The Alchemies feature introduces a powerful dynamic recipe generation system for Jibril!
New Feature!
Jibril
DiscordGarnet🐈‍⬛
  • Jibril
    • Jibril
      • New Era
      • Theory Behind
      • Architecture
      • Agent Dashboard
      • Compare
    • Install and Run
      • Requirements
      • Systemd Service
        • Systemd Config
      • Command Line
      • Docker Container
      • Kubernetes
        • Kubernetes Script
      • Configuration File
        • Cache Configuration
        • Cadence Configuration
        • Network Policy File
    • Components
      • Features
      • Extensions
      • Plugins
      • Printers
      • Events
      • Alchemies
        • Overview
        • Enable Alchemies
        • Create Recipes
        • Recipes Reference
        • Builtin Recipes
      • Network Policy
      • Attenuator
    • Mechanisms
      • File Access
      • Execution
      • File Access And Execution
      • Network Peers
      • Network eBPF Logic
      • Probes and Traces
      • Bigger eBPF Logic
      • Loader Interception
    • Detections
      • File Access
        • Auth Logs Tamper
        • Binary Self Deletion
        • Capabilities Modification
        • Code Modification Through Procfs
        • Core Pattern Access
        • CPU Fingerprint
        • Credentials Files Access
        • Crypto Miner Files
        • Environment Read From ProcFS
        • File Example
        • Filesystem Fingerprint
        • Global Shlib Modification
        • Java Debug Lib Load
        • Java Instrument Lib Load
        • Machine Fingerprint
        • OS Fingerprint
        • OS Network Fingerprint
        • OS Status Fingerprint
        • Package Repo Config Modification
        • PAM Config Modification
        • Sched Debug Access
        • Shell Config Modification
        • SSL Certificate Access
        • Sudoers Modification
        • Sysrq Access
        • Unprivileged Bpf Config Access
      • Execution
        • Binary Executed By Loader
        • Code On The Fly
        • Crypto Miner Execution
        • Data Encoder Exec
        • Denial Of Service Tools
        • Exec Example
        • Exec From Unusual Dir
        • File Attribute Change
        • Hidden Elf Exec
        • Interpreter Shell Spawn
        • Net Filecopy Tool Exec
        • Net MitM Tool Exec
        • Net Scan Tool Exec
        • Net Sniff Tool Exec
        • Net Suspicious Tool Exec
        • Net Suspicious Tool Shell
        • Passwd Usage
        • Runc Suspicious Exec
        • Webserver Exec
        • Webserver Shell Exec
      • Network Peers
        • Adult Domain Access
        • Badware Domain Access
        • Dynamic DNS Domain Access
        • Fake Domain Access
        • Gambling Domain Access
        • Peer Example
        • Piracy Domain Access
        • Plaintext Communication
        • Threat Domain Access
        • Tracking Domain Access
        • VPN Domain Access
    • Bugs and Requests
    • Banner
    • License
  • Research
    • Runtime Security
      • Valkyrie Response
  • MITRE
    • Mitre Attack
      • Initial Access
        • Valid Accounts
          • Default Accounts
          • Domain Accounts
          • Local Accounts
          • Cloud Accounts
        • Replication Through Removable Media
        • External Remote Services
        • Drive-by Compromise
        • Exploit Public-Facing Application
        • Supply Chain Compromise
          • Compromise Software Dependencies and Development Tools
          • Compromise Software Supply Chain
          • Compromise Hardware Supply Chain
        • Trusted Relationship
        • Hardware Additions
        • Phishing
          • Spearphishing Attachment
          • Spearphishing Link
          • Spearphishing via Service
          • Spearphishing Voice
      • Execution
        • Windows Management Instrumentation
        • Scheduled Task/Job
          • At
          • Cron
          • Scheduled Task
          • Systemd Timers
          • Container Orchestration Job
        • Command and Scripting Interpreter
          • PowerShell
          • AppleScript
          • Windows Command Shell
          • Unix Shell
          • Visual Basic
          • Python
          • JavaScript
          • Network Device CLI
          • Cloud API
          • AutoHotKey & AutoIT
          • Lua
        • Software Deployment Tools
        • Native API
        • Shared Modules
        • Exploitation for Client Execution
        • User Execution
          • Malicious Link
          • Malicious File
          • Malicious Image
        • Inter-Process Communication
          • Component Object Model
          • Dynamic Data Exchange
          • XPC Services
        • System Services
          • Launchctl
          • Service Execution
        • Container Administration Command
          • Deploy Container
        • Serverless Execution
