Trustwave SpiderLabs Uncovers Ov3r_Stealer Malware Spread via Phishing and Facebook Advertising. Learn More

Trustwave SpiderLabs Uncovers Ov3r_Stealer Malware Spread via Phishing and Facebook Advertising. Learn More

Managed Detection & Response

Eliminate active threats with 24/7 threat detection, investigation, and response.

Co-Managed SOC (SIEM)

Maximize your SIEM investment, stop alert fatigue, and enhance your team with hybrid security operations support.

Advisory & Diagnostics

Advance your cybersecurity program and get expert guidance where you need it most.

Penetration Testing

Test your physical locations and IT infrastructure to shore up weaknesses before exploitation.

Database Security

Prevent unauthorized access and exceed compliance requirements.

Email Security

Stop email threats others miss and secure your organization against the #1 ransomware attack vector.

Digital Forensics & Incident Response

Prepare for the inevitable with 24/7 global breach response in-region and available on-site.

Firewall & Technology Management

Mitigate risk of a cyberattack with 24/7 incident and health monitoring and the latest threat intelligence.

Microsoft Exchange Server Attacks
Stay protected against emerging threats
Rapidly Secure New Environments
Security for rapid response situations
Securing the Cloud
Safely navigate and stay protected
Securing the IoT Landscape
Test, monitor and secure network objects
Why Trustwave
About Us
Awards and Accolades
Trustwave SpiderLabs Team
Trustwave Fusion Security Operations Platform
Trustwave Security Colony
Technology Alliance Partners
Key alliances who align and support our ecosystem of security offerings
Trustwave PartnerOne Program
Join forces with Trustwave to protect against the most advance cybersecurity threats
SpiderLabs Blog

Sheepl : Automating People for Red and Blue Tradecraft

Whilst there is a wealth of information out there about how to build environments that can be used for training, offensive tradecraft development and blue team response detection, a vital part of these environments is hard to emulate. A computer network is more than a collection of connected computer resources, it is a platform for communications and productivity between people. So the focus becomes how do you properly emulate people within a network environment?

My solution to this challenge is a tool called 'sheepl' which can be used emulate the tasks that people generally perform on a network whilst addressing some of the shortfalls of traditional script-based approaches to emulating user behavior. The tool allows the creation of 'sheepl' who execute tasks over a period of time.

They can :

  • Type
  • Author Word documents
  • Browse to websites
  • Run command line processes
  • Interact with PowerShell
  • Create authenticated Remote Desktop Sessions
  • Create text files

As these tasks spawn processes, then this brings in opportunities to steal tokens, inject etc. Furthermore, 'sheepl' actually emulate keystrokes which mean that other opportunities such as keylogging come into play. The task list is modular so can be expanded to add in new capabilities.

Essentially anything that can be typed on a Windows system can be emulated.

This brings another dimension to environments designed to develop attacking tradecraft or define detection capabilities. A core principle is that these actions should be random, so you define a period of time, say 3hours, and then assign tasks. These tasks will be performed randomly throughout that timescale forcing red and blue to focus on the traffic signatures. The output gets compiled into a Windows executable that then performs all the actions.

The benefits of this approach are realized when you embed 'moments of opportunity' into what could be considered a normal benign set of tasks. For example, a task list could be to author some word files, browse to the intranet notice board, temporarily store a password in a text file for copy and paste and then run some system administration commands. Assuming you have compromised the host whilst this activity is taking place and are keylogging the activity, you would capture the password as it is typed into the text file and could intercept a credential that would otherwise be missed.

For an overview, you can watch a 15 minute presentation of the details of the tooling showing the process tree it creates and examples of the tasks created.

The tool is in continuous development and version 0.2 introduced a new structure for task delivery and looping. Now when you set a total time window, the task list and the time gaps between each task execution are now randomized upon each loop based on the total time so if you had 5 tasks assigned over 20 minutes, the sequence is randomized every 20 mins further adding the unpredictability of when an action will occur. This ultimately serves to support the focus on tradecraft development.

The tool is available on the SpiderLabs git repository at

Latest SpiderLabs Blogs

Breakdown of Tycoon Phishing-as-a-Service System

Just weeks after Trustwave SpiderLabs reported on the Greatness phishing-as-a-service (PaaS) framework, SpiderLabs’ Global Threat Operations team uncovered another PaaS that it has dubbed Tycoon...

Read More

Physical Address Strangeness in Spam

Ten years ago, Congress passed the "CAN-SPAM Act" (also known as theYou-CAN-SPAM Act, since it defined legal spam and supersedes any stricter state-antispam laws). One of the provisions of the act is...

Read More

Trustwave SpiderLabs Uncovers Ov3r_Stealer Malware Spread via Phishing and Facebook Advertising

During an Advanced Continual Threat Hunt (ACTH) investigation that took place in early December 2023, Trustwave SpiderLabs discovered Ov3r_Stealer, an infostealer distributed using Facebook...

Read More