Skip to content

Latest commit

 

History

History
53 lines (40 loc) · 2.76 KB

README.md

File metadata and controls

53 lines (40 loc) · 2.76 KB

EDR-Testing-Script

This repository contains simple script to test EDR solutions against Mitre ATT&CK/LOLBAS/Invoke-CradleCrafter frameworks. This project is very much in its infancy right now. It is written as a single batch script so it can be easily uploaded and run (as opposed to un-zipped, compiled and installed). It can run either as a normal user or as Administrator however not giving it high privilages will fail some tests.

Right now this script only works on Windows and should work with most security endpoint solutions.

How To

Run the runtests script and observe alerts coming to your EDR console. Cross-verify these alerts to check if your EDR solution identified them correctly. Most tests will just execute calc.exe but it can be easily modified to try to download and exec i.e. Mimikatz. DO NOT USE ON PRODUCTION SYSTEMS.

Why

Because it is hard to figure out how accurate EDR's are. Most solutions are sold as silver bullet for security but it is actually difficult to check how many different malicious attacks are correctly identified and contained. MITRE & LOLBAS do pretty good job at mapping common tools and techniques which are being used by attackers out there to pivot, execute code and progress through internal networks so this tool executes these attacks and thus helps organizations to verify the accuracy of deployed EDR product.

Weaponization

The script executes calc.exe. You can replace this easily with metasploit executable where needed but payloads will need to be modified to reflect this.

Tested On

  • Windows 7 x86
  • Windows 7 x64
  • Windows 10 x64

Coverage

The following techniques are currently covered by this script:

ATT&CK LOLBAS Invoke-CradleCrafter
T1197 msiexec.exe MEMORY\PSWEBSTRING
T1118 diskshadow.exe MEMORY\PSWEBDATA
T1170 esentutl.exe MEMORY\PSWEBOPENREAD
T1086 replace.exe MEMORY\NETWEBSTRING
T1121 SyncAppvPublishingServer MEMORY\NETWEBDATA
T1117 hh.exe MEMORY\NETWEBOPENREAD
T1127 ieexec.exe MEMORY\PSWEBREQUEST
T1047 Setupapi MEMORY\PSRESTMETHOD
T1128 Shdocvw MEMORY\NETWEBREQUEST
T1085 csc.exe MEMORY\PSSENDKEYS
T1130 advpack.dll MEMORY\PSCOMWORD
T1191 Scriptrunner MEMORY\PSCOMEXCEL
T1202 sc MEMORY\PSCOMIE
T1028 Register-cimprovider MEMORY\PSCOMMSXML
T1053 control.exe MEMORY\PSINLINECSHARP
T1216 manage-bde.wsf MEMORY\PSCOMPILEDCSHARP
T1218 MEMORY\CERTUTIL
T1033 DISK\PSWEBFILE
T1140 DISK\PSBITS
T1183 DISK\BITSADMIN
T1096 DISK\CERTUTIL
T1055
T1015