Skip to content

Commit 058cd81

Browse files
committed
- Adding some paths
1 parent 5c1c668 commit 058cd81

File tree

2 files changed

+46
-13
lines changed

2 files changed

+46
-13
lines changed

README.md

Lines changed: 45 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -14,6 +14,15 @@ crackdown is a command-line utility designed to aid Incident Responders in the d
1414

1515
It must be run as sudo to be effective.
1616

17+
#### Usage
18+
19+
Just download the release and run as sudo:
20+
```
21+
sudo crackdown
22+
sudo crackdown -quiet
23+
```
24+
Use the '-quiet' flag to suppress detections at the command-line - all detections are output to CSV/JSON output in the current working directory.
25+
1726
#### What is inspected?
1827

1928
* **Running Processes** [T1059]
@@ -23,10 +32,37 @@ It must be run as sudo to be effective.
2332
* **Cron Jobs** [T1053.003]
2433
* Suspicious Keywords, General Command Review
2534
* **Local Users** [T1136.001]
35+
* General Review, Privileged Users [TODO]
2636
* **SSH Authorized Keys** [T1098.004]
27-
* **Modified Kernel Modules** [T1547.006]
28-
* **Modified .bashrc Files** [T1546.004]
37+
* Recent Modifications, General Review
38+
* **Recently Modified Kernel Modules** [T1547.006]
39+
* **Modified .bashrc/.zshrc Files** [T1546.004]
2940
* **Created/Modified Service Files/Service Confs** [T1543.002]
41+
* /etc/systemd/system|user
42+
* /run/systemd/system|user
43+
* /lib/systemd/system|user
44+
* **Environment Variable Scanning**
45+
* **apt/git/doas/motd/Startup/at.allow|deny,etc Backdoors** [T1037.005]
46+
* **Webshell Scan** [T1505.003]
47+
* /var/www
48+
* /etc/nginx
49+
* /etc/apache*
50+
* **Broad Scanning for Suspicious Files**
51+
* /etc/update-motd.d
52+
* /var/run/motd
53+
* /etc/init.d
54+
* /etc/rc.d
55+
* /sbin/init.d
56+
* /etc/rc.local
57+
* /etc/apt/apt.conf.d
58+
* /usr/share/unattended-upgrades
59+
* /home/*/.gitconfig
60+
* /etc/at.allow
61+
* /etc/at.deny
62+
* /etc/doas.conf
63+
* /home/*/. Scripts|Confs
64+
* /root/.*
65+
*
3066

3167
#### MITRE Techniques Evaluated
3268
* T1547.006 - Boot or Logon Autostart Execution: Kernel Modules and Extensions
@@ -37,16 +73,13 @@ It must be run as sudo to be effective.
3773
* T1071 - Application Layer Protocol
3874
* T1059 - Command and Scripting Interpreter
3975
* T1543.002 - Create or Modify System Process: Systemd Service
76+
* T1037.005 - Boot or Logon Initialization Scripts: Startup Items
77+
* T1505.003 - Server Software Component: Web Shell
4078

4179
TODO:
42-
* SUID Binary Modification
43-
* MOTD Modification
44-
* User Startup File Modification
45-
* apt Backdoor
46-
* git Backdoor
47-
* git Hooks
48-
* doas conf file
80+
* git hooks/config finding
4981
* at allow config file
50-
* sudoers tmp file
51-
* visudo utility execution
52-
* Non-standard binary installation
82+
* NOPSSWD Sudoers
83+
* Recently Modified Binaries
84+
* Privileged User Highlight
85+
*

internal/findStartupServices.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -86,7 +86,7 @@ func CheckStartupServices(logger zerolog.Logger, detections chan<- Detection, wa
8686
}
8787

8888
func getServiceFiles(logger zerolog.Logger) error {
89-
serviceDirs := []string{"/etc/systemd/system", "/run/systemd/system", "/lib/systemd/system"}
89+
serviceDirs := []string{"/etc/systemd/system", "/etc/systemd/user", "/run/systemd/system", "/run/systemd/user", "/lib/systemd/system", "/lib/systemd/user"}
9090
for _, path := range serviceDirs {
9191
filepath.WalkDir(path, walk)
9292
}

0 commit comments

Comments
 (0)