://github.com/BC-SECURITY/Invoke-PrintDemon) | |
| Also seen on TryHackme - https://tryhackme.com/room/dllhijacking | |
| supported_platforms: | |
| - windows | |
| input_arguments: | |
| dll_path: | |
| description: File path for ualapi.dll |
| - name: Headless Browser Accessing Mockbin | |
| description: | | |
| The following Atomic Red Team test leverages the Chrome headless browser to access a mockbin site. Create your own Mockbin.org site and replace the BIN in the inputs. | |
| supported_platforms: | |
| - windows | |
| input_arguments: | |
| bin_id: | |
| description: Mockbin.org BIN ID | |
| type: string | |
| default: f6b9a876-a826-4ac0-83b8-639d6ad516ec |
| import requests | |
| import os | |
| import json | |
| file_path = "ids.txt" | |
| base_url = "https://mockbin.org/bin" | |
| log_directory = "logs" | |
| script_directory = "scripts" | |
| if not os.path.exists(log_directory): |
Original sending to Mockbin (use a new mockbin)
[byte[]]$NTLMType2 =
@(
0x4e,0x54,0x4c,0x4d,
0x53,0x53,0x50,0x00,
0x02,0x00,0x00,0x00,
0x00,0x00,0x00,0x00,
0x00,0x28,0x00,0x00,
| - name: Modify Internet Zone Protocol Defaults in Current User Registry - cmd | |
| description: | | |
| This test simulates an adversary modifying the Internet Zone Protocol Defaults in the registry of the currently logged-in user using the reg.exe utility via the command prompt. Such modifications can be indicative of an adversary trying to weaken browser security settings. Upon execution, if successful, the message "The operation completed successfully." will be displayed. | |
| To verify the effects of the test: | |
| 1. Open the Registry Editor (regedit.exe). | |
| 2. Navigate to "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProtocolDefaults". | |
| 3. Check for the presence of the "http" and "https" DWORD values set to `0`. | |
| Or run: | |
| ```batch |
Inventory Protocol Handlers
Splunk:
[powershell://LOLProtocolHandlers]
script = Get-Item Registry::HKEY_CLASSES_ROOT\*| Select-Object "Property", "PSChildName" | ForEach-Object { $_ | ConvertTo-Json; Write-Host "" }
#schedule = 0 0 * * *
schedule = */1 * * * *
sourcetype = PwSh:LOLProtocolHandlers
index=win
| #include <windows.h> | |
| #include <iostream> | |
| #include <dbghelp.h> | |
| #include <TlHelp32.h> | |
| #define IOCTL_BASE 0x80012008 | |
| constexpr DWORD IREC_IOCTL(DWORD x) { return IOCTL_BASE + x; } | |
| #define IOTCL_IREC_OPEN_PROCESS IREC_IOCTL( 0x20 ) | |
| static const char* DeviceName = R"(\\.\IREC)"; |
My script, PowerDropping, currently accomplishes the following parts of the PowerDrop behavior:
Rapid7 incident response consultants have identified a method to determine what was exfiltrated from compromised MOVEit customer environments. MOVEit writes its own Windows EVTX file, which is located at C:\Windows\System32\winevt\Logs\MOVEit.evtx. The MOVEit event logs contain a single event ID (Event ID 0) that provides a plethora of information, including the following: