Excavate for folders #2094
Replies: 1 comment
-
There are a few tools that are very extremely fast at this; for example ripgrep, which is what vscode uses for // /tmp/yara.rule
rule passwords {
strings: $pass = /[a-z0-9]+passw[a-z0-9]+/
condition: any of them
} $ yara -rs /tmp/yara.rule /etc 2>/dev/null
passwords /etc/security/pwhistory.conf
0x1d8:$pass: opasswd
0x1f8:$pass: opasswd
passwords /etc/rpc
0x120:$pass: yppasswdd
0x121:$pass: ppasswdd
0x131:$pass: yppasswd
0x132:$pass: ppasswd
0x5af:$pass: nispasswd
... But since many of our excavate rules use a combination of yara and python, the best solution might be to break If we did this, @liquidsec will likely have thoughts also |
Beta Was this translation helpful? Give feedback.
-
I think we've discussed this briefly on discord but so we note it down here aswell.
We've currently got excavate extracting stuff from
HTTP_RESPONSE
andRAW_TEXT
but for folders that have been downloaded like git repos, apks, archives (soon) no juicy data is extracted from those.We tried re-raising these files from within the folder then extracting
RAW_TEXT
but that really made it run slow so is probably infeasible.We did discuss running
grep
over the folder which I think is a great idea something like`grep -rnw ''
But I am unsure how todo something like that with the Yara rules currently in excavate.
Beta Was this translation helpful? Give feedback.
All reactions