【ATTCK】开源项目-mitreattack-python

2023-11-09 19:45

本文主要是介绍【ATTCK】开源项目-mitreattack-python,希望对大家解决编程问题提供一定的参考价值,需要的开发者们随着小编来一起学习吧!

        mitreattack-python是用来处理ATT&CK数据的python开源工具。

        开源地址:GitHub - mitre-attack/mitreattack-python: A python module for working with ATT&CK

安装

pip3 install mitreattack-python #使用清华源pip3 install mitreattack-python  -i https://pypi.tuna.tsinghua.edu.cn/simple/

使用教程

1、下载attck json数据文件

https://raw.githubusercontent.com/mitre/cti/master/enterprise-attack/enterprise-attack.json

https://raw.githubusercontent.com/mitre/cti/master/mobile-attack/mobile-attack.json

https://raw.githubusercontent.com/mitre/cti/master/ics-attack/ics-attack.json

2、将下载的文件复制到当前工作目录

        不然会报文件不存在的错误,或指定文件目录。

>>> mitre_attack_data = MitreAttackData("enterprise-attack.json")Traceback (most recent call last):File "<stdin>", line 1, in <module>File "C:\Users\xxxxxx\.conda\envs\attck\lib\site-packages\mitreattack\stix20\MitreAttackData.py", line 85, in __init__self.src.load_from_file(stix_filepath)File "C:\Users\xxxxxx\.conda\envs\attck\lib\site-packages\stix2\datastore\memory.py", line 148, in load_from_filereturn self.source.load_from_file(*args, **kwargs)File "C:\Users\xxxxxx\.conda\envs\attck\lib\site-packages\stix2\datastore\memory.py", line 363, in load_from_filewith io.open(os.path.abspath(file_path), "r", encoding=encoding) as f:FileNotFoundError: [Errno 2] No such file or directory: 'D:\\opt\\attck\\enterprise-attack.json'

3、加载数据文件

(attck) D:\opt\attck>pythonPython 3.10.13 | packaged by conda-forge | (main, Oct 26 2023, 18:01:37) [MSC v.1935 64 bit (AMD64)] on win32Type "help", "copyright", "credits" or "license" for more information.>>> from mitreattack.stix20 import MitreAttackData>>> mitre_attack_data = MitreAttackData("enterprise-attack.json")4、常见用法

4、使用案例

get_object_by_stix_id

>>> G0075 = mitre_attack_data.get_object_by_stix_id("intrusion-set--f40eb8ce-2a74-4e56-89a1-227021410142")>>> print(G0075.serialize(pretty=True)){"type": "intrusion-set","id": "intrusion-set--f40eb8ce-2a74-4e56-89a1-227021410142","created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5","created": "2018-10-17T00:14:20.652Z","modified": "2020-03-30T19:15:49.217Z","name": "Rancor","description": "[Rancor](https://attack.mitre.org/groups/G0075) is a threat group that has led targeted campaigns against the South East Asia region. [Rancor](https://attack.mitre.org/groups/G0075) uses politically-motivated lures to entice victims to open malicious documents. (Citation: Rancor Unit42 June 2018)","aliases": ["Rancor"],"external_references": [{"source_name": "mitre-attack","url": "https://attack.mitre.org/groups/G0075","external_id": "G0075"},{"source_name": "Rancor","description": "(Citation: Rancor Unit42 June 2018)"},{"source_name": "Rancor Unit42 June 2018","description": "Ash, B., et al. (2018, June 26). RANCOR: Targeted Attacks in South East Asia Using PLAINTEE and DDKONG Malware Families. Retrieved July 2, 2018.","url": "https://researchcenter.paloaltonetworks.com/2018/06/unit42-rancor-targeted-attacks-south-east-asia-using-plaintee-ddkong-malware-families/"}],"object_marking_refs": ["marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"],"x_mitre_domains": ["enterprise-attack"],"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5","x_mitre_version": "1.2"}>>>

