Ausnahme gefangen: SSL certificate problem: certificate is not yet valid ๐Ÿ“Œ UAC - Unix-like Artifacts Collector

๐Ÿ  Team IT Security News

TSecurity.de ist eine Online-Plattform, die sich auf die Bereitstellung von Informationen,alle 15 Minuten neuste Nachrichten, Bildungsressourcen und Dienstleistungen rund um das Thema IT-Sicherheit spezialisiert hat.
Ob es sich um aktuelle Nachrichten, Fachartikel, Blogbeitrรคge, Webinare, Tutorials, oder Tipps & Tricks handelt, TSecurity.de bietet seinen Nutzern einen umfassenden รœberblick รผber die wichtigsten Aspekte der IT-Sicherheit in einer sich stรคndig verรคndernden digitalen Welt.

16.12.2023 - TIP: Wer den Cookie Consent Banner akzeptiert, kann z.B. von Englisch nach Deutsch รผbersetzen, erst Englisch auswรคhlen dann wieder Deutsch!

Google Android Playstore Download Button fรผr Team IT Security



๐Ÿ“š UAC - Unix-like Artifacts Collector


๐Ÿ’ก Newskategorie: IT Security Nachrichten
๐Ÿ”— Quelle: feedproxy.google.com


UAC is a Live Response collection tool for Incident Response that makes use of built-in tools to automate the collection of Unix-like systems artifacts. It respects the order of volatility and artifacts that are changed during the execution. It was created to facilitate and speed up data collection, and depend less on remote support during incident response engagements.

UAC can also be run against mounted forensic images. Please take a look at the conf/uac.conf file for more details.

You can use your own validated tools during artifact collection. They will be used instead of the built-in ones provided by the target system. Please refer to bin/README.txt for more information.


Supported Systems
  • AIX
  • BSD
  • Linux
  • macOS
  • Solaris

Collectors

Process (-p)

Collect information, calculate MD5 hash, and extract strings from running processes.


Network (-n)

Collect active network connections with related process information.


User (-u)

Collect user accounts information, login related files, and activities. The list of files and directories that will be collected can be found in the conf/user_files.conf file.


System (-y)

Collect system information, system configuration files, and kernel related details. The list of files and directories that will be collected can be found in the conf/system_files.conf file.


Hardware (-w)

Collect low-level hardware information.


Software (-s)

Collect information about installed packages and software.


Disk Volume and File System (-d)

Collect information about disks, volumes, and file systems.


Docker and Virtual Machine (-k)

Collect docker and virtual machines' information.


Body File (-b)

Extract information from files and directories using the stat or stat.pl tool to create a body file. The body file is an intermediate file when creating a timeline of file activity. It is a pipe ("|") delimited text file that contains one line for each file. Plaso or mactime tools can be used to read this file and sorts the contents.


Logs (-l)

Collect log files and directories. The list of files and directories that will be collected can be found in the conf/logs.conf file.


Suspicious Files (-f)

Collect suspicious files and directories. The list of files and directories that will be collected can be found in the conf/suspicious_files.conf file.


Extensions

chkrootkit

Run chkrootkit tool (if available). Note that chrootkit tool is not provided by UAC. You need to either have it available on the target system or download and compile it, and make its static binary file available through bin directory. Please refer to bin/README.txt for more information.


fls

Run Sleuth Kit fls tool (if available) against all mounted block devices. Note that fls tool is not provided by UAC. You need to either have it available on the target system or download and compile it, and make its static binary file available through bin directory. Please refer to bin/README.txt for more information.


hash_exec

Collect MD5 hashes for all executable files. By default, only files smaller than 3072000 bytes (3MB) will be hashed. Please take a look on the extensions/hash_exec/hash_exec.conf file more details. Warning: this extension will change the last accessed date of the touched files.


Profiles

One of the following profiles will be selected automatically according to the kernel name running on the current system. You can manually select one using the -P option though. This is useful when either UAC was not able to identify the correct profile for the current running system or when you are running UAC against a mounted forensic image.


aix

Use this profile to collect AIX artifacts.


bsd

Use this profile to collect BSD-based systems artifacts.
e.g. FreeBSD, NetBSD, OpenBSD, NetScaler...


linux

Use this profile to collect Linux-based systems artifacts.
*e.g. Debian, Red Hat, SuSE, Arch Linux, OpenWRT, QNAP QTS, Linux running on top of Windows (WSL)...


macos

Use this profile to collect macOS artifacts.


solaris

Use this profile to collect Solaris artifacts.


Options

Date Range (-R)

The range of dates to be used during logs, suspicious files, user files, and hash executable files collection. The date range is used to limit the amount of data collected by filtering files using find's -atime, -mtime or -ctime parameter. By default, UAC will search for files that data was last modified (-mtime) OR status last changed (-ctime) within the given date range. Please refer to conf/uac.conf for more details. The standard format is YYYY-MM-DD for a starting date and no ending date. For an ending date, use YYYY-MM-DD..YYYY-MM-DD.


