8000 GitHub - defarbs/THRecon: Threat Hunting Reconnaissance Toolkit
[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to content

defarbs/THRecon

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

THRecon

-Threat Hunting Reconnaissance Toolkit-

A collection of PowerShell modules designed for artifact gathering and reconnaisance of Windows-based endpoints. Use cases include incident response triage, threat hunting, baseline monitoring, snapshot comparisons, and more.

Host Info Processes* Services Autoruns Drivers
ARP DLLs* EnvVars Hosts File ADS
DNS Strings* Users & Groups Ports Select Registry
Hotfixes Handles* Sofware Hardware Event Logs
Net Adapters Net Routes Sessions Shares Certificates
Scheduled Tasks TPM Bitlocker Recycle Bin User Files

Index


Quick Start

Requirements

  • Requires Powershell 5.0 or above on the "scanning" device.
  • Requires Powershell 3.0 or higher on target systems. You can make this further backward compatible to PowerShell 2.0 by replacing instances of "Get-CIMinstance" with "Get-WMIObject"
  • When scanning a remote machine without the psexec wrapper (Invoke-THR_PSExec), requires WinRM service on remote machine.

Install with Git

In a Command or PowerShell console, type the following...

git clone https://github.com/TonyPhipps/THRecon C:\Users\$env:UserName\Documents\WindowsPowerShell\Modules\THRecon

To update...

cd $ENV:USERPROFILE\Documents\WindowsPowerShell\Modules\THRecon
git pull

Install with PowerShell

Copy/paste this into a PowerShell console

$Modules = "$ENV:USERPROFILE\Documents\WindowsPowerShell\Modules\"
New-Item -ItemType Directory $Modules\THRecon\ -force
Invoke-WebRequest https://github.com/TonyPhipps/THRecon/archive/master.zip -OutFile $Modules\master.zip
Expand-Archive $Modules\master.zip -DestinationPath $Modules
Copy-Item $Modules\THRecon-master\* $Modules\THRecon\ -Force -Recurse
Remove-Item  $Modules\THRecon-master -Recurse -Force

Functions can also be used by opening the .psm1 file and copy-pasting its entire contents into a PowerSell console.

To update, simply run the same block of commands again.

Run THRecon!

This command will output results of a scan against localhost to c:\temp\

Invoke-THR -Quick -Output c:\temp\

Analysis

Analysis methodologies and techniques are provided in the Wiki pages.

Troubleshooting

Installing a Powershell Module

If your system does not automatically load modules in your user profile, you may need to import the module manually.

cd $ENV:USERPROFILE\Documents\WindowsPowerShell\Modules\THRecon\
Import-Module .\THRecon.psm1

Screenshots

Output of Command "Invoke-THR"

Output of Command "invoke-thr -verbose"

Output Files

Output Files

Similar Projects

What makes THRecon stand out:

  • Lightweight. Fits on a floppy disk!
  • Very little footprint/impact on targets.
  • Leverages Powershell & WMI.
  • Coding style encourages proper code review, learning, and "borrowing."
  • No DLLs or compiled components.

About

Threat Hunting Reconnaissance Toolkit

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • PowerShell 100.0%
0