Excavate for folders #2094
Replies: 2 comments
-
|
There are a few tools that are very extremely fast at this; for example ripgrep, which is what vscode uses for // /tmp/yara.rule
rule passwords {
strings: $pass = /[a-z0-9]+passw[a-z0-9]+/
condition: any of them
}$ yara -rs /tmp/yara.rule /etc 2>/dev/null
passwords /etc/security/pwhistory.conf
0x1d8:$pass: opasswd
0x1f8:$pass: opasswd
passwords /etc/rpc
0x120:$pass: yppasswdd
0x121:$pass: ppasswdd
0x131:$pass: yppasswd
0x132:$pass: ppasswd
0x5af:$pass: nispasswd
...But since many of our excavate rules use a combination of yara and python, the best solution might be to break If we did this, @liquidsec will likely have thoughts also |
Beta Was this translation helpful? Give feedback.
-
|
Relevant: #2832 |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
-
I think we've discussed this briefly on discord but so we note it down here aswell.
We've currently got excavate extracting stuff from
HTTP_RESPONSEandRAW_TEXTbut for folders that have been downloaded like git repos, apks, archives (soon) no juicy data is extracted from those.We tried re-raising these files from within the folder then extracting
RAW_TEXTbut that really made it run slow so is probably infeasible.We did discuss running
grepover the folder which I think is a great idea something like`grep -rnw ''
But I am unsure how todo something like that with the Yara rules currently in excavate.
Beta Was this translation helpful? Give feedback.
All reactions