Modify logic to call PostBreachTelem.send() only once for modify shell startup files PBA
This commit is contained in:
parent
53707436df
commit
5fc6b6eb40
|
@ -1,8 +1,13 @@
|
||||||
|
import subprocess
|
||||||
|
|
||||||
from common.data.post_breach_consts import \
|
from common.data.post_breach_consts import \
|
||||||
POST_BREACH_SHELL_STARTUP_FILE_MODIFICATION
|
POST_BREACH_SHELL_STARTUP_FILE_MODIFICATION
|
||||||
from infection_monkey.post_breach.pba import PBA
|
from infection_monkey.post_breach.pba import PBA
|
||||||
from infection_monkey.post_breach.shell_startup_files.shell_startup_files_modification import \
|
from infection_monkey.post_breach.shell_startup_files.shell_startup_files_modification import \
|
||||||
get_commands_to_modify_shell_startup_files
|
get_commands_to_modify_shell_startup_files
|
||||||
|
from infection_monkey.telemetry.post_breach_telem import PostBreachTelem
|
||||||
|
|
||||||
|
EXECUTION_WITHOUT_OUTPUT = "(PBA execution produced no output)"
|
||||||
|
|
||||||
|
|
||||||
class ModifyShellStartupFiles(PBA):
|
class ModifyShellStartupFiles(PBA):
|
||||||
|
@ -12,8 +17,12 @@ class ModifyShellStartupFiles(PBA):
|
||||||
and profile.ps1 in windows.
|
and profile.ps1 in windows.
|
||||||
"""
|
"""
|
||||||
|
|
||||||
|
def __init__(self):
|
||||||
|
super(ModifyShellStartupFiles, self).__init__(name=POST_BREACH_SHELL_STARTUP_FILE_MODIFICATION)
|
||||||
|
|
||||||
def run(self):
|
def run(self):
|
||||||
[pba.run() for pba in self.modify_shell_startup_PBA_list()]
|
results = [pba.run() for pba in self.modify_shell_startup_PBA_list()]
|
||||||
|
PostBreachTelem(self, results).send()
|
||||||
|
|
||||||
def modify_shell_startup_PBA_list(self):
|
def modify_shell_startup_PBA_list(self):
|
||||||
return ShellStartupPBAGenerator.get_modify_shell_startup_pbas()
|
return ShellStartupPBAGenerator.get_modify_shell_startup_pbas()
|
||||||
|
@ -43,3 +52,14 @@ class ModifyShellStartupFile(PBA):
|
||||||
super(ModifyShellStartupFile, self).__init__(name=POST_BREACH_SHELL_STARTUP_FILE_MODIFICATION,
|
super(ModifyShellStartupFile, self).__init__(name=POST_BREACH_SHELL_STARTUP_FILE_MODIFICATION,
|
||||||
linux_cmd=linux_cmds,
|
linux_cmd=linux_cmds,
|
||||||
windows_cmd=windows_cmds)
|
windows_cmd=windows_cmds)
|
||||||
|
|
||||||
|
def run(self):
|
||||||
|
if self.command:
|
||||||
|
try:
|
||||||
|
output = subprocess.check_output(self.command, stderr=subprocess.STDOUT, shell=True).decode()
|
||||||
|
if not output:
|
||||||
|
output = EXECUTION_WITHOUT_OUTPUT
|
||||||
|
return output, True
|
||||||
|
except subprocess.CalledProcessError as e:
|
||||||
|
# Return error output of the command
|
||||||
|
return e.output.decode(), False
|
||||||
|
|
|
@ -14,8 +14,7 @@ class T1156(AttackTechnique):
|
||||||
used_msg = "Monkey modified bash startup files on the system."
|
used_msg = "Monkey modified bash startup files on the system."
