Jump to content
YOUR-AD-HERE
HOSTING
TOOLS

Locked rpcfirewall: Open Source Ransomware Kill Switch Tool


itsMe

Recommended Posts

This is the hidden content, please

rpcfirewall: Open Source Ransomware Kill Switch Tool

Why should I care?

RPC is the underlying mechanism which is used for numerous lateral movement techniques, reconnaissance, relay attacks, or simply to exploit vulnerable RPC services.

DCSync attack? over RPC. Remote DCOM? over RPC. WMIC? over RPC. SharpHound? over RPC. PetitPotam? over RPC. PsExec? over RPC. ZeroLogon? over RPC… well, you get the idea 🙂

What is it used for?

Research

Install the RPC Firewall and configure it to audit all remote RPC calls. Once executing any remote attack tools, you will see which RPC UUIDs and Opnums were called remotely.

Remote RPC Attacks Detection

When the RPC Firewall is configured to audit, it writes events to the Windows Event Log.

Forward this log to your SIEM, and use it to create baselines of remote RPC traffic for your servers.

Once an abnormal RPC call is audited, use it to trigger an alert for your SOC team.

Remote RPC Attacks Protection

The RPC Firewall can be configured to block & audit only potentially malicious RPC calls. All other RPC calls are not audited to reduce noise and improve performance.

Once a potentially malicious RPC call is detected, it is blocked and audited. This could be used to alert your SOC team, while keeping your servers protected.

What are the RPC Firewall Components?

It is made up of 3 components:

    RpcFwManager.exe – In charge of managing the RPC Firewall.
    RpcFirewall.dll – Injected DLL which performs the audit & filtering of RPC calls.
    RpcMessages.dll – A common library for sharing functions, and logic that writes data into Windows Event Viewer.

This is the hidden content, please

Link to comment
Share on other sites

Guest
This topic is now closed to further replies.
×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.