Ausnahme gefangen: SSL certificate problem: certificate is not yet valid ๐Ÿ“Œ Swift-Attack - Unit Tests For Blue Teams To Aid With Building Detections For Some Common macOS Post Exploitation Methods

๐Ÿ  Team IT Security News

TSecurity.de ist eine Online-Plattform, die sich auf die Bereitstellung von Informationen,alle 15 Minuten neuste Nachrichten, Bildungsressourcen und Dienstleistungen rund um das Thema IT-Sicherheit spezialisiert hat.
Ob es sich um aktuelle Nachrichten, Fachartikel, Blogbeitrรคge, Webinare, Tutorials, oder Tipps & Tricks handelt, TSecurity.de bietet seinen Nutzern einen umfassenden รœberblick รผber die wichtigsten Aspekte der IT-Sicherheit in einer sich stรคndig verรคndernden digitalen Welt.

16.12.2023 - TIP: Wer den Cookie Consent Banner akzeptiert, kann z.B. von Englisch nach Deutsch รผbersetzen, erst Englisch auswรคhlen dann wieder Deutsch!

Google Android Playstore Download Button fรผr Team IT Security



๐Ÿ“š Swift-Attack - Unit Tests For Blue Teams To Aid With Building Detections For Some Common macOS Post Exploitation Methods


๐Ÿ’ก Newskategorie: IT Security Nachrichten
๐Ÿ”— Quelle: feedproxy.google.com


Unit tests for blue teams to aid with building detections for some common macOS post exploitation methods. I have included some post exploitation examples using both command line history and on disk binaries (which should be easier for detection) as well as post exploitation examples using API calls only (which will be more difficult for detection). The post exploitation examples included here are not all encompassing. Instead these are just some common examples that I thought w ould be useful to conduct unit tests around. I plan to continue to add to this project over time with additional unit tests.

All of these tests run locally and return results to stdout (i.e., Swift-Attack does not connect to a server).


Steps:

git clone https://github.com/cedowens/Swift-Attack

  • Ensure you have installed swift and developer tools (can install from the mac app store)

  • open the xcodeproj file in XCode

  • Build in XCode

  • The compiled app will be dropped to something like: Users//Library/Developer/Xcode/DerivedData/Swift-Attack-[random]/Build/Products/Debug/Swift-Attack.app

  • cd to the directory above

  • cd Swift-Attack.app/Contents/MacOS (you can run the macho from here or copy it elsewhere and run...up to you)

  • grant the Swift-Attack macho full disk access to ensure you can run all of the tests without TCC issues

  • run the following to remove any quarantine attributes:

xattr -c Swift-Attack

  • Run Swift-Attack:

./Swift-Attack -h


Usage:

You can run Swift-Attack with a single option or multiple options

./Swift-Attack [option1] [option2]...

  • I also included a simple macro.txt file (unobfuscated) for testing parent-child relationships around office macro executions on macOS. I did not obfuscate it since the focus is on parent-child relationship visibility/detection. If you want to test with an obfuscated macro, I have a repo at github.com/cedowens/MacC2 that contains an obfuscated macro.

  • I also did not include any persistence items, since in my opinion it is best to just clone and test persistence using Leo Pitt's persistent JXA repo https://github.com/D00MFist/PersistentJXA. This repo is by far the most comprehensive and current repo that I know of for macOS persistence.

  • I recently ported some of the PersistentJXA repos over to Swift: https://github.com/cedowens/Persistent-Swift


Unit Tests Included:
  • Prompt using osascript binary

  • Prompt via API calls

  • Clipboard dump using osascript binary

  • Clipboard dump using API calls

  • Screenshot using screencapture binary

  • Screenshot using API calls

  • Shell commands

  • Dumping zsh history

  • Security tool enumeration

  • Grabbing system info using osascript binary

  • Grabbing system info via API calls

  • Dumping ssh, aws, gcp, and azure keys on disk

  • Dumping browser history (Chrome, Safari, Firefox)

  • Dumping Quarantine history

  • Office Macro: I included a simple office macro that connects to local host. Note: the macro will invoke curl to make a GET request using python to http://127.0.0.1/testing when executed by clicking the "Enable Macros" button. This will allow you to test detections for parent-child relationships around macro execution. Note: this simple test does not include any obfuscation, since the test is really more geared towards parent-child relationships. You can use another repo of mine at https://github.com/cedowens/MacC2 to test with obfuscated macros. To use, just simply paste the contents of "macro.txt" into an office Doc, save as a macro enabled document or as 97-2004 document format (ex: .doc, .xls, etc.), and click "Enable Macros" when opening the doc to execute.

  • Installer Package: I included TestInstaller.pkg file to test for detections around a basic installer package. This installer package includes a preinstall script which runs in bash and drops com.simple.agent.plist to /Library/LaunchDaemons/ and drops test.js (simple popup prompt) to /Library/Application Support/. The com.simple.agent.plist file simply runs osascript against /Library/Application Support/test.js. It also includes a postinstall script which runs in bash and loads the com.simple.agent.plis using launchctl load. While holding the Control button click Open on TestInstaller.pkg to run it. TestInstaller.pkg will drop the aforementioned files as root.

  • CVE-2021-30657 Bypass Payloads: Two sample payloads (both make curl requests to localhost when detonated) to test two different types of payloads that abuse cve-2021-30657. More info here: https://cedowens.medium.com/macos-gatekeeper-bypass-2021-edition-5256a2955508



...