        • Cloud Administration Command
      • Persistence
        • Boot or Logon Initialization Scripts
          • Logon Script (Windows)
          • Login Hook
          • Network Logon Script
          • RC Scripts
          • Startup Items
        • Scheduled Task/Job
          • At
          • Cron
          • Scheduled Task
          • Systemd Timers
          • Container Orchestration Job
        • Valid Accounts
          • Default Accounts
          • Domain Accounts
          • Local Accounts
          • Cloud Accounts
        • Account Manipulation
          • Additional Cloud Credentials
          • Additional Email Delegate Permissions
          • Additional Cloud Roles
          • SSH Authorized Keys
          • Device Registration
          • Additional Container Cluster Roles
          • Additional Local or Domain Groups
        • External Remote Services
        • Create Account
          • Local Account
          • Domain Account
          • Cloud Account
        • Office Application Startup
          • Office Template Macros
          • Office Test
          • Outlook Forms
          • Outlook Home Page
          • Outlook Rules
          • Add-ins
        • Browser Extensions
        • BITS Jobs
        • Traffic Signaling
          • Port Knocking
          • Socket Filters
        • Server Software Component
          • SQL Stored Procedures
          • Transport Agent
          • Web Shell
          • IIS Components
          • Terminal Services DLL
        • Implant Internal Image
        • Pre-OS Boot
          • System Firmware
          • Component Firmware
          • Bootkit
          • ROMMONkit
          • TFTP Boot
        • Create or Modify System Process
          • Launch Agent
          • Systemd Service
          • Windows Service
          • Launch Daemon
          • Container Service
        • Event Triggered Execution
          • Change Default File Association
          • Screensaver
          • Windows Management Instrumentation Event Subscription
          • Unix Shell Configuration Modification
          • Trap
          • LC_LOAD_DYLIB Addition
          • Netsh Helper DLL
          • Accessibility Features
          • AppCert DLLs
          • AppInit DLLs
          • Application Shimming
          • Image File Execution Options Injection
          • PowerShell Profile
          • Emond
          • Component Object Model Hijacking
          • Installer Packages
          • Udev Rules
        • Boot or Logon Autostart Execution
          • Registry Run Keys / Startup Folder
          • Authentication Package
          • Time Providers
          • Winlogon Helper DLL
          • Security Support Provider
          • Kernel Modules and Extensions
          • Re-opened Applications
          • LSASS Driver
          • Shortcut Modification
          • Port Monitors
          • Plist Modification
          • XDG Autostart Entries
          • Active Setup
          • Login Items
        • Compromise Host Software Binary
        • Modify Authentication Process
          • Domain Controller Authentication
          • Password Filter DLL
          • Pluggable Authentication Modules
          • Network Device Authentication
          • Reversible Encryption
          • Multi-Factor Authentication
          • Hybrid Identity
          • Network Provider DLL
          • Conditional Access Policies
        • Hijack Execution Flow
          • DLL Search Order Hijacking
          • DLL Side-Loading
          • Dylib Hijacking
          • Executable Installer File Permissions Weakness
          • Dynamic Linker Hijacking
          • Path Interception by PATH Environment Variable
          • Path Interception by Search Order Hijacking
          • Path Interception by Unquoted Path
          • Services File Permissions Weakness
          • Services Registry Permissions Weakness
          • COR_PROFILER
          • KernelCallbackTable
          • AppDomainManager
      • Privilege Escalation
        • Boot or Logon Initialization Scripts
          • Logon Script (Windows)
          • Login Hook
          • Network Logon Script
          • RC Scripts
          • Startup Items
        • Scheduled Task/Job
          • At
          • Cron
          • Scheduled Task
          • Systemd Timers
          • Container Orchestration Job
        • Process Injection
          • Dynamic-link Library Injection
          • Portable Executable Injection
          • Thread Execution Hijacking
          • Asynchronous Procedure Call
          • Thread Local Storage
          • Ptrace System Calls
          • Proc Memory
          • Extra Window Memory Injection
          • Process Hollowing
          • Process Doppelgänging
          • VDSO Hijacking
          • ListPlanting
        • Exploitation for Privilege Escalation
        • Valid Accounts