get_object_by_attack_id

>>> T1134 = mitre_attack_data.get_object_by_attack_id("T1134", "attack-pattern")>>> mitre_attack_data.print_stix_object(T1134, pretty=True){"type": "attack-pattern","id": "attack-pattern--dcaa092b-7de9-4a21-977f-7fcb77e89c48","created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5","created": "2017-12-14T16:46:06.044Z","modified": "2023-03-30T21:01:47.762Z","name": "Access Token Manipulation","description": "Adversaries may modify access tokens to operate under a different user or system security context to perform actions and bypass access controls. Windows uses access tokens to determine the ownership of a running process. A user can manipulate access tokens to make a running process appear as though it is the child of a different process or belongs to someone other than the user that started the process. When this occurs, the process also takes on the security context associated with the new token.\n\nAn adversary can use built-in Windows API functions to copy access tokens from existing processes; this is known as token stealing. These token can then be applied to an existing process (i.e. [Token Impersonation/Theft](https://attack.mitre.org/techniques/T1134/001)) or used to spawn a new process (i.e. [Create Process with Token](https://attack.mitre.org/techniques/T1134/002)). An adversary must already be in a privileged user context (i.e. administrator) to steal a token. However, adversaries commonly use token stealing to elevate their security context from the administrator level to the SYSTEM level. An adversary can then use a token to authenticate to a remote system as the account for that token if the account has appropriate permissions on the remote system.(Citation: Pentestlab Token Manipulation)\n\nAny standard user can use the <code>runas</code> command, and the Windows API functions, to create impersonation tokens; it does not require access to an administrator account. There are also other mechanisms, such as Active Directory fields, that can be used to modify access tokens.","kill_chain_phases": [{"kill_chain_name": "mitre-attack","phase_name": "defense-evasion"},{"kill_chain_name": "mitre-attack","phase_name": "privilege-escalation"}],"external_references": [{"source_name": "mitre-attack","url": "https://attack.mitre.org/techniques/T1134","external_id": "T1134"},{"source_name": "BlackHat Atkinson Winchester Token Manipulation","description": "Atkinson, J., Winchester, R. (2017, December 7). A Process is No One: Hunting for Token Manipulation. Retrieved December 21, 2017.","url": "https://www.blackhat.com/docs/eu-17/materials/eu-17-Atkinson-A-Process-Is-No-One-Hunting-For-Token-Manipulation.pdf"},{"source_name": "Microsoft Command-line Logging","description": "Mathers, B. (2017, March 7). Command line process auditing. Retrieved April 21, 2017.","url": "https://technet.microsoft.com/en-us/windows-server-docs/identity/ad-ds/manage/component-updates/command-line-process-auditing"},{"source_name": "Microsoft LogonUser","description": "Microsoft TechNet. (n.d.). Retrieved April 25, 2017.","url": "https://msdn.microsoft.com/en-us/library/windows/desktop/aa378184(v=vs.85).aspx"},{"source_name": "Microsoft DuplicateTokenEx","description": "Microsoft TechNet. (n.d.). Retrieved April 25, 2017.","url": "https://msdn.microsoft.com/en-us/library/windows/desktop/aa446617(v=vs.85).aspx"},{"source_name": "Microsoft ImpersonateLoggedOnUser","description": "Microsoft TechNet. (n.d.). Retrieved April 25, 2017.","url": "https://msdn.microsoft.com/en-us/library/windows/desktop/aa378612(v=vs.85).aspx"},{"source_name": "Pentestlab Token Manipulation","description": "netbiosX. (2017, April 3). Token Manipulation. Retrieved April 21, 2017.","url": "https://pentestlab.blog/2017/04/03/token-manipulation/"}],"object_marking_refs": ["marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"],"x_mitre_attack_spec_version": "2.1.0","x_mitre_contributors": ["Tom Ueltschi @c_APT_ure","Travis Smith, Tripwire","Robby Winchester, @robwinchester3","Jared Atkinson, @jaredcatkinson"],"x_mitre_data_sources": ["Process: OS API Execution","Command: Command Execution","User Account: User Account Metadata","Process: Process Metadata","Process: Process Creation","Active Directory: Active Directory Object Modification"],"x_mitre_defense_bypassed": ["Windows User Account Control","Heuristic Detection","System Access Controls","Host Forensic Analysis"],"x_mitre_deprecated": false,"x_mitre_detection": "If an adversary is using a standard command-line shell, analysts can detect token manipulation by auditing command-line activity. Specifically, analysts should look for use of the <code>runas</code> command. Detailed command-line logging is not enabled by default in Windows.(Citation: Microsoft Command-line Logging)\n\nIf an adversary is using a payload that calls the Windows token APIs directly, analysts can detect token manipulation only through careful analysis of user network activity, examination of running processes, and correlation with other endpoint and network behavior. \n\nThere are many Windows API calls a payload can take advantage of to manipulate access tokens (e.g., <code>LogonUser</code> (Citation: Microsoft LogonUser), <code>DuplicateTokenEx</code>(Citation: Microsoft DuplicateTokenEx), and <code>ImpersonateLoggedOnUser</code>(Citation: Microsoft ImpersonateLoggedOnUser)). Please see the referenced Windows API pages for more information.\n\nQuery systems for process and thread token information and look for inconsistencies such as user owns processes impersonating the local SYSTEM account.(Citation: BlackHat Atkinson Winchester Token Manipulation)\n\nLook for inconsistencies between the various fields that store PPID information, such as the EventHeader ProcessId from data collected via Event Tracing for Windows (ETW), Creator Process ID/Name from Windows event logs, and the ProcessID and ParentProcessID (which are also produced from ETW and other utilities such as Task Manager and Process Explorer). The ETW provided EventHeader ProcessId identifies the actual parent process.","x_mitre_domains": ["enterprise-attack"],"x_mitre_effective_permissions": ["SYSTEM"],"x_mitre_is_subtechnique": false,"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5","x_mitre_permissions_required": ["User","Administrator"],"x_mitre_platforms": ["Windows"],"x_mitre_version": "2.0"}

get_software_used_by_group

 