Output File Transfer (-T)

Transfer the output file to a remote server using scp. The destination must be specified in the form [user@]host:[path]. It is recommended to use SSH key authentication in order to automate the transfer and avoid any password prompt during the process.


Debug (-D)

Increase debugging level.


Verbose (-V)

Increase verbosity level.


Run as non-root (-U)

Allow UAC to be run by a non-root user. Note that data collection will be limited.


Configuration Files

conf/uac.conf

The main UAC configuration file.


conf/logs.conf

Directory or file paths that will be searched and collected by the logs (-l) collector. If a directory path is added, all files and subdirectories will be collected automatically. The find command line tool will be used to search for files and directories, so the patterns added to this file need to be compatible with the -name option. Please check find man pages for instructions.


conf/suspicious_files.conf

Directory or file paths that will be searched and collected by the suspicious files (-f) collector. If a directory path is added, all files and subdirectories will be collected automatically. The find command line tool will be used to search for files and directories, so the patterns added to this file need to be compatible with the -name option. Please check find man pages for instructions.


conf/system_files.conf

Directory or file paths that will be searched and collected by the system files (-y) collector. If a directory path is added, all files and subdirectories will be collected automatically. The find command line tool will be used to search for files and directories, so the patterns added to this file need to be compatible with the -name option. Please check find man pages for instructions.


conf/user_files.conf

Directory or file paths that will be searched and collected by the user files (-u) collector. If a directory path is added, all files and subdirectories will be collected automatically. The find command line tool will be used to search for files and directories, so the patterns added to this file need to be compatible with the -name option. Please check find man pages for instructions.


conf/exclude.conf

Directory or file paths that will be excluded from the collection. If a directory path is added, all files and subdirectories will be skilled automatically. The find command line tool will be used to search for files and directories, so the patterns added to this file need to be compatible with -path and -name options. Please check find man pages for instructions.


Usage
UAC (Unix-like Artifacts Collector)
Usage: ./uac COLLECTORS [-e EXTENSION_LIST] [-P PROFILE] [OPTIONS] [DESTINATION]

COLLECTORS:
-a Enable all collectors.
-p Collect information, calculate MD5 hash, and extract strings from running processes.
-n Collect active network connections with related process information.
-u Collect user accounts information, login related files, and activities.
-y Collect system information, system configuration files, and kernel related details.
-w Collect low-level hardware information.
-s Collect information about installed packages and software.
-d Collect information about disks, volumes, and file systems.
-k Collect docker and virtual machines information.
-b Extract information from files and directories using the stat tool to create a body file.
-l Collect log files and directories.
-f Collect suspicious files and directories.

EXTENSIONS:
-e EXTENSION_LIST
Comma-separated list of extensions.
all: Enable all extensions.
chkrootkit: Run chkrootkit tool.
fls: Run Sleuth Kit fls tool.
hash_exec: Hash executable files.

PROFILES:
-P PROFILE Force UAC to use a specific profile.
aix: Use this one to collect AIX artifacts.
bsd: Use this one to collect BSD-based systems artifacts.
linux: Use this one to collect Linux-based systems artifacts.
macos: Use this one to collect macOS artifacts.
solaris: Use this one to collect Solaris artifacts.

OPTIONS:
-R Starting date YYYY-MM-DD or range YYYY-MM-DD..YYYY-MM-DD
-T DESTINATION
Transfer output file to a remote server using scp.
The destination must be specified in the form [user@]host:[path]
-D Increase debugging level.
-V Increase verbosity level.
-U Allow UAC to be run by a non-root user. Note that data collection will be limited.
-v Print version number.
-h Print this help summary page.

DESTINATION:
Specify the directory the output will be saved to.
The default is the current directory.

Output

When UAC finishes, all collected data is compressed and the resulting file is stored in the destination directory. The compressed file is hashed (MD5) and the value is stored on a .md5 file.


Examples

Run all collectors against the current running system and use the current directory as the destination. Extensions will not be run:

./uac -a

Run all collectors and all extensions against the current running system, and use /tmp as the destination directory:

./uac -a -e all /tmp

Run only hash_exec and chkrootkit extensions against the current running system, force linux profile and use /mnt/share as the destination directory:

./uac -e hash_exec,chkrootkit -P linux /mnt/share

Run only process, hardware and logs collectors against the current running system, force solaris profile, use /tmp as the destination directory, and increase verbosity level:

./uac -p -w -l -P solaris -V /tmp


...



