Merge pull request #698 from shreyamalviya/T1154

Add T1154 attack technique (trap command)
This commit is contained in:
Shreya Malviya 2020-07-13 19:28:24 +05:30 committed by GitHub
commit 7415a5eb89
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
9 changed files with 131 additions and 4 deletions

View File

@ -3,3 +3,4 @@ POST_BREACH_BACKDOOR_USER = "Backdoor user"
POST_BREACH_FILE_EXECUTION = "File execution" POST_BREACH_FILE_EXECUTION = "File execution"
POST_BREACH_SHELL_STARTUP_FILE_MODIFICATION = "Modify shell startup file" POST_BREACH_SHELL_STARTUP_FILE_MODIFICATION = "Modify shell startup file"
POST_BREACH_HIDDEN_FILES = "Hide files and directories" POST_BREACH_HIDDEN_FILES = "Hide files and directories"
POST_BREACH_TRAP_COMMAND = "Execute command when a particular signal is received"

View File

@ -0,0 +1,13 @@
from common.data.post_breach_consts import POST_BREACH_TRAP_COMMAND
from infection_monkey.post_breach.pba import PBA
from infection_monkey.post_breach.trap_command.trap_command import\
get_trap_commands
from infection_monkey.utils.environment import is_windows_os
class TrapCommand(PBA):
def __init__(self):
if not is_windows_os():
linux_cmds = get_trap_commands()
super(TrapCommand, self).__init__(POST_BREACH_TRAP_COMMAND,
linux_cmd=linux_cmds)

View File

@ -0,0 +1,5 @@
def get_linux_trap_commands():
return [
'trap \'echo \"Successfully used trap command\"\' INT && kill -2 $$ ;', # trap and send SIGINT signal
'trap - INT' # untrap SIGINT
]

View File

@ -0,0 +1,7 @@
from infection_monkey.post_breach.trap_command.linux_trap_command import\
get_linux_trap_commands
def get_trap_commands():
linux_cmds = get_linux_trap_commands()
return linux_cmds

View File

@ -4,7 +4,7 @@ from monkey_island.cc.models import Monkey
from monkey_island.cc.services.attack.technique_reports import T1210, T1197, T1110, T1075, T1003, T1059, T1086, T1082 from monkey_island.cc.services.attack.technique_reports import T1210, T1197, T1110, T1075, T1003, T1059, T1086, T1082
from monkey_island.cc.services.attack.technique_reports import T1145, T1105, T1065, T1035, T1129, T1106, T1107, T1188 from monkey_island.cc.services.attack.technique_reports import T1145, T1105, T1065, T1035, T1129, T1106, T1107, T1188
from monkey_island.cc.services.attack.technique_reports import T1090, T1041, T1222, T1005, T1018, T1016, T1021, T1064 from monkey_island.cc.services.attack.technique_reports import T1090, T1041, T1222, T1005, T1018, T1016, T1021, T1064
from monkey_island.cc.services.attack.technique_reports import T1136, T1156, T1504, T1158 from monkey_island.cc.services.attack.technique_reports import T1136, T1156, T1504, T1158, T1154
from monkey_island.cc.services.attack.attack_config import AttackConfig from monkey_island.cc.services.attack.attack_config import AttackConfig
from monkey_island.cc.database import mongo from monkey_island.cc.database import mongo
from monkey_island.cc.services.reporting.report_generation_synchronisation import safe_generate_attack_report from monkey_island.cc.services.reporting.report_generation_synchronisation import safe_generate_attack_report
@ -40,7 +40,8 @@ TECHNIQUES = {'T1210': T1210.T1210,
'T1136': T1136.T1136, 'T1136': T1136.T1136,
'T1156': T1156.T1156, 'T1156': T1156.T1156,
'T1504': T1504.T1504, 'T1504': T1504.T1504,
'T1158': T1158.T1158 'T1158': T1158.T1158,
'T1154': T1154.T1154
} }
REPORT_NAME = 'new_report' REPORT_NAME = 'new_report'