|
||||||
|
|
||||||
query = [{'$match': {'telem_category': 'post_breach',
|
query = [{'$match': {'telem_category': 'post_breach',
|
||||||
'data.name': POST_BREACH_SHELL_STARTUP_FILE_MODIFICATION,
|
'data.name': POST_BREACH_SHELL_STARTUP_FILE_MODIFICATION}},
|
||||||
'data.command': {'$regex': 'bash'}}},
|
|
||||||
{'$project': {'_id': 0,
|
{'$project': {'_id': 0,
|
||||||
'machine': {'hostname': '$data.hostname',
|
'machine': {'hostname': '$data.hostname',
|
||||||
'ips': ['$data.ip']},
|
'ips': ['$data.ip']},
|
||||||
|
@ -25,14 +24,23 @@ class T1156(AttackTechnique):
|
||||||
def get_report_data():
|
def get_report_data():
|
||||||
data = {'title': T1156.technique_title(), 'info': []}
|
data = {'title': T1156.technique_title(), 'info': []}
|
||||||
|
|
||||||
bash_modification_info = list(mongo.db.telemetry.aggregate(T1156.query))
|
shell_startup_files_modification_info = list(mongo.db.telemetry.aggregate(T1156.query))
|
||||||
|
|
||||||
|
bash_startup_modification_info = []
|
||||||
|
for shell_startup_file_result in shell_startup_files_modification_info[0]['result']:
|
||||||
|
# only want bash startup files
|
||||||
|
if any(file_name in shell_startup_file_result[0] for file_name in [".bash", ".profile"]):
|
||||||
|
bash_startup_modification_info.append({
|
||||||
|
'machine': shell_startup_files_modification_info[0]['machine'],
|
||||||
|
'result': shell_startup_file_result
|
||||||
|
})
|
||||||
|
|
||||||
status = []
|
status = []
|
||||||
for pba_node in bash_modification_info:
|
for bash_startup_file in bash_startup_modification_info:
|
||||||
status.append(pba_node['result'][1])
|
status.append(bash_startup_file['result'][1])
|
||||||
status = (ScanStatus.USED.value if any(status) else ScanStatus.SCANNED.value)\
|
status = (ScanStatus.USED.value if any(status) else ScanStatus.SCANNED.value)\
|
||||||
if status else ScanStatus.UNSCANNED.value
|
if status else ScanStatus.UNSCANNED.value
|
||||||
|
|
||||||
data.update(T1156.get_base_data_by_status(status))
|
data.update(T1156.get_base_data_by_status(status))
|
||||||
data.update({'info': bash_modification_info})
|
data.update({'info': bash_startup_modification_info})
|
||||||
return data
|
return data
|
||||||
|
|
|
@ -14,8 +14,7 @@ class T1504(AttackTechnique):
|
||||||
used_msg = "Monkey modified powershell startup files on the system."
|
used_msg = "Monkey modified powershell startup files on the system."
|
||||||
|
|
||||||
query = [{'$match': {'telem_category': 'post_breach',
|
query = [{'$match': {'telem_category': 'post_breach',
|
||||||
'data.name': POST_BREACH_SHELL_STARTUP_FILE_MODIFICATION,
|
'data.name': POST_BREACH_SHELL_STARTUP_FILE_MODIFICATION}},
|
||||||
'data.command': {'$regex': 'powershell'}}},
|
|
||||||
{'$project': {'_id': 0,
|
{'$project': {'_id': 0,
|
||||||
'machine': {'hostname': '$data.hostname',
|
'machine': {'hostname': '$data.hostname',
|
||||||
'ips': ['$data.ip']},
|
'ips': ['$data.ip']},
|
||||||
|
@ -25,14 +24,23 @@ class T1504(AttackTechnique):
|
||||||
def get_report_data():
|
def get_report_data():
|
||||||
data = {'title': T1504.technique_title(), 'info': []}
|
data = {'title': T1504.technique_title(), 'info': []}
|
||||||
|
|
||||||
powershell_profile_modification_info = list(mongo.db.telemetry.aggregate(T1504.query))
|
shell_startup_files_modification_info = list(mongo.db.telemetry.aggregate(T1504.query))
|
||||||
|
|
||||||
|
powershell_startup_modification_info = []
|
||||||
|
for shell_startup_file_result in shell_startup_files_modification_info[0]['result']:
|
||||||
|
# only want powershell startup files
|
||||||
|
if "profile.ps1" in shell_startup_file_result[0]:
|
||||||
|
powershell_startup_modification_info.append({
|
||||||
|
'machine': shell_startup_files_modification_info[0]['machine'],
|
||||||
|
'result': shell_startup_file_result
|
||||||
|
})
|
||||||
|
|
||||||
status = []
|
status = []
|
||||||
for pba_node in powershell_profile_modification_info:
|
for powershell_startup_file in powershell_startup_modification_info:
|
||||||
status.append(pba_node['result'][1])
|
status.append(powershell_startup_file['result'][1])
|
||||||
status = (ScanStatus.USED.value if any(status) else ScanStatus.SCANNED.value)\
|
status = (ScanStatus.USED.value if any(status) else ScanStatus.SCANNED.value)\
|
||||||
if status else ScanStatus.UNSCANNED.value
|
if status else ScanStatus.UNSCANNED.value
|
||||||
|
|
||||||
data.update(T1504.get_base_data_by_status(status))
|
data.update(T1504.get_base_data_by_status(status))
|
||||||
data.update({'info': powershell_profile_modification_info})
|
data.update({'info': powershell_startup_modification_info})
|
||||||
return data
|
return data
|
||||||
|
|
Loading…
Reference in New Issue