          • Default Accounts
          • Domain Accounts
          • Local Accounts
          • Cloud Accounts
        • Account Manipulation
          • Additional Cloud Credentials
          • Additional Email Delegate Permissions
          • Additional Cloud Roles
          • SSH Authorized Keys
          • Device Registration
          • Additional Container Cluster Roles
          • Additional Local or Domain Groups
        • Access Token Manipulation
          • Token Impersonation/Theft
          • Create Process with Token
          • Make and Impersonate Token
          • Parent PID Spoofing
          • SID-History Injection
        • Domain or Tenant Policy Modification
          • Group Policy Modification
          • Trust Modification
        • Create or Modify System Process
          • Launch Agent
          • Systemd Service
          • Windows Service
          • Launch Daemon
          • Container Service
        • Event Triggered Execution
          • Change Default File Association
          • Screensaver
          • Windows Management Instrumentation Event Subscription
          • Unix Shell Configuration Modification
          • Trap
          • LC_LOAD_DYLIB Addition
          • Netsh Helper DLL
          • Accessibility Features
          • AppCert DLLs
          • AppInit DLLs
          • Application Shimming
          • Image File Execution Options Injection
          • PowerShell Profile
          • Emond
          • Component Object Model Hijacking
          • Installer Packages
          • Udev Rules
        • Boot or Logon Autostart Execution
          • Registry Run Keys / Startup Folder
          • Authentication Package
          • Time Providers
          • Winlogon Helper DLL
          • Security Support Provider
          • Kernel Modules and Extensions
          • Re-opened Applications
          • LSASS Driver
          • Shortcut Modification
          • Port Monitors
          • Plist Modification
          • XDG Autostart Entries
          • Active Setup
          • Login Items
        • Abuse Elevation Control Mechanism
          • Setuid and Setgid
          • Bypass User Account Control
          • Sudo and Sudo Caching
          • Elevated Execution with Prompt
          • Temporary Elevated Cloud Access
          • TCC Manipulation
        • Hijack Execution Flow
          • DLL Search Order Hijacking
          • DLL Side-Loading
          • Dylib Hijacking
          • Executable Installer File Permissions Weakness
          • Dynamic Linker Hijacking
          • Path Interception by PATH Environment Variable
          • Path Interception by Search Order Hijacking
          • Path Interception by Unquoted Path
          • Services File Permissions Weakness
          • Services Registry Permissions Weakness
          • COR_PROFILER
          • KernelCallbackTable
          • AppDomainManager
        • Escape to Host
      • Defense Evasion
        • Direct Volume Access
        • Rootkit
        • Obfuscated Files or Information
          • Binary Padding
          • Software Packing
          • Steganography
          • Compile After Delivery
          • HTML Smuggling
        • Masquerading
          • Right-to-Left Override
          • Rename System Utilities
          • Masquerade Task or Service
          • Match Legitimate Name or Location
          • Space after Filename
          • Double File Extension
          • Masquerade File Type
        • Process Injection
          • Dynamic-link Library Injection
          • Portable Executable Injection
          • Thread Execution Hijacking
          • Asynchronous Procedure Call
          • Thread Local Storage
          • Ptrace System Calls
          • Proc Memory
          • Extra Window Memory Injection
          • Process Hollowing
          • Process Doppelgänging
          • VDSO Hijacking
          • ListPlanting
        • Indicator Removal
          • Clear Windows Event Logs
          • Clear Command History
          • File Deletion
          • Timestomp
          • Clear Network Connection History and Configurations
        • Valid Accounts
          • Default Accounts
          • Domain Accounts
          • Local Accounts
          • Cloud Accounts
        • Modify Registry
        • Access Token Manipulation
          • Token Impersonation/Theft
          • Create Process with Token
          • Make and Impersonate Token
          • Parent PID Spoofing
          • SID-History Injection
        • Deobfuscate/Decode Files or Information
        • BITS Jobs
        • Indirect Command Execution
        • Traffic Signaling
          • Port Knocking
          • Socket Filters
        • Rogue Domain Controller
        • Exploitation for Defense Evasion
        • System Script Proxy Execution
          • PubPrn
        • System Binary Proxy Execution
