Skip to content

Neo23x0/ThreatResearch-Reporting-Guide

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

5 Commits
 
 
 
 

Repository files navigation

ThreatResearch-Reporting-Guide

Offensive Research Guide to Help Defense Improve Detection

This guide addresses vulnerability researchers that write public reports about their work. The reason for this guide is that ... TBD

Process Patterns

Which is the exploited service?

  • Please provide the full and absolute path on the system.

e.g. C:\ManageEngine\ServiceDesk\jre\bin\java.exe

Does the exploited service / application spawn a certain sub process?

Log Patterns

Please include an example log lines of the exploited service or system services generated during or after the exploitation.

Does the exploited service write a log?

Commands that can be used on Linux systems:

ls -lrt /var/log
lsof +D /var/log/ 
lsof | grep servicename

Does a system service write a log?

e.g. check with

tail -f /var/log/messages

Commands that can be used on Windows systems:

Get-EventLog -List `
| %{Get-EventLog -LogName $_.Log -After (Get-Date).AddMinutes(-5) -ErrorAction Ignore} `
| Sort-Object TimeGenerated | Format-Table -AutoSize -Wrap `
| Out-File new-log-entries-last5min.txt

Does it write an event in that log for an exploitation attempt?

Does additional logging/configuration requires enabling?

e.g. access logs need to be configured to include uri_query

Does it write an event in case of successful exploitation?

Does that log line contain specific values that shouldn't normally appear in similar log lines?

e.g. empty source address, uncommon characters

File Traces

Does the exploitation create temporary files?

e.g. an XML in a temp folder

Does the exploitation create permanent files?

Other Traces

Does exploitation generate other events that are not directly caused by your actions?

e.g. user login

Does the exploitation modify or create any additional registry keys? (Windows)

Optional: Provide Simple Detection Methods

Could you provide simple shell commands to check if someone has previously exploited that vulnerability?

e.g. egrep "specific-url" /var/log/service.log, zgrep "specific-url" /var/log/service/*.gz

Could you provide a quick fix that can block exploits until the vendor provides a solution?

e.g. add line in server-side script to drop all requests that contain ":;" in their User-Agent field

About

Offensive Research Guide to Help Defense Improve Detection

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published