All Projects → CCXLabs → CCXDigger

CCXLabs / CCXDigger

Licence: other
The CyberCX Digger project is designed to help Australian organisations determine if they have been impacted by certain high profile cyber security incidents. Digger provides threat hunting functionality packaged in a simple-to-use tool, allowing users to detect certain attacker activities; all for free.

Projects that are alternatives of or similar to CCXDigger

MindMaps
#ThreatHunting #DFIR #Malware #Detection Mind Maps
Stars: ✭ 224 (+397.78%)
Mutual labels:  incident-response, forensics, dfir, threat-intelligence
Packrat
Live system forensic collector
Stars: ✭ 16 (-64.44%)
Mutual labels:  incident-response, forensics, dfir
RdpCacheStitcher
RdpCacheStitcher is a tool that supports forensic analysts in reconstructing useful images out of RDP cache bitmaps.
Stars: ✭ 176 (+291.11%)
Mutual labels:  incident-response, forensics, dfir
INDXRipper
Carve file metadata from NTFS index ($I30) attributes
Stars: ✭ 32 (-28.89%)
Mutual labels:  incident-response, forensics, dfir
Mthc
All-in-one bundle of MISP, TheHive and Cortex
Stars: ✭ 134 (+197.78%)
Mutual labels:  incident-response, dfir, threat-intelligence
Invoke Liveresponse
Invoke-LiveResponse
Stars: ✭ 115 (+155.56%)
Mutual labels:  incident-response, forensics, dfir
MEAT
This toolkit aims to help forensicators perform different kinds of acquisitions on iOS devices
Stars: ✭ 101 (+124.44%)
Mutual labels:  incident-response, forensics, dfir
PSTrace
Trace ScriptBlock execution for powershell v2
Stars: ✭ 38 (-15.56%)
Mutual labels:  incident-response, forensics, dfir
uac
UAC is a Live Response collection script for Incident Response that makes use of native binaries and tools to automate the collection of AIX, Android, ESXi, FreeBSD, Linux, macOS, NetBSD, NetScaler, OpenBSD and Solaris systems artifacts.
Stars: ✭ 260 (+477.78%)
Mutual labels:  incident-response, forensics, dfir
CDIR
CDIR (Cyber Defense Institute Incident Response) Collector - live collection tool based on oss tool/library
Stars: ✭ 122 (+171.11%)
Mutual labels:  incident-response, forensics, dfir
Ir Rescue
A Windows Batch script and a Unix Bash script to comprehensively collect host forensic data during incident response.
Stars: ✭ 311 (+591.11%)
Mutual labels:  incident-response, forensics, dfir
ir scripts
incident response scripts
Stars: ✭ 17 (-62.22%)
Mutual labels:  incident-response, forensics, dfir
Pypowershellxray
Python script to decode common encoded PowerShell scripts
Stars: ✭ 192 (+326.67%)
Mutual labels:  incident-response, forensics, dfir
Vast
🔮 Visibility Across Space and Time
Stars: ✭ 227 (+404.44%)
Mutual labels:  incident-response, dfir
Intelowl
Intel Owl: analyze files, domains, IPs in multiple ways from a single API at scale
Stars: ✭ 2,114 (+4597.78%)
Mutual labels:  incident-response, threat-intelligence
Information Security Tasks
This repository is created only for infosec professionals whom work day to day basis to equip ourself with uptodate skillset, We can daily contribute daily one hour for day to day tasks and work on problem statements daily, Please contribute by providing problem statements and solutions
Stars: ✭ 108 (+140%)
Mutual labels:  incident-response, forensics
Thehive4py
Python API Client for TheHive
Stars: ✭ 143 (+217.78%)
Mutual labels:  incident-response, dfir
Atc React
A knowledge base of actionable Incident Response techniques
Stars: ✭ 226 (+402.22%)
Mutual labels:  incident-response, dfir
Oriana
Oriana is a threat hunting tool that leverages a subset of Windows events to build relationships, calculate totals and run analytics. The results are presented in a Web layer to help defenders identify outliers and suspicious behavior on corporate environments.
Stars: ✭ 152 (+237.78%)
Mutual labels:  incident-response, dfir
Imago Forensics
Imago is a python tool that extract digital evidences from images.
Stars: ✭ 175 (+288.89%)
Mutual labels:  incident-response, dfir

CyberCX Digger / A CyberCX Velociraptor Project

The CyberCX Digger project is designed to help Australian organisations determine if they have been impacted by certain high profile cyber security incidents. Digger provides threat hunting functionality packaged in a simple-to-use tool, allowing users to detect certain attacker activities; all for free.

Please refer to the wiki for more information about the CyberCX Digger project, and the tool itself.

Quick Start

CyberCX Digger can perform scans on both individual systems and across an entire network. A network connection is not required to use this tool. An HTML report will be generated once the scan completes.

Scanning an individual system

  1. Go to the Downloads page to obtain the latest CyberCX Digger executable and checksum. Verify the download against the checksum.

  2. Open a Command Prompt with Administrator privileges and run the CyberCX Digger executable. It can be run from any drive, including a removable drive or network share. It requires no installation and has no external dependencies. It makes no configuration changes to the system and should have negligible impact on the system.

  3. After completing the scan, an HTML report is created within the same folder. This contains any findings from the scan, plus details on what each finding means. The HTML report links back to this website for additional information, however no scan data is uploaded and we do not record your visits to the website. Any relevant items found are copied into a ZIP file in the same folder, to assist with further analysis.