          • Compiled HTML File
          • Control Panel
          • CMSTP
          • InstallUtil
          • Mshta
          • Msiexec
          • Odbcconf
          • Regsvcs/Regasm
          • Regsvr32
          • Rundll32
          • Verclsid
          • Mavinject
          • MMC
        • XSL Script Processing
        • Template Injection
        • File and Directory Permissions Modification
          • Windows File and Directory Permissions Modification
          • Linux and Mac File and Directory Permissions Modification
        • Execution Guardrails
          • Environmental Keying
          • Mutual Exclusion
          • Time Based Evasion
        • Domain or Tenant Policy Modification
          • Group Policy Modification
          • Trust Modification
        • Virtualization/Sandbox Evasion
          • System Checks
          • User Activity Based Checks
          • Time Based Evasion
        • Pre-OS Boot
          • System Firmware
          • Component Firmware
          • Bootkit
          • ROMMONkit
          • TFTP Boot
        • Abuse Elevation Control Mechanism
          • Setuid and Setgid
          • Bypass User Account Control
          • Sudo and Sudo Caching
          • Elevated Execution with Prompt
          • Temporary Elevated Cloud Access
          • TCC Manipulation
        • Use Alternate Authentication Material
          • Application Access Token
          • Pass the Hash
          • Pass the Ticket
          • Web Session Cookie
        • Subvert Trust Controls
          • Gatekeeper Bypass
          • Code Signing
          • SIP and Trust Provider Hijacking
          • Install Root Certificate
          • Mark-of-the-Web Bypass
        • Modify Authentication Process
          • Domain Controller Authentication
          • Password Filter DLL
          • Pluggable Authentication Modules
          • Network Device Authentication
          • Reversible Encryption
          • Multi-Factor Authentication
          • Hybrid Identity
          • Network Provider DLL
          • Conditional Access Policies
        • Impair Defenses
          • Disable or Modify Tools
          • Disable Windows Event Logging
          • Disable or Modify System Firewall
          • Disable or Modify Cloud Logs
        • Hide Artifacts
          • Hidden Files and Directories
          • Hidden Users
          • Hidden Window
          • NTFS File Attributes
          • Hidden File System
        • Hijack Execution Flow
          • DLL Search Order Hijacking
          • DLL Side-Loading
          • Dylib Hijacking
          • Executable Installer File Permissions Weakness
          • Dynamic Linker Hijacking
          • Path Interception by PATH Environment Variable
          • Path Interception by Search Order Hijacking
          • Path Interception by Unquoted Path
          • Services File Permissions Weakness
          • Services Registry Permissions Weakness
          • COR_PROFILER
          • KernelCallbackTable
          • AppDomainManager
        • Modify Cloud Compute Infrastructure
          • Create Snapshot
          • Create Cloud Instance
        • Network Boundary Bridging
          • Network Address Translation Traversal
        • Weaken Encryption
          • Reduce Key Space
          • Disable Crypto Hardware
        • Modify System Image
          • Patch System Image
          • Downgrade System Image
        • Build Image on Host
        • Reflective Code Loading
      • Credential Access
        • OS Credential Dumping
          • LSASS Memory
          • Security Account Manager
          • NTDS
          • LSA Secrets
          • Cached Domain Credentials
          • DCSync
          • Proc Filesystem
        • Network Sniffing
        • Input Capture
          • Keylogging
          • GUI Input Capture
          • Web Portal Capture
        • Brute Force
          • Password Guessing
          • Password Cracking
          • Password Spraying
          • Credential Stuffing
        • Multi-Factor Authentication Interception
        • Forced Authentication
        • Exploitation for Credential Access
        • Cloud Instance Metadata API
        • Steal Application Access Token
        • Steal Web Session Cookie
        • Unsecured Credentials
          • Credentials In Files
          • Credentials in Registry
          • Bash History
          • Group Policy Preferences
        • Credentials from Password Stores
          • Credentials from Web Browsers
          • Windows Credential Manager
          • Password Managers
        • Modify Authentication Process
          • Domain Controller Authentication
          • Password Filter DLL
          • Pluggable Authentication Modules
          • Network Device Authentication
          • Reversible Encryption
          • Multi-Factor Authentication
          • Hybrid Identity
