BluGenie

Agentless Framework

Blugenie

Automated Response and Remediation - there are plenty of PowerShell frameworks for offense. This is a PowerShell framework for defense. The only Response and Remediation Framework in PS today offering complete visibility on user endpoints such as servers, laptops and desktops, both stationary and remote, wherever your users may be working from.

You can use this framework for Threat Hunting, automated Response and Remediation also. This framework may also be used for forensic artifact collection except collecting images.

Overview

EQL Queries:

  • execute any EQL queries

  • option to add custom fields along with EQL fields

  • run EQL queries on a single machine or multiple systems or all systems on your infrastructure

  • get results in YAML or JSON

Run Yara Rule Files:

  • run any of the 100+ yara rule files prebuilt into the tool

  • run any arbitrary yara file downloaded from any TI sources including US-CERT

  • run yara on one or many systems at the time

  • get results in YAML or JSON

Firewall Audit and Protection:

Display a full list of firewall rules and their attributes for each firewall profile

  • Enable / Disable GPO Security

  • Enable / Disable Rules (A selected few or all of them)

  • Install / Uninstall Rules (A selected few or all of them)

  • Query all rules and the entire rule property table

  • Configure (Domain, Public, Private) firewall profile status

Process Audit and Protection:

Display information regarding each process in the process stack for all users including the parent command and full command line used that initialized the execution.

  • Query based on all property attributes of any process (in memory or installed on disk)

  • Query and Manage based on Signature

  • Query and Manage based on Algorithm

    • MACTripleDES

    • MD5

    • RIPEMD160

    • SHA1

    • SHA256

    • SHA384

    • SHA512

  • Terminate, Pause, or Restart processes

  • Quickly determine what processes are completely running in memory

Remote Audit and Protection:

Display information of the current remote configuration and accessibility of the remote machine.

  • Manage remote host with WMI

  • Manage remote host with WinRM

  • Enable WinRM with WMI

  • Enable / Disable Remote Desktop Protocol (RDP)

File and Folder Audit and Protection:

Displays file and folder information including

  • Algorithm, Signature, File Permissions, and ADS information

  • Quick File and Folder search (Faster than the normal search function) even hidden files and folders. Query an entire OS file system in less than 3 min for any file or folder.

  • Remove file(s) and folder(s)

  • Query Alternate Data Streams

    • Shows Stream names -Shows Stream data

  • Query and Manage based on Algorithm

    • MACTripleDES

    • MD5

    • RIPEMD160

    • SHA1

    • SHA256

    • SHA384

    • SHA512

  • Convert any variablized path to a literal path

  • Export a detailed file and folder (details view snapshot) including

    • Attributes, Date Created, File Size, and Full file name

  • Copy files and folders to and from a remote source.

    • Using SMB

    • Using WinRM (even if SMB is disabled)

Registry Audit and Protection:

Display registry information including

  • User profile attributes

  • Username

  • Profile Path

  • User Hive Path

  • User from SID information

  • Loaded Shell information

  • Load and Unload registry hives

  • Convert SID to readable user / service name

  • Convert User / Service name to SID

  • Export Registry Snapshots (.REG format)

Network Audit and Protection:

Displays all connections and listening ports and the executable involved in creating each connection

  • Terminate a connection and the executable managing it

  • Query based on any property attribute

  • Convert Foreign Address IP information to Domain Name

Services Audit and Protection:

Display information regarding each service and child process including the processing command line that was used in the initialize execution.

  • Query based on all property attributes of any service

  • Query and Manage based on Signature

  • Query and Manage based on Algorithm

    • MACTripleDES

    • MD5

    • RIPEMD160

    • SHA1

    • SHA256

    • SHA384

    • SHA512

  • Terminate, Pause, or Restart processes

  • Start, Stop, Restart, or Remove Services

Threat Hunt and Protection:

Display information regarding COM Object Hijacking, Auto Run Processes, System Prefect Data, and Most Recently Used (MRU) application and file history.

  • Query for possible COM Object Hijacking. The process searches for (*.EXE, *.DLL, *.AX, *.CPL, and *.OCX) files that can be Hijacked using the registry CLSID.

  • Display MRU Activity

  • Enable / Disable Windows Prefetching

  • Enable / Disable Audit Level Process Tracking

  • Enable / Disable Audit Level Process Policy

  • Display what programs are configured to run during system boot-up and session logins

System Information:

Display information regarding Active Directory, GPO, System configuration and hardware

  • Display Active Directory Machine Information (Without RSAT)

    • Assigned GPO List

    • System Group Membership

    • Group Members of the System

    • LDAP Container location

    • Default AD Attributes

      • Password Last Set

      • Last Logon Time

      • Logon Count

      • Object Category

      • Is Critical System Object

      • Operating System

      • Last Logon Date

      • Name

      • Bad Password Timeout

      • Service Principle Names

      • Object Class

      • Bad Password Count

      • Sam Account Type

      • Object Created Date

      • Object Changed Date

      • Object SID

      • Last Log off

      • Account Expires

      • Local Policy Flags

      • Container

      • Country Code

      • Primary Group ID

      • DNS Host Name

      • Distinguished name

      • Account expires Date

      • Supported encryption types

      • SAM Account Name

  • Display Windows Updates

    • Patches

    • Rollups

    • Service Packs

    • Hotfixes

    • Definition Update Information

    • Live link to Microsoft Information Database for each identified item

  • Display System Configuration and Hardware Information for the following items

    • Local Disks

    • Domain

    • System Description

    • Manufacturer

    • Model

    • CPU

    • System Type

    • Primary Owner

    • Logged on users

    • PowerShell Supported Versions

    • Memory

    • Operating System Information

      • Version

      • Installed Date

      • Service Packs

  • Dot Net Versions

  • System Boot Time

  • 3rd Party Application / Tool Installation and Removal

  • Download and Install Windows SysInternals Tools from Microsoft

  • Install / Uninstall and Configure SysMon Service

  • Install / Uninstall and Configure WinLogBeat Service

Overall Engine Design:

  • Run 1 to many managed jobs to thousands of remote systems

  • 3 major execution sections will speed up performance on remote systems

    • Pre – Any command(s) processed here are started first and run synchronously

    • Parallel - Any command(s) processed here are started after all the Pre commands have finished. These commands run in parallel.

    • Post – Any command(s) processed here are started after all the Pre and Parallel commands have finished. These commands run synchronously

  • Can manage Multiple IP ranges in a single job

  • Jobs can run from the Console Command Line, BluGenie Management Framework, or a JSON configuration file. Future support for YAML and XML.

  • Over 150 Functions. To Download the latest version check out our Repo on GitHub here

Last updated