๐Ÿ“Œ [papers] UAC Bypass & Research with UAC-A-Mola


๐Ÿ“ˆ 32.67 Punkte

๐Ÿ“Œ UAC Bypass And Research With UAC-A-Mola


๐Ÿ“ˆ 32.67 Punkte

๐Ÿ“Œ UAC-A-Mola - Tool That Allows Security Researchers To Investigate New UAC Bypasses, In Addition To Detecting And Exploiting Known Bypasses


๐Ÿ“ˆ 32.67 Punkte

๐Ÿ“Œ ByeIntegrity-UAC - Bypass UAC By Hijacking A DLL Located In The Native Image Cache


๐Ÿ“ˆ 32.67 Punkte

๐Ÿ“Œ CVE-2024-24260 | ireader media-server 1.0.0 /uac/sip-uac-subscribe.c sip_subscribe_remove use after free


๐Ÿ“ˆ 32.67 Punkte

๐Ÿ“Œ Cve-Collector - Simple Latest CVE Collector


๐Ÿ“ˆ 28.07 Punkte

๐Ÿ“Œ Digital Forensics โ€“ Prefetch Artifacts


๐Ÿ“ˆ 20.18 Punkte

๐Ÿ“Œ Digital Forensics โ€“ ShimCache Artifacts


๐Ÿ“ˆ 20.18 Punkte

๐Ÿ“Œ Digital Forensics โ€“ ShimCache Artifacts


๐Ÿ“ˆ 20.18 Punkte

๐Ÿ“Œ Digital Forensics โ€“ Prefetch Artifacts


๐Ÿ“ˆ 20.18 Punkte

๐Ÿ“Œ Digital Forensics โ€“ Prefetch Artifacts


๐Ÿ“ˆ 20.18 Punkte

๐Ÿ“Œ Digital Forensics โ€“ ShimCache Artifacts


๐Ÿ“ˆ 20.18 Punkte

๐Ÿ“Œ Digital Forensics โ€“ ShimCache Artifacts


๐Ÿ“ˆ 20.18 Punkte

๐Ÿ“Œ Digital Forensics โ€“ Prefetch Artifacts


๐Ÿ“ˆ 20.18 Punkte

๐Ÿ“Œ Simple command line forensics tool for tracking USB device artifacts (history of USB events) on GNU/Linux


๐Ÿ“ˆ 20.18 Punkte

๐Ÿ“Œ Usbrip - Simple Command Line Forensics Tool For Tracking USB Device Artifacts (History Of USB Events) On GNU/Linux


๐Ÿ“ˆ 20.18 Punkte

๐Ÿ“Œ Malcolm - A Powerful, Easily Deployable Network Traffic Analysis Tool Suite For Full Packet Capture Artifacts (PCAP Files) And Zeek Logs


๐Ÿ“ˆ 20.18 Punkte

๐Ÿ“Œ Digital Forensics โ€“ PlugX and Artifacts left behind


๐Ÿ“ˆ 20.18 Punkte

๐Ÿ“Œ Almost All Bronze Age Artifacts Were Made From Meteorite Iron


๐Ÿ“ˆ 20.18 Punkte

๐Ÿ“Œ Olympic Destroyer, alleged artifacts and false flag make attribution impossible


๐Ÿ“ˆ 20.18 Punkte

๐Ÿ“Œ Rome's Subway Expansion Reveals Artifacts From The Ancient Past


๐Ÿ“ˆ 20.18 Punkte

๐Ÿ“Œ Digital Forensics โ€“ Artifacts of interactive sessions


๐Ÿ“ˆ 20.18 Punkte

๐Ÿ“Œ GitHub Security Lab: Java (Maven): Use of insecure protocol to download/upload artifacts


๐Ÿ“ˆ 20.18 Punkte

๐Ÿ“Œ Hosting your own NuGet Server and Feed for build artifacts with BaGet


๐Ÿ“ˆ 20.18 Punkte

๐Ÿ“Œ Computer Forensic Artifacts: Windows 7 Shellbags


๐Ÿ“ˆ 20.18 Punkte

๐Ÿ“Œ Wikipedia Seeks Photos of 20 Million Artifacts Lost in Brazil Museum Fire


๐Ÿ“ˆ 20.18 Punkte

๐Ÿ“Œ Nexus Repository Flaws Expose Thousands of Private Artifacts


๐Ÿ“ˆ 20.18 Punkte

๐Ÿ“Œ Share packages publicly from Azure Artifacts โ€“ Public Preview


๐Ÿ“ˆ 20.18 Punkte

๐Ÿ“Œ Python package (PyPI) support for Azure Artifacts now in preview


๐Ÿ“ˆ 20.18 Punkte

๐Ÿ“Œ Destiny 2 'Artifacts' allow you to indefinitely increase your Power Level


๐Ÿ“ˆ 20.18 Punkte

๐Ÿ“Œ Big Brother Forensics: Device Tracking Using Browser-Based Artifacts (Part 2)


๐Ÿ“ˆ 20.18 Punkte

๐Ÿ“Œ Big Brother Forensics: Device Tracking Using Browser-Based Artifacts (Part 1)


๐Ÿ“ˆ 20.18 Punkte

๐Ÿ“Œ GitHub Security Lab: Java (Maven): Actually fix the use of insecure protocol to download/upload artifacts


๐Ÿ“ˆ 20.18 Punkte

๐Ÿ“Œ MLOps feature dive: Manage your assets, artifacts and code


๐Ÿ“ˆ 20.18 Punkte











matomo