mirror of
https://github.com/projectdiscovery/nuclei-templates.git
synced 2026-02-10 20:53:27 +08:00
25 lines
1.3 KiB
YAML
25 lines
1.3 KiB
YAML
id: macshell-c2-jarm
|
|
|
|
info:
|
|
name: Macshell C2 JARM - Detect
|
|
author: pussycat0x
|
|
severity: info
|
|
description: |
|
|
MacShellSwift is a proof of concept MacOS post-exploitation tool written in Swift using encrypted sockets. This tool has been tested both pre and post-Catalina. I rewrote a prior tool of mine MacShell (one of my repos) and changed the client to Swift instead of python. This tool consists of two parts: a server script and a client binary. I wrote this tool to help blue teamers proactively guage detections against macOS post-exploitation methods that use macOS internal calls. Red teams can also find this of use for getting ideas around using Swift for macOS post-exploitation
|
|
reference:
|
|
- https://github.com/cedowens/C2-JARM
|
|
- https://github.com/cedowens/MacShellSwift
|
|
metadata:
|
|
max-request: 1
|
|
tags: jarm,network,c2,ir,osint,cti,macshell,tcp
|
|
tcp:
|
|
- inputs:
|
|
- data: 2E
|
|
type: hex
|
|
host:
|
|
- "{{Hostname}}"
|
|
matchers:
|
|
- type: dsl
|
|
dsl:
|
|
- "jarm(Hostname) == '2ad000000000000000000000000000eeebf944d0b023a00f510f06a29b4f46'"
|
|
# digest: 4a0a0047304502202d60a37744b1d19cefa30e3f972f82940853eaa049a82065ec36b98ace0bb003022100fdf5417150aea42f655bc7ce09c02ec0ccb2795f138d5acfff71c66de8704f3f:922c64590222798bb761d5b6d8e72950 |