          • Network Provider DLL
          • Conditional Access Policies
        • Adversary-in-the-Middle
          • LLMNR/NBT-NS Poisoning and SMB Relay
          • ARP Cache Poisoning
          • DHCP Spoofing
          • Evil Twin
        • Steal or Forge Kerberos Tickets
          • Golden Ticket
          • Silver Ticket
          • Kerberoasting
        • Forge Web Credentials
          • Web Cookies
          • SAML Tokens
        • Multi-Factor Authentication Request Generation
        • Steal or Forge Authentication Certificates
      • Discovery
        • System Service Discovery
        • Application Window Discovery
        • Query Registry
        • System Network Configuration Discovery
          • Internet Connection Discovery
        • Remote System Discovery
        • System Owner/User Discovery
        • Network Sniffing
        • Network Service Discovery
        • System Network Connections Discovery
        • Process Discovery
        • Permission Groups Discovery
          • Local Groups
          • Domain Groups
          • Cloud Groups
        • System Information Discovery
        • File and Directory Discovery
        • Account Discovery
          • Local Account
          • Domain Account
          • Cloud Account
        • Peripheral Device Discovery
        • System Time Discovery
        • Network Share Discovery
        • Password Policy Discovery
        • Browser Information Discovery
        • Domain Trust Discovery
        • Virtualization/Sandbox Evasion
          • System Checks
          • User Activity Based Checks
          • Time Based Evasion
        • Software Discovery
          • Security Software Discovery
          • Installed Services Discovery
        • Cloud Service Discovery
        • Cloud Service Dashboard
        • Cloud Infrastructure Discovery
        • Container and Resource Discovery
        • System Location Discovery
          • System Language Discovery
        • Group Policy Discovery
        • Cloud Storage Object Discovery
      • Lateral Movement
        • Remote Services
          • Remote Desktop Protocol
          • SMB/Windows Admin Shares
          • Distributed Component Object Model
          • SSH
          • VNC
          • Windows Remote Management
          • Cloud Services
        • Software Deployment Tools
        • Taint Shared Content
        • Replication Through Removable Media
        • Exploitation of Remote Services
        • Internal Spearphishing
        • Use Alternate Authentication Material
          • Application Access Token
          • Pass the Hash
          • Pass the Ticket
          • Web Session Cookie
        • Remote Service Session Hijacking
          • RDP Hijacking
        • Lateral Tool Transfer
      • Collection
        • Data from Local System
        • Data from Removable Media
        • Data from Network Shared Drive
        • Input Capture
          • Keylogging
          • GUI Input Capture
          • Web Portal Capture
        • Data Staged
          • Local Data Staging
          • Remote Data Staging
        • Screen Capture
        • Email Collection
          • Local Email Collection
          • Remote Email Collection
          • Email Forwarding Rule
        • Clipboard Data
        • Automated Collection
        • Audio Capture
        • Video Capture
        • Browser Session Hijacking
        • Data from Information Repositories
          • Confluence
          • Sharepoint
          • Code Repositories
          • Customer Relationship Management Software
        • Data from Cloud Storage
          • Cloud Storage Object
        • Adversary-in-the-Middle
          • LLMNR/NBT-NS Poisoning and SMB Relay
          • ARP Cache Poisoning
          • DHCP Spoofing
          • Evil Twin
        • Archive Collected Data
          • Archive via Utility
          • Archive via Library
          • Archive via Custom Method
        • Data from Configuration Repository
          • SNMP (MIB Dump)
          • Network Device Configuration Dump
      • Exfiltration
        • Exfiltration Over Other Network Medium
          • Exfiltration Over Bluetooth
        • Automated Exfiltration
          • Traffic Duplication
        • Scheduled Transfer
        • Data Transfer Size Limits
        • Exfiltration Over C2 Channel
        • Exfiltration Over Alternative Protocol
          • Exfiltration Over Symmetric Encrypted Non-C2 Protocol
          • Exfiltration Over Asymmetric Encrypted Non-C2 Protocol
          • Exfiltration Over Unencrypted Non-C2 Protocol
        • Exfiltration Over Physical Medium
          • Exfiltration over USB
        • Exfiltration Over Web Service
          • Exfiltration to Code Repository
          • Exfiltration to Cloud Storage
          • Exfiltration to Text Storage Sites
          • Exfiltration Over Webhook
      • Command and Control
