bump
This commit is contained in:
parent
ae0f060b03
commit
bed4ce36cf
|
@ -2,7 +2,8 @@
|
||||||
|
|
||||||
Search through collected volatile memory dumps, volume and VM images.
|
Search through collected volatile memory dumps, volume and VM images.
|
||||||
Volatility and Volatility 3 have a different syntax. The older one has
|
Volatility and Volatility 3 have a different syntax. The older one has
|
||||||
higher malware hunting abilities.
|
higher malware hunting abilities.
|
||||||
|
Always check both of the versions if you are not sure about how the file was dumped.
|
||||||
|
|
||||||
* [Cheat sheet](https://downloads.volatilityfoundation.org/releases/2.4/CheatSheet_v2.4.pdf)
|
* [Cheat sheet](https://downloads.volatilityfoundation.org/releases/2.4/CheatSheet_v2.4.pdf)
|
||||||
* [Hacktricks shee](https://book.hacktricks.xyz/forensics/volatility-examples)
|
* [Hacktricks shee](https://book.hacktricks.xyz/forensics/volatility-examples)
|
||||||
|
@ -27,6 +28,18 @@ volatility -f <file.iso> --profile <OSprofile> dlllist -p <PID>
|
||||||
```sh
|
```sh
|
||||||
volatility -f <file.iso> --profile <OSprofile> shellbags
|
volatility -f <file.iso> --profile <OSprofile> shellbags
|
||||||
```
|
```
|
||||||
|
* Scan network
|
||||||
|
```sh
|
||||||
|
volatility -f <file.iso> --profile <OSprofile> netscan
|
||||||
|
```
|
||||||
|
* Scan files
|
||||||
|
```sh
|
||||||
|
volatility -f <file.iso> --profile <OSprofile> filescan | grep <fileToLookFor>
|
||||||
|
```
|
||||||
|
* Dump files
|
||||||
|
```sh
|
||||||
|
volatility -f <file.iso> --profile <OSprofile> dumpfiles -Q <addressFromfilescan> -D .
|
||||||
|
```
|
||||||
|
|
||||||
### Volatility3
|
### Volatility3
|
||||||
|
|
||||||
|
|
|
@ -0,0 +1,44 @@
|
||||||
|
# Exploit Mitigation
|
||||||
|
|
||||||
|
> All User Input is Evil
|
||||||
|
|
||||||
|
## Web Mitigations
|
||||||
|
|
||||||
|
### Uploads
|
||||||
|
|
||||||
|
* Validate the following
|
||||||
|
* Content-Type
|
||||||
|
* File Extension
|
||||||
|
* Magic File Number
|
||||||
|
* Maximum File Size
|
||||||
|
* Rename the file randomly
|
||||||
|
* Scan for Malware
|
||||||
|
* Use Path objects instead of Strings
|
||||||
|
* Save uploads outside of the web root
|
||||||
|
|
||||||
|
### Database SQLi
|
||||||
|
|
||||||
|
* Typecasting of variables inserted
|
||||||
|
* Prepared Statements
|
||||||
|
|
||||||
|
### HTML5 Input & Forms
|
||||||
|
|
||||||
|
* An `<input>` field can provide a pattern which checks for regex. In a free text field regex is not sufficient, therefore whitelist allowed characters.
|
||||||
|
* Use `type` attribute of `<input>` to set the type of the values
|
||||||
|
* Requirements on the inputs can be done in the following ways of `required <attributes>`:
|
||||||
|
* `minlength`
|
||||||
|
* `maxlength`
|
||||||
|
* `size`
|
||||||
|
* `min`
|
||||||
|
* `max`
|
||||||
|
* `pattern`
|
||||||
|
|
||||||
|
### PHP Input Backend
|
||||||
|
|
||||||
|
* `htmlentities()` escapes characters
|
||||||
|
```sh
|
||||||
|
$name = htmlentities($_GET['name'], ENT_QUOTES | ENT_HTML5, "UTF-8")
|
||||||
|
```
|
||||||
|
* Use HTMLPurifier
|
||||||
|
* Use `intval()` to typecast, e.g. ids
|
||||||
|
```
|
|
@ -0,0 +1,30 @@
|
||||||
|
# Sigma Rules
|
||||||
|
|
||||||
|
An abstracted yaml configuration setup which can be converted into multiple queries like Splunk, Kibana, Yara etc. ...
