8 hours 28 minutes
hello and welcome to another application of the minor attack framework discussion today. We're looking at him and files and directories within the defensive Asian component of the minor attack framework.
So let's go ahead and look at our objectives for today's discussion.
So we're going to describe for you what hidden files and directories are and how those work with respect to actually hiding them
some mitigation techniques. And then we're going to get into some detection techniques.
So within minor the hidden files and directories, Vector is essentially where files that are typically hidden from in users
to prevent them from accidentally overriding or changing them
in this system are used to the advantage of the threat actor. All right, so they could use those components to hide files and folders on the systems for persistence or evading purpose. So if you're not outright looking for something that's hidden,
you're probably not going to look for it. And if you're an end user, chances are you're not looking forward at all.
So how do they do it? How can we do it? Well, Windows Systems has one way, and so you can use the attributes e X e which is just a binary to run the particular command here against the file name to hide the file. Now, you can also
mark the file is hidden,
and this allows you to hide the file now within the Mac or Lennox environment, putting a dot or a period at the beginning of the file name produces a file that will be hidden or a folder that will be hidden.
So, looking at an example in a Windows based system here, I just took a few snippets.
So I've got my directory here with my standard stuff. Right. But when I go in and change my permissions or I'm sorry, the
settings for viewing hidden files and folders to the show option
I now see the secret sauce data, which is as slightly transparent looking file or folder in this case. But I'm not able to see that when this particular component is unchecked. Oh, it is set to the do not show hidden files or folders
or drives. And so we could even go as far as the hide drives on the system.
So again, by the fault, you can't
search for these things.
You have to actually show him and 1000 folders, and then you can search for them. But it's not done by the phone.
Now. Some mitigation techniques here are going to be things like in user awareness training to prevent the likelihood that payloads get on the system
and then the implementation of least privilege
so that if a user is compromised, threat actors not able to use maybe scripts and things that needs to write folder structures or put files hidden files
in directories or areas that the end user would not otherwise be able to access some detection techniques. Here
we can look for commands that add the dot on the front of files and Lennox and Mac environments, especially, or when a command is used
with the attribute syntax. And so if we have a script that's running that tries to hide files now,
something else that we might be able to do here. If we're looking for known bad file names or were familiar with some indicators of compromise, we could probably turn on the hidden file function and do some searches across systems for those files. But that would be cumbersome.
But it's definitely something you could do to try to look for suspicious information.
So let's do a quick check on learning.
Hidden files are searchable by default. True or false?
All right, well, if you need some additional time, please pause the video. So by default, hidden files are not searchable.
That goes for both clinics based. And when his based systems. If you want to see hidden files and limits based systems, there's a string for that. And if you want to see hidden files and Windows based systems, you have to make those files viewable through the properties for essentially, you could go down to the bottom of your
and I'll just, uh, pull it over to the side. But when I type Hidden says there, show him and files and folders
when we hit dinner.
As you can see here,
we just have to click,
show hidden files and hit apply, and then you can see hidden files on the system.
So, in summary of two days discussion, we described hidden files and directories again. This can be used is a mechanism for evading detection or trying to keep things secret. Squirrel on your secret sauce and heading away, we reviewed some mitigation techniques.
And then we did top detection techniques as
well. So with that in mind, I want to thank you for your time today, and I look forward to seeing you again soon.
Become an Incident Handler
In this Career Path, you will learn the incident response process, from building an incident ...
Information Security Fundamentals
The foundational networking and security concepts taught in this career path form the backbone of ...