Offensive Research Guide to Help Defense Improve Detection
This guide addresses vulnerability researchers that write public reports about their work. The reason for this guide is that ... TBD
- Please provide the full and absolute path on the system.
e.g. C:\ManageEngine\ServiceDesk\jre\bin\java.exe
Please include an example log lines of the exploited service or system services generated during or after the exploitation.
Commands that can be used on Linux systems:
ls -lrt /var/log
lsof +D /var/log/
lsof | grep servicename
e.g. check with
tail -f /var/log/messages
Commands that can be used on Windows systems:
Get-EventLog -List `
| %{Get-EventLog -LogName $_.Log -After (Get-Date).AddMinutes(-5) -ErrorAction Ignore} `
| Sort-Object TimeGenerated | Format-Table -AutoSize -Wrap `
| Out-File new-log-entries-last5min.txt
e.g. access logs need to be configured to include uri_query
e.g. empty source address, uncommon characters
e.g. an XML in a temp folder
e.g. user login
Could you provide simple shell commands to check if someone has previously exploited that vulnerability?
e.g. egrep "specific-url" /var/log/service.log, zgrep "specific-url" /var/log/service/*.gz
e.g. add line in server-side script to drop all requests that contain ":;" in their User-Agent field