|
||||||
|
* [SigmaHQ's repo](https://github.com/SigmaHQ/sigma.git)
|
||||||
|
|
||||||
|
|
||||||
|
## Fields
|
||||||
|
|
||||||
|
A minimal configuration should contain at least the following fields
|
||||||
|
* title
|
||||||
|
* id
|
||||||
|
* status
|
||||||
|
* description
|
||||||
|
* logsource
|
||||||
|
* detection
|
||||||
|
|
||||||
|
Additional fields may be
|
||||||
|
* falsePostivives
|
||||||
|
* levels
|
||||||
|
* tags
|
||||||
|
|
||||||
|
## Transform Modifiers
|
||||||
|
|
||||||
|
A detection selection can be refined through setting a pipe `|` followed by the modifier `contains`, `endswith`, `startswith` and `all`.
|
||||||
|
|
||||||
|
## Tools
|
||||||
|
|
||||||
|
* [sigma-cli](https://github.com/SigmaHQ/sigma-cli)
|
||||||
|
* [pySigma](https://github.com/SigmaHQ/pySigma)
|
||||||
|
* [Uncoder.io](https://uncoder.io/)
|
|
@ -1,6 +1,7 @@
|
||||||
# Reversing Firmware
|
# Reversing Firmware
|
||||||
|
|
||||||
## Tools
|
## Tools
|
||||||
|
|
||||||
* binwalk
|
* binwalk
|
||||||
* unlzma
|
* unlzma
|
||||||
* tar
|
* tar
|
||||||
|
@ -10,15 +11,30 @@
|
||||||
./fat.py <firmware>
|
./fat.py <firmware>
|
||||||
```
|
```
|
||||||
* [Jefferson](https://github.com/sviehb/jefferson) or AUR package `jefferson-git`
|
* [Jefferson](https://github.com/sviehb/jefferson) or AUR package `jefferson-git`
|
||||||
|
* Squashfs
|
||||||
|
|
||||||
## Usage
|
## Usage
|
||||||
|
|
||||||
* Check image via `strings`
|
* Check image via `strings`
|
||||||
* Check CRC via `cksum -a crc <image>`
|
* Check CRC via `cksum -a crc <image>`
|
||||||
* Use `binwalk` to extract. There are to methods
|
* Use `binwalk` to extract. There are to methods
|
||||||
* `-e` extract by offset
|
* `-e` extract by offset
|
||||||
* `--dd=".*"` by file extension
|
* `--dd=".*"` by file extension
|
||||||
|
|
||||||
|
### Mount Squashfs
|
||||||
|
|
||||||
|
Extract the filesystem of a firmware image
|
||||||
|
|
||||||
|
* Use `squashfs-tools`
|
||||||
|
* Extract via binwalk and
|
||||||
|
```sh
|
||||||
|
unsquashfs <SquashFS image>
|
||||||
|
mksquashfs squashfs-root filesystem.squashfs
|
||||||
|
mount filesystem.squashfs /mtn/squash
|
||||||
|
```
|
||||||
|
|
||||||
### Mount JFFS2 File
|
### Mount JFFS2 File
|
||||||
|
|
||||||
* Use kernel where `CONFIG_MTD_RAM` is set. Using Arch this is any kernel before `5.10`
|
* Use kernel where `CONFIG_MTD_RAM` is set. Using Arch this is any kernel before `5.10`
|
||||||
```sh
|
```sh
|
||||||
rm -rf /dev/mtdblock0
|
rm -rf /dev/mtdblock0
|
||||||
|
@ -32,4 +48,5 @@ mount -t jffs2 /dev/mtdblock0 /mnt/jffs2/
|
||||||
```
|
```
|
||||||
|
|
||||||
## Tips & Tricks
|
## Tips & Tricks
|
||||||
|
|
||||||
* Watch out for `HNAP` and `JNAP` as [an attack vector](https://routersecurity.org/hnap.php)
|
* Watch out for `HNAP` and `JNAP` as [an attack vector](https://routersecurity.org/hnap.php)
|
||||||
|
|
Loading…
Reference in New Issue