SSH Tunnelling to Punch Through Corporate Firewalls - Updated take on one of the oldest LOLBINs | JUMPSEC LABS
Tags
Common Information
Type | Value |
---|---|
UUID | b274a8de-9a52-4b29-beec-2c86690e6f56 |
Fingerprint | 26538b516b24b6c7 |
Analysis status | DONE |
Considered CTI value | 0 |
Text language | |
Published | Aug. 13, 2024, 6:40 p.m. |
Added to db | Aug. 31, 2024, 6:25 a.m. |
Last updated | Nov. 17, 2024, 6:54 p.m. |
Headline | SSH Tunnelling to Punch Through Corporate Firewalls – Updated take on one of the oldest LOLBINs |
Title | SSH Tunnelling to Punch Through Corporate Firewalls - Updated take on one of the oldest LOLBINs | JUMPSEC LABS |
Detected Hints/Tags/Attributes | 59/2/15 |
Source URLs
URL Provider
RSS Feed
Details | Id | Enabled | Feed title | Url | Added to db |
---|---|---|---|---|---|
Details | 149 | ✔ | JUMPSEC LABS | https://labs.jumpsec.com/feed/ | 2024-08-30 22:08 |
Attributes
Details | Type | #Events | CTI | Value |
---|---|---|---|---|
Details | Domain | 88 | secretsdump.py |
|
Details | Domain | 14 | scanme.nmap.org |
|
Details | Domain | 1 | msservicesupdate.uksouth.cloudapp.azure.com |
|
Details | Domain | 1 | region.cloudapp.azure.com |
|
Details | Domain | 339 | system.net |
|
Details | File | 1 | c:\windows\system32\openssh\ssh.exe |
|
Details | File | 85 | secretsdump.py |
|
Details | File | 28 | ssh.exe |
|
Details | File | 4 | scp.exe |
|
Details | File | 1 | totally_okay_payload.dll |
|
Details | File | 1 | c:\public\appdata\version.dll |
|
Details | File | 27 | invoke-mimikatz.ps1 |
|
Details | File | 1 | amsibypass.ps1 |
|
Details | IPv4 | 1441 | 127.0.0.1 |
|
Details | Url | 1 | http://192.x.x.x/invoke-mimikatz.ps1 |