๐Ÿ“Œ Evasor - A Tool To Be Used In Post Exploitation Phase For Blue And Red Teams To Bypass APPLICATIONCONTROL Policies


๐Ÿ“ˆ 36.02 Punkte

๐Ÿ“Œ Different types of injection methods/detections explained - [ CreateRemoteThread, Process Hollowing, APC Injection, Thread Hijacking]


๐Ÿ“ˆ 33.88 Punkte

๐Ÿ“Œ Nebula - Cloud C2 Framework, Which At The Moment Offers Reconnaissance, Enumeration, Exploitation, Post Exploitation On AWS


๐Ÿ“ˆ 31.13 Punkte

๐Ÿ“Œ Mimicry - Security Tool For Active Deception In Exploitation And Post-Exploitation


๐Ÿ“ˆ 31.13 Punkte

๐Ÿ“Œ Red Teams, White Teams, and Blue Teams for Beginners


๐Ÿ“ˆ 30.26 Punkte

๐Ÿ“Œ BeRoot- A Post Exploitation Tool To Check Common Misconfigurations For Windows Linux And Mac OS


๐Ÿ“ˆ 28.85 Punkte

๐Ÿ“Œ Shlayer Trojan Accounted for 30 Percent of Detections for macOS in 2019


๐Ÿ“ˆ 27.37 Punkte

๐Ÿ“Œ RedGhost v2.0 - Linux Post Exploitation Framework Designed To Assist Red Teams In Gaining Persistence, Reconnaissance And Leaving No Trace


๐Ÿ“ˆ 25.94 Punkte

๐Ÿ“Œ Homebrew: How to install post-exploitation tools on macOS


๐Ÿ“ˆ 24.4 Punkte

๐Ÿ“Œ Mouse Framework- Post Exploitation For iOS And macOS Application


๐Ÿ“ˆ 24.4 Punkte

๐Ÿ“Œ Massive US Coronavirus Stimulus Includes Research Dollars, Some Aid To Universities


๐Ÿ“ˆ 23.99 Punkte

๐Ÿ“Œ RouterSploit - Find Router Exploitation on Kali Linux 2018.2 (Router Exploitation Framework)


๐Ÿ“ˆ 23.82 Punkte

๐Ÿ“Œ RouterSploit - Find Router Exploitation on Kali Linux (Router Exploitation Framework)


๐Ÿ“ˆ 23.82 Punkte

๐Ÿ“Œ CISA Releases Guidelines to Aid Companies Transition to Post-quantum Cryptography


๐Ÿ“ˆ 23.63 Punkte

๐Ÿ“Œ Trump Threatens To Block Aid For US Post Office If It Does Not Raise Prices


๐Ÿ“ˆ 23.63 Punkte

๐Ÿ“Œ Exploitation Methods Used by PlugX Malware Revealed by Splunk Research


๐Ÿ“ˆ 23.61 Punkte

๐Ÿ“Œ „Red Teams“ gegen „Blue Teams“: Bundeswehr nimmt an NATO-Cyberübung teil


๐Ÿ“ˆ 23.53 Punkte

๐Ÿ“Œ โ€žRed Teamsโ€œ gegen โ€žBlue Teamsโ€œ: Bundeswehr nimmt an NATO-Cyberรผbung teil


๐Ÿ“ˆ 23.53 Punkte

๐Ÿ“Œ 62% of blue teams have difficulty stopping red teams during adversary simulation exercises


๐Ÿ“ˆ 23.53 Punkte

๐Ÿ“Œ Ransomware Sees Triple-Digit Spike in Corporate Detections


๐Ÿ“ˆ 22.18 Punkte

๐Ÿ“Œ Microsoft: Malware, ransomware, and cryptominer detections are down in 2019


๐Ÿ“ˆ 22.18 Punkte

๐Ÿ“Œ Antivirus & Multiple Detections, (Sun, May 17th)


๐Ÿ“ˆ 22.18 Punkte

๐Ÿ“Œ Elastic Security Opens Public Detections Rules Repo - James Spiteri - PSW #667


๐Ÿ“ˆ 22.18 Punkte

๐Ÿ“Œ Rediscovering Limitations of Stateful Firewalls: "NAT Slipstreaming" ? Implications, Detections and Mitigations , (Fri, Nov 6th)


๐Ÿ“ˆ 22.18 Punkte

๐Ÿ“Œ Report highlights top 10 threat detections seen across Microsoft Azure AD and Office 365


๐Ÿ“ˆ 22.18 Punkte

๐Ÿ“Œ iot malware detections soar 273% since 2017. kaspersky lab warns home users of growing threat


๐Ÿ“ˆ 22.18 Punkte

๐Ÿ“Œ Malware detections surge by 48% in 2019


๐Ÿ“ˆ 22.18 Punkte

๐Ÿ“Œ Want to see list of malware detections by Microsoft Defender? Here's how.


๐Ÿ“ˆ 22.18 Punkte

๐Ÿ“Œ COVID-19-themed cyberattack detections continue to surge


๐Ÿ“ˆ 22.18 Punkte

๐Ÿ“Œ Top 10 threat detections seen across Microsoft Azure AD and Office 365


๐Ÿ“ˆ 22.18 Punkte

๐Ÿ“Œ Uptycs Introduces Detections that Correlate Threat Activity from the Kubernetes Control Plane and Container Runtime


๐Ÿ“ˆ 22.18 Punkte

๐Ÿ“Œ Leveraging the Apple ESF for Behavioral Detections


๐Ÿ“ˆ 22.18 Punkte











matomo