        • Data Obfuscation
          • Junk Data
          • Steganography
          • Protocol or Service Impersonation
        • Fallback Channels
        • Application Layer Protocol
          • Web Protocols
          • File Transfer Protocols
          • Mail Protocols
          • DNS
        • Proxy
          • Internal Proxy
          • External Proxy
          • Multi-hop Proxy
          • Domain Fronting
        • Communication Through Removable Media
        • Non-Application Layer Protocol
        • Web Service
          • Dead Drop Resolver
          • Bidirectional Communication
          • One-Way Communication
        • Multi-Stage Channels
        • Ingress Tool Transfer
        • Data Encoding
          • Standard Encoding
          • Non-Standard Encoding
        • Traffic Signaling
          • Port Knocking
          • Socket Filters
        • Remote Access Software
        • Dynamic Resolution
          • Fast Flux DNS
          • Domain Generation Algorithms
          • DNS Calculation
        • Non-Standard Port
        • Protocol Tunneling
        • Encrypted Channel
          • Symmetric Cryptography
          • Asymmetric Cryptography
      • Impact
        • Data Destruction
          • Lifecycle-Triggered Deletion
        • Data Encrypted for Impact
        • Service Stop
        • Inhibit System Recovery
        • Defacement
          • Internal Defacement
          • External Defacement
        • Firmware Corruption
        • Resource Hijacking
          • Compute Hijacking
        • Network Denial of Service
          • Direct Network Flood
          • Reflection Amplification
        • Endpoint Denial of Service
          • OS Exhaustion Flood
          • Service Exhaustion Flood
          • Application Exhaustion Flood
          • Application or System Exploitation
        • System Shutdown/Reboot
        • Account Access Removal
        • Disk Wipe
          • Disk Content Wipe
          • Disk Structure Wipe
        • Data Manipulation
          • Stored Data Manipulation
          • Transmitted Data Manipulation
          • Runtime Data Manipulation
      • Resource Development
        • Acquire Infrastructure
          • Domains
          • DNS Server
          • Virtual Private Server
          • Server
          • Botnet
          • Web Services
          • Serverless
          • Malvertising
        • Compromise Infrastructure
          • Domains
          • DNS Server
          • Virtual Private Server
          • Server
          • Botnet
          • Web Services
          • Serverless
          • Network Devices
        • Establish Accounts
          • Social Media Accounts
          • Email Accounts
          • Cloud Accounts
        • Compromise Accounts
          • Social Media Accounts
          • Email Accounts
          • Cloud Accounts
        • Develop Capabilities
          • Malware
          • Code Signing Certificates
          • Digital Certificates
          • Exploits
        • Obtain Capabilities
          • Malware
          • Tool
          • Code Signing Certificates
          • Digital Certificates
          • Exploits
          • Vulnerabilities
          • Artificial Intelligence
        • Stage Capabilities
          • Upload Malware
          • Upload Tool
          • Install Digital Certificate
          • Drive-by Target
          • Link Target
          • SEO Poisoning
        • Acquire Access
      • Reconnaissance
        • Gather Victim Identity Information
          • Credentials
          • Email Addresses
          • Employee Names
        • Gather Victim Network Information
          • Domain Properties
          • DNS
          • Network Trust Dependencies
          • Network Topology
          • IP Addresses
          • Network Security Appliances
        • Gather Victim Org Information
          • Determine Physical Locations
          • Business Relationships
          • Identify Business Tempo
          • Identify Roles
        • Gather Victim Host Information
          • Hardware
          • Software
          • Firmware
          • Client Configurations
        • Search Open Websites/Domains
          • Social Media
          • Search Engines
          • Code Repositories
        • Search Victim-Owned Websites
        • Active Scanning
          • Scanning IP Blocks
          • Vulnerability Scanning
          • Wordlist Scanning
        • Search Open Technical Databases
          • DNS/Passive DNS
          • WHOIS
          • Digital Certificates
          • CDNs
          • Scan Databases
        • Search Closed Sources
          • Threat Intel Vendors
          • Purchase Technical Data
        • Phishing for Information
          • Spearphishing Service
          • Spearphishing Attachment
          • Spearphishing Link
          • Spearphishing Voice
Powered by GitBook