View File

@ -63,8 +63,17 @@ SCHEMA = {
"description": "Adversaries may execute a binary, command, or script via a method " "description": "Adversaries may execute a binary, command, or script via a method "
"that interacts with Windows services, such as the Service Control Manager.", "that interacts with Windows services, such as the Service Control Manager.",
"depends_on": ["T1210"] "depends_on": ["T1210"]
},
"T1154": {
"title": "Trap",
"type": "bool",
"value": True,
"necessary": False,
"link": "https://attack.mitre.org/techniques/T1154",
"description": "Adversaries can use the trap command to register code to be executed "
"when the shell encounters specific interrupts."
} }
} },
}, },
"persistence": { "persistence": {
"title": "Persistence", "title": "Persistence",

View File

@ -0,0 +1,37 @@
from monkey_island.cc.services.attack.technique_reports import AttackTechnique
from monkey_island.cc.database import mongo
from common.utils.attack_utils import ScanStatus
from common.data.post_breach_consts import POST_BREACH_TRAP_COMMAND
__author__ = "shreyamalviya"
class T1154(AttackTechnique):
tech_id = "T1154"
unscanned_msg = "Monkey did not use the trap command."
scanned_msg = "Monkey tried using the trap command but failed."
used_msg = "Monkey used the trap command successfully."
query = [{'$match': {'telem_category': 'post_breach',
'data.name': POST_BREACH_TRAP_COMMAND}},
{'$project': {'_id': 0,
'machine': {'hostname': '$data.hostname',
'ips': ['$data.ip']},
'result': '$data.result'}}]
@staticmethod
def get_report_data():
data = {'title': T1154.technique_title(), 'info': []}
trap_command_info = list(mongo.db.telemetry.aggregate(T1154.query))
status = ScanStatus.UNSCANNED.value
if trap_command_info:
successful_PBAs = mongo.db.telemetry.count({'data.name': POST_BREACH_TRAP_COMMAND,
'data.result.1': True})
status = ScanStatus.USED.value if successful_PBAs else ScanStatus.SCANNED.value
data.update(T1154.get_base_data_by_status(status))
data.update({'info': trap_command_info})
return data

View File

@ -175,6 +175,14 @@ SCHEMA = {
], ],
"title": "Hidden files and directories", "title": "Hidden files and directories",
"attack_techniques": ["T1158"] "attack_techniques": ["T1158"]
},
{
"type": "string",
"enum": [
"TrapCommand"
],
"title": "Trap",
"attack_techniques": ["T1154"]
} }
], ],
}, },
@ -397,7 +405,8 @@ SCHEMA = {
"BackdoorUser", "BackdoorUser",
"CommunicateAsNewUser", "CommunicateAsNewUser",
"ModifyShellStartupFiles", "ModifyShellStartupFiles",
"HiddenFiles" "HiddenFiles",
"TrapCommand"
], ],
"description": "List of actions the Monkey will run post breach" "description": "List of actions the Monkey will run post breach"
}, },

View File

@ -0,0 +1,45 @@
import React from 'react';
import ReactTable from 'react-table';
import {renderMachineFromSystemData, ScanStatus} from './Helpers';
import MitigationsComponent from './MitigationsComponent';
class T1154 extends React.Component {
constructor(props) {
super(props);
}
static getColumns() {
return ([{
columns: [
{ Header: 'Machine',
id: 'machine',
accessor: x => renderMachineFromSystemData(x.machine),
style: {'whiteSpace': 'unset'}},
{ Header: 'Result',
id: 'result',
accessor: x => x.result,
style: {'whiteSpace': 'unset'}}
]
}])
}
render() {
return (
<div>
<div>{this.props.data.message}</div>
<br/>
{this.props.data.status === ScanStatus.USED ?
<ReactTable
columns={T1154.getColumns()}
data={this.props.data.info}
showPagination={false}
defaultPageSize={this.props.data.info.length}
/> : ''}
<MitigationsComponent mitigations={this.props.data.mitigations}/>
</div>
);
}
}
export default T1154;