@@ -14,6 +14,15 @@ crackdown is a command-line utility designed to aid Incident Responders in the d
1414
1515It must be run as sudo to be effective.
1616
17+ #### Usage
18+
19+ Just download the release and run as sudo:
20+ ```
21+ sudo crackdown
22+ sudo crackdown -quiet
23+ ```
24+ Use the '-quiet' flag to suppress detections at the command-line - all detections are output to CSV/JSON output in the current working directory.
25+
1726#### What is inspected?
1827
1928* ** Running Processes** [ T1059]
@@ -23,10 +32,37 @@ It must be run as sudo to be effective.
2332* ** Cron Jobs** [ T1053.003]
2433 * Suspicious Keywords, General Command Review
2534* ** Local Users** [ T1136.001]
35+ * General Review, Privileged Users [ TODO]
2636* ** SSH Authorized Keys** [ T1098.004]
27- * ** Modified Kernel Modules** [ T1547.006]
28- * ** Modified .bashrc Files** [ T1546.004]
37+ * Recent Modifications, General Review
38+ * ** Recently Modified Kernel Modules** [ T1547.006]
39+ * ** Modified .bashrc/.zshrc Files** [ T1546.004]
2940* ** Created/Modified Service Files/Service Confs** [ T1543.002]
41+ * /etc/systemd/system|user
42+ * /run/systemd/system|user
43+ * /lib/systemd/system|user
44+ * ** Environment Variable Scanning**
45+ * ** apt/git/doas/motd/Startup/at.allow|deny,etc Backdoors** [ T1037.005]
46+ * ** Webshell Scan** [ T1505.003]
47+ * /var/www
48+ * /etc/nginx
49+ * /etc/apache*
50+ * ** Broad Scanning for Suspicious Files**
51+ * /etc/update-motd.d
52+ * /var/run/motd
53+ * /etc/init.d
54+ * /etc/rc.d
55+ * /sbin/init.d
56+ * /etc/rc.local
57+ * /etc/apt/apt.conf.d
58+ * /usr/share/unattended-upgrades
59+ * /home/* /.gitconfig
60+ * /etc/at.allow
61+ * /etc/at.deny
62+ * /etc/doas.conf
63+ * /home/* /. Scripts|Confs
64+ * /root/.*
65+ *
3066
3167#### MITRE Techniques Evaluated
3268* T1547.006 - Boot or Logon Autostart Execution: Kernel Modules and Extensions
@@ -37,16 +73,13 @@ It must be run as sudo to be effective.
3773* T1071 - Application Layer Protocol
3874* T1059 - Command and Scripting Interpreter
3975* T1543.002 - Create or Modify System Process: Systemd Service
76+ * T1037.005 - Boot or Logon Initialization Scripts: Startup Items
77+ * T1505.003 - Server Software Component: Web Shell
4078
4179TODO:
42- * SUID Binary Modification
43- * MOTD Modification
44- * User Startup File Modification
45- * apt Backdoor
46- * git Backdoor
47- * git Hooks
48- * doas conf file
80+ * git hooks/config finding
4981* at allow config file
50- * sudoers tmp file
51- * visudo utility execution
52- * Non-standard binary installation
82+ * NOPSSWD Sudoers
83+ * Recently Modified Binaries
84+ * Privileged User Highlight
85+ *
0 commit comments