Trustwave Unveils New Offerings to Maximize Value of Microsoft Security Investments. Learn More

Trustwave Unveils New Offerings to Maximize Value of Microsoft Security Investments. Learn More

Services
Capture
Managed Detection & Response

Eliminate active threats with 24/7 threat detection, investigation, and response.

twi-managed-portal-color
Co-Managed SOC (SIEM)

Maximize your SIEM investment, stop alert fatigue, and enhance your team with hybrid security operations support.

twi-briefcase-color-svg
Advisory & Diagnostics

Advance your cybersecurity program and get expert guidance where you need it most.

tw-laptop-data
Penetration Testing

Test your physical locations and IT infrastructure to shore up weaknesses before exploitation.

twi-database-color-svg
Database Security

Prevent unauthorized access and exceed compliance requirements.

twi-email-color-svg
Email Security

Stop email threats others miss and secure your organization against the #1 ransomware attack vector.

tw-officer
Digital Forensics & Incident Response

Prepare for the inevitable with 24/7 global breach response in-region and available on-site.

tw-network
Firewall & Technology Management

Mitigate risk of a cyberattack with 24/7 incident and health monitoring and the latest threat intelligence.

Solutions
BY TOPIC
Offensive Security
Solutions to maximize your security ROI
Microsoft Exchange Server Attacks
Stay protected against emerging threats
Rapidly Secure New Environments
Security for rapid response situations
Securing the Cloud
Safely navigate and stay protected
Securing the IoT Landscape
Test, monitor and secure network objects
Why Trustwave
About Us
Awards and Accolades
Trustwave SpiderLabs Team
Trustwave Fusion Security Operations Platform
Trustwave Security Colony
Partners
Technology Alliance Partners
Key alliances who align and support our ecosystem of security offerings
Trustwave PartnerOne Program
Join forces with Trustwave to protect against the most advance cybersecurity threats
SpiderLabs Blog

Sheepl : Automating People for Red and Blue Tradecraft

Whilst there is a wealth of information out there about how to build environments that can be used for training, offensive tradecraft development and blue team response detection, a vital part of these environments is hard to emulate. A computer network is more than a collection of connected computer resources, it is a platform for communications and productivity between people. So the focus becomes how do you properly emulate people within a network environment?

My solution to this challenge is a tool called 'sheepl' which can be used emulate the tasks that people generally perform on a network whilst addressing some of the shortfalls of traditional script-based approaches to emulating user behavior. The tool allows the creation of 'sheepl' who execute tasks over a period of time.

They can :

  • Type
  • Author Word documents
  • Browse to websites
  • Run command line processes
  • Interact with PowerShell
  • Create authenticated Remote Desktop Sessions
  • Create text files

As these tasks spawn processes, then this brings in opportunities to steal tokens, inject etc. Furthermore, 'sheepl' actually emulate keystrokes which mean that other opportunities such as keylogging come into play. The task list is modular so can be expanded to add in new capabilities.

Essentially anything that can be typed on a Windows system can be emulated.

This brings another dimension to environments designed to develop attacking tradecraft or define detection capabilities. A core principle is that these actions should be random, so you define a period of time, say 3hours, and then assign tasks. These tasks will be performed randomly throughout that timescale forcing red and blue to focus on the traffic signatures. The output gets compiled into a Windows executable that then performs all the actions.

The benefits of this approach are realized when you embed 'moments of opportunity' into what could be considered a normal benign set of tasks. For example, a task list could be to author some word files, browse to the intranet notice board, temporarily store a password in a text file for copy and paste and then run some system administration commands. Assuming you have compromised the host whilst this activity is taking place and are keylogging the activity, you would capture the password as it is typed into the text file and could intercept a credential that would otherwise be missed.

For an overview, you can watch a 15 minute presentation of the details of the tooling showing the process tree it creates and examples of the tasks created.

https://www.youtube.com/watch?v=OQdulPd97y4&t=678s

The tool is in continuous development and version 0.2 introduced a new structure for task delivery and looping. Now when you set a total time window, the task list and the time gaps between each task execution are now randomized upon each loop based on the total time so if you had 5 tasks assigned over 20 minutes, the sequence is randomized every 20 mins further adding the unpredictability of when an action will occur. This ultimately serves to support the focus on tradecraft development.

https://www.youtube.com/watch?v=v67VwE_uWCY&t=4s

The tool is available on the SpiderLabs git repository at https://www.github.com/SpiderLabs/sheepl

Latest SpiderLabs Blogs

Fare Thee Well ModSecurity: End-of-Life and Last Commercial Rules Update for June 2024

A Fourteen-Year Journey Comes to an End In June 2010, Trustwave acquired Breach Security, which brought with it the popular Open-Source Web Application Firewall ModSecurity for Apache. At that time,...

Read More

Secure Access Service Edge: Another Multi-Tool for the SOC

Over the years, several security defense architectures have merged into a single solution. Endpoint detection tools can perform sophisticated detections and correlations that used to require a...

Read More

Search & Spoof: Abuse of Windows Search to Redirect to Malware

Trustwave SpiderLabs has detected a sophisticated malware campaign that leverages the Windows search functionality embedded in HTML code to deploy malware. We found the threat actors utilizing a...

Read More