 # get software used by G0019>>> group_stix_id = "intrusion-set--2a158b0a-7ef8-43cb-9985-bf34d1e12050">>> software_used_by_g0019 = mitre_attack_data.get_software_used_by_group(group_stix_id)>>> print(f"Software used by G0019 ({len(software_used_by_g0019)}):")Software used by G0019 (15):>>> for s in software_used_by_g0019:...         software = s["object"]...         print(f"* {software.name} ({mitre_attack_data.get_attack_id(software.id)})")...* ftp (S0095)* Net (S0039)* Ping (S0097)* netsh (S0108)* Systeminfo (S0096)* PsExec (S0029)* Tasklist (S0057)* WinMM (S0059)* RainyDay (S0629)* Nebulae (S0630)* RARSTONE (S0055)* HDoor (S0061)* Sys10 (S0060)* SslMM (S0058)* Aria-body (S0456)>>>

这篇关于【ATTCK】开源项目-mitreattack-python的文章就介绍到这儿,希望我们推荐的文章对编程师们有所帮助!



http://www.chinasem.cn/article/378169

相关文章

基于Linux的ffmpeg python的关键帧抽取

《基于Linux的ffmpegpython的关键帧抽取》本文主要介绍了基于Linux的ffmpegpython的关键帧抽取,实现以按帧或时间间隔抽取关键帧,文中通过示例代码介绍的非常详细,对大家的学... 目录1.FFmpeg的环境配置1) 创建一个虚拟环境envjavascript2) ffmpeg-py

python使用库爬取m3u8文件的示例

《python使用库爬取m3u8文件的示例》本文主要介绍了python使用库爬取m3u8文件的示例,可以使用requests、m3u8、ffmpeg等库,实现获取、解析、下载视频片段并合并等步骤,具有... 目录一、准备工作二、获取m3u8文件内容三、解析m3u8文件四、下载视频片段五、合并视频片段六、错误

Python中提取文件名扩展名的多种方法实现

《Python中提取文件名扩展名的多种方法实现》在Python编程中,经常会遇到需要从文件名中提取扩展名的场景,Python提供了多种方法来实现这一功能,不同方法适用于不同的场景和需求,包括os.pa... 目录技术背景实现步骤方法一:使用os.path.splitext方法二:使用pathlib模块方法三

Python打印对象所有属性和值的方法小结

《Python打印对象所有属性和值的方法小结》在Python开发过程中,调试代码时经常需要查看对象的当前状态,也就是对象的所有属性和对应的值,然而,Python并没有像PHP的print_r那样直接提... 目录python中打印对象所有属性和值的方法实现步骤1. 使用vars()和pprint()2. 使

springboot项目中整合高德地图的实践

《springboot项目中整合高德地图的实践》:本文主要介绍springboot项目中整合高德地图的实践,具有很好的参考价值,希望对大家有所帮助,如有错误或未考虑完全的地方,望不吝赐教... 目录一:高德开放平台的使用二:创建数据库(我是用的是mysql)三:Springboot所需的依赖(根据你的需求再

使用Python和OpenCV库实现实时颜色识别系统

《使用Python和OpenCV库实现实时颜色识别系统》:本文主要介绍使用Python和OpenCV库实现的实时颜色识别系统,这个系统能够通过摄像头捕捉视频流,并在视频中指定区域内识别主要颜色(红... 目录一、引言二、系统概述三、代码解析1. 导入库2. 颜色识别函数3. 主程序循环四、HSV色彩空间详解

一文深入详解Python的secrets模块

《一文深入详解Python的secrets模块》在构建涉及用户身份认证、权限管理、加密通信等系统时,开发者最不能忽视的一个问题就是“安全性”,Python在3.6版本中引入了专门面向安全用途的secr... 目录引言一、背景与动机:为什么需要 secrets 模块?二、secrets 模块的核心功能1. 基

一文详解如何在idea中快速搭建一个Spring Boot项目

《一文详解如何在idea中快速搭建一个SpringBoot项目》IntelliJIDEA作为Java开发者的‌首选IDE‌,深度集成SpringBoot支持,可一键生成项目骨架、智能配置依赖,这篇文... 目录前言1、创建项目名称2、勾选需要的依赖3、在setting中检查maven4、编写数据源5、开启热

python常见环境管理工具超全解析

《python常见环境管理工具超全解析》在Python开发中,管理多个项目及其依赖项通常是一个挑战,下面:本文主要介绍python常见环境管理工具的相关资料,文中通过代码介绍的非常详细,需要的朋友... 目录1. conda2. pip3. uvuv 工具自动创建和管理环境的特点4. setup.py5.

Python常用命令提示符使用方法详解

《Python常用命令提示符使用方法详解》在学习python的过程中,我们需要用到命令提示符(CMD)进行环境的配置,:本文主要介绍Python常用命令提示符使用方法的相关资料,文中通过代码介绍的... 目录一、python环境基础命令【Windows】1、检查Python是否安装2、 查看Python的安