OS Credential Dumping: Файловая система proc
Other sub-techniques of OS Credential Dumping (8)
Adversaries may gather credentials from the proc filesystem or `/proc`. The proc filesystem is a pseudo-filesystem used as an interface to kernel data structures for Linux based systems managing virtual memory. For each process, the `/proc/grep -E "^[0-9a-f-]* r" /proc/"$pid"/maps | cut -d' ' -f 1
, to look for fixed strings in memory structures or cached hashes.(Citation: atomic-red proc file system) When running without privileged access, processes can still view their own virtual memory locations. Some services or programs may save credentials in clear text inside the process’s memory.(Citation: MimiPenguin GitHub May 2017)(Citation: Polop Linux PrivEsc Gitbook)
If running as or with the permissions of a web browser, a process can search the `/maps` & `/mem` locations for common website credential patterns (that can also be used to find adjacent memory within the same structure) in which hashes or cleartext credentials may be located.
Примеры процедур |
|
Название | Описание |
---|---|
PACEMAKER |
PACEMAKER has the ability to extract credentials from OS memory.(Citation: Mandiant Pulse Secure Zero-Day April 2021) |
LaZagne |
LaZagne can use the ` |
MimiPenguin |
MimiPenguin can use the ` |
Контрмеры |
|
Контрмера | Описание |
---|---|
Password Policies |
Set and enforce secure password policies for accounts. |
Privileged Account Management |
Manage the creation, modification, use, and permissions associated to privileged accounts, including SYSTEM and root. |
Обнаружение
To obtain the passwords and hashes stored in memory, processes must open a maps file in the `/proc` filesystem for the process being analyzed. This file is stored under the path `/proc/PID/maps`, where the `PID` directory is the unique pid of the program being interrogated for such authentication data. The AuditD monitoring tool, which ships stock in many Linux distributions, can be used to watch for hostile processes opening this file in the proc file system, alerting on the pid, process name, and arguments of such programs.
Ссылки
- Huseyin Can YUCEEL & Picus Labs. (2022, March 22). Retrieved March 31, 2023.
- Gregal, H. (2017, May 12). MimiPenguin. Retrieved December 5, 2017.
- Carlos Polop. (2023, March 5). Linux Privilege Escalation. Retrieved March 31, 2023.
- baeldung. (2022, April 8). Understanding the Linux /proc/id/maps File. Retrieved March 31, 2023.
- Atomic Red Team. (2023, November). T1003.007 - OS Credential Dumping: Proc Filesystem. Retrieved March 28, 2024.
- Perez, D. et al. (2021, April 20). Check Your Pulse: Suspected APT Actors Leverage Authentication Bypass Techniques and Pulse Secure Zero-Day. Retrieved February 5, 2024.
- Gregal, Hunter. (2019, September 17). MimiPenguin 2.0. Retrieved March 28, 2024.
- Zanni, A. (n.d.). The LaZagne Project !!!. Retrieved December 14, 2018.
Связанные риски
Каталоги
Мы используем cookie-файлы, чтобы получить статистику, которая помогает нам улучшить сервис для вас с целью персонализации сервисов и предложений. Вы может прочитать подробнее о cookie-файлах или изменить настройки браузера. Продолжая пользоваться сайтом, вы даёте согласие на использование ваших cookie-файлов и соглашаетесь с Политикой обработки персональных данных.