© 2025 • Jibril • by Garnet Labs

On this page
  • Information
  • Introduction
  • Deep Dive Into Technique
  • When this Technique is Usually Used
  • How this Technique is Usually Detected
  • Why it is Important to Detect This Technique
  • Examples
  1. MITRE
  2. Mitre Attack
  3. Defense Evasion

Pre-OS Boot

Pre-OS Boot [T1542]

Last updated 2 days ago

Information

  • Name: Pre-OS Boot

  • ID: T1542

  • Tactics: ,

  • Sub-Technique: , , , ,

Introduction

Pre-OS Boot techniques, as classified under MITRE ATT&CK (T1542), involve adversaries executing malicious code or modifying system components before the operating system fully boots. Such methods allow attackers to maintain persistence, evade detection, and establish deep-rooted control over compromised systems. These techniques primarily target firmware, bootloaders, and other pre-operating system components to ensure malicious code execution at the earliest stages of system startup.

Deep Dive Into Technique

Pre-OS Boot attacks exploit vulnerabilities or weaknesses in the system boot process, firmware, or hardware initialization routines. Attackers typically leverage the following methods:

  • Firmware Modification:

    • Manipulating BIOS or UEFI firmware to embed malicious code.

    • Utilizing firmware rootkits to persistently infect systems, surviving OS reinstallations or disk replacements.

  • Bootloader Manipulation:

    • Altering bootloader code (e.g., GRUB, Windows Boot Manager) to execute malicious payloads before the OS loads.

    • Injecting code into boot sectors or EFI partitions.

  • Hardware-Level Attacks:

    • Exploiting vulnerabilities in hardware components (chipsets, TPM, storage controllers) to execute malicious instructions pre-boot.

    • Using compromised hardware or firmware implants to subvert system security.

  • Secure Boot Bypass:

    • Exploiting vulnerabilities or misconfigurations to bypass secure boot mechanisms, enabling unauthorized code execution at boot time.

    • Employing stolen or compromised signing keys to sign malicious bootloaders or firmware.

Real-world procedures typically involve:

  • Gaining initial system access through phishing, supply chain compromise, or physical access.

  • Escalating privileges to modify firmware or bootloader components.

  • Installing persistent implants or rootkits to ensure stealth and longevity.

When this Technique is Usually Used

Attackers commonly employ Pre-OS Boot techniques in the following scenarios and stages of an attack:

  • Persistence Stage:

    • To maintain long-term, stealthy persistence that survives OS reinstallation, system updates, and security software scans.

  • Privilege Escalation:

    • To escalate privileges by controlling system boot processes and firmware-level operations, enabling attackers to bypass OS-level security controls.

  • Defense Evasion:

    • To evade detection by security solutions that typically operate at OS-level, as pre-OS boot code executes before security tools are active.

  • Supply Chain Attacks:

    • Embedding malicious firmware or bootloader modifications during hardware manufacturing or software distribution processes.

  • Advanced Persistent Threat (APT) Operations:

    • Leveraging pre-OS malware to maintain persistent access in high-value targets, including government agencies, critical infrastructure, and large enterprises.

  • Physical Access Scenarios:

    • Exploiting systems where an attacker has temporary physical access, enabling direct firmware manipulation or bootloader tampering.