  4. Further investigation may be necessary to confirm if any findings are indeed malicious. The HTML report will recommend any next steps required.

Scanning an entire network

  1. Install Velociraptor across the network.
  2. Follow the instructions here to obtain the latest CyberCX Digger artefact pack.
  3. Follow the instructions here to collect the CyberCX Digger artefacts in a hunt.
  4. Review the hunt results.

Introducing CyberCX Digger

During 2020, especially within the May to June period, Australia experienced a significant increase in cyber incidents targeting all levels of government and across a wide range of industry sectors. The threat actors responsible combined basic attack techniques with more sophisticated elements that are more difficult to detect. The threat actor is known to leave implants on compromised networks to facilitate re-entry. CyberCX Digger was created to help system owners determine whether their networks may have been compromised by these methods.

CyberCX’s Digital Forensic & Incident Response (DFIR) team has worked with several clients to detect and respond to these breaches, in collaboration with government agencies and industry partners. Through this work, our DFIR team has produced specific threat intelligence which can quickly and effectively detect evidence of the threat actors on systems.

Through CyberCX’s ongoing collaboration with the Velociraptor Project, (another proud Australian technology innovation) we have developed CyberCX Digger.

The objectives for CyberCX Digger are to:

  • Help protect Australia from a current advanced, sophisticated and persistent threat
  • Empower Australian organisations to detect and respond to intrusions on their networks
  • Provide a powerful but simple toolset which organisations can easily use
  • Share threat intelligence from the front lines in an actionable way
  • Keep updating CyberCX Digger as our analysis of this threat continues
  • Provide this advanced capability for free.

The key features of CyberCX Digger are:

  • Full transparency through free and open source software
  • Single executable, which requires no installation and has no external dependencies
  • No registration, licenses or dongles required
  • No collection or transmission of scan data outside your network
  • No ‘calling home’ and no external network connections required to perform scans.

If you believe your network may be compromised, please contact the CyberCX Digital Forensic & Incident Response team at [email protected]

About CyberCX

CyberCX is Australia’s leading force of cyber security professionals, with over 500 specialists across Australia, New Zealand, the UK and the USA, providing services across the following practice areas:

  • Strategy & Consulting
  • Security Testing & Assurance
  • Governance, Risk & Compliance
  • Security Integration & Engineering
  • Identity & Access Management
  • Managed Security Services
  • Digital Forensics & Incident Response
  • Education & Training

The CyberCX Digital Forensics & Incident Response team (DFIR) helps our clients to investigate and respond to a broad range of digital forensic investigations and cyber incidents every day. With the largest number of DFIR specialists across the region, we provide an unmatched depth of technical expertise, industry experience and local resources when and where our clients need us.

About Velociraptor

Velociraptor is an endpoint visibility platform developed in Australia, which provides leading capabilities for distributed digital forensic analysis, endpoint monitoring and the surgical collection of evidence from across networks.

The foundation of Velociraptor is a unique query language named VQL which allows writing specific detection queries, known in Velociraptor as Artefacts, which leverage the underlying Velociraptor functionality and can be easily distributed and shared.

CyberCX has been a proud collaborator of the Velociraptor project since its early days. CyberCX Digger is yet another example of the benefits of this partnership to the cyber security industry and the communities we protect.

Other Conditions

Please note the following conditions when using CyberCX Digger:

  • CyberCX Digger is provided "as is". CyberCX makes no warranties with respect to CyberCX Digger and disclaims all implied warranties, including without limitation warranties of merchantability, fitness for a particular purpose, non-infringement of third party rights, effectiveness, usefulness, reliability or arising from a course of dealing or usage of trade, and any warranties of non-infringement. CyberCX will have no liability whatsoever for any use of CyberCX Digger, including for indirect, special or consequential loss or damages.
  • While CyberCX has conducted our own testing of CyberCX Digger, we provide no guarantees that CyberCX Digger will work as intended on every computer system.
  • Use of CyberCX Digger is entirely at the user's own risk. Execution of CyberCX Digger does not make any direct changes to a system other than producing a report and collecting source files to support further analysis, and should have negligible performance impacts. CyberCX takes no responsibilies for any adverse effect that its execution may have. If you have concerns, you should first trial CyberCX Digger on test systems before using more widely.
  • While you may contact CyberCX for more information or if you believe that your network is compromised, CyberCX provides no guarantees of what response or support CyberCX will provide.
  • CyberCX Digger is not intended to find all possible traces of threat actor activities. All results should be verified through further investigation, as described in the wiki.
  • While CyberCX Digger may detect malware and other attacker activities, it is not an anti-virus solution and is not configured to remove malicious files, nor block malicious activities that it finds.
  • While CyberCX has collaborated with various third parties to produce CyberCX Digger, any references to third parties in CyberCX Digger, inculding but not limited to within the website, detection artefacts, reports and documentation, are not endorsements of CyberCX Digger by these third parties.
  • CyberCX has taken reasonable steps to respect and maintain the ownership of intellectual property and threat intelligence used in the development of CyberCX Digger. This includes abiding by the terms of relevant software licenses and obtaining consent for the use of threat intelligence in this way. Components from the Velociraptor project are made available under the terms of its GNU Affero General Public License and all use of CyberCX Digger must also comply with this license.
Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].