How this Technique is Usually Detected

Detection of Pre-OS Boot compromises typically requires specialized methods, tools, and indicators of compromise (IoCs):

  • Firmware Integrity Checks:

    • Regularly verifying firmware integrity through cryptographic hashes, secure boot procedures, and firmware attestation tools.

  • Bootloader Monitoring:

    • Analyzing bootloader configurations, boot sectors, EFI partitions, and monitoring for unauthorized modifications or anomalies.

  • Hardware Security Modules (HSM) and TPMs:

    • Utilizing Trusted Platform Modules (TPMs) or hardware security modules to detect deviations from expected boot measurements and firmware states.

  • UEFI Scanning Tools:

    • Employing specialized tools such as CHIPSEC, UEFITool, or ESET UEFI Scanner to detect malicious firmware implants or unauthorized code injections.

  • Behavioral Indicators:

    • Unexpected system crashes or boot failures.

    • Unusual boot times or delays.

    • Unrecognized firmware version numbers or unexpected firmware updates.

  • Specific Indicators of Compromise (IoCs):

    • Unknown or unsigned firmware images.

    • Suspicious EFI binaries or bootloader files.

    • Unusual firmware or bootloader configurations detected in logs.

Why it is Important to Detect This Technique

Detecting Pre-OS Boot techniques is critical due to their severe impact on systems and networks:

  • High-Level Persistence:

    • Malicious firmware implants or bootloader modifications persist across OS reinstallation, disk replacement, and routine security updates, making remediation challenging.

  • Stealth and Evasion:

    • Pre-OS malware executes before OS-level security controls are active, significantly reducing detection chances and allowing attackers prolonged undetected presence.

  • Privilege Escalation and Control:

    • Attackers gain comprehensive control over system initialization, enabling high-level privilege escalation and potential system compromise at the deepest hardware and firmware levels.

  • Integrity and Availability Risks:

    • Malicious pre-OS code can compromise system integrity, causing instability, data corruption, or denial-of-service conditions.

  • Supply Chain Risks:

    • Pre-OS attacks embedded during manufacturing or distribution can affect large-scale deployments, impacting numerous systems simultaneously.

Early detection and mitigation of Pre-OS Boot compromises are essential to prevent long-term damage, reduce remediation costs, and maintain system integrity and trustworthiness.

Examples

Real-world examples of Pre-OS Boot attacks include:

  • LoJax UEFI Rootkit (APT28):

    • Attack Scenario: Russian-linked threat actor APT28 compromised UEFI firmware to install LoJax, establishing persistent access on targeted systems.

    • Tools Used: LoJax malware, firmware flashing tools, compromised legitimate utilities.

    • Impact: Persistent, stealthy infection surviving OS reinstallations, enabling long-term espionage operations.

  • MosaicRegressor UEFI Malware (APT41):

    • Attack Scenario: Chinese-linked APT41 utilized MosaicRegressor, a malicious UEFI implant, to target diplomatic entities.

    • Tools Used: MosaicRegressor malware, firmware exploitation, and modification tools.

    • Impact: Persistent espionage campaigns with deep system-level access, difficult to detect and remediate.

  • TrickBoot Module (TrickBot Malware):

    • Attack Scenario: TrickBot operators developed TrickBoot to inspect UEFI firmware vulnerabilities, potentially enabling firmware-level persistence.

    • Tools Used: TrickBot malware framework, TrickBoot module.

    • Impact: Potential for firmware-level persistence, significantly complicating remediation and detection efforts.

  • Sednit Group (APT28) Secure Boot Bypass:

    • Attack Scenario: Exploiting vulnerabilities in Secure Boot implementations to load unsigned malicious bootloaders.

    • Tools Used: Custom bootloader modifications, exploitation of Secure Boot vulnerabilities.

    • Impact: Complete bypass of fundamental security controls, enabling persistent, stealthy malware execution.

These examples illustrate the severity and persistence potential of Pre-OS Boot attacks, highlighting the necessity for robust detection and mitigation strategies.

TA0005
TA0003
T1542.001
T1542.003
T1542.005
T1542.002
T1542.004