List Windows Firewall Rules via Netsh#

Metadata#

platform

Windows

contributors

Roberto Rodriguez @Cyb3rWard0g,MSTIC R&D

creation date

2022-04-28

modification date

2022-04-28

Tactics

TA0007

Techniques

T1016

Description#

A threat actor might want to enumerate Windows firewall rules using netsh command.

Run Simulation#

Get OAuth Access Token#

from msal import PublicClientApplication
import requests
import time

function_app_url = "https://FUNCTION_APP_NAME.azurewebsites.net"

tenant_id = "TENANT_ID"
public_client_app_id = "KATANA_CLIENT_APP_ID"
server_app_id_uri = "api://" + tenant_id + "/cloudkatana"
scope = server_app_id_uri + "/user_impersonation"

app = PublicClientApplication(
    public_client_app_id,
    authority="https://login.microsoftonline.com/" + tenant_id
)
result = app.acquire_token_interactive(scopes=[scope])
bearer_token = result['access_token']

Set Azure Function Orchestrator#

endpoint = function_app_url + "/api/orchestrators/Orchestrator"

Prepare HTTP Body#

data = [{'RequestId': '10213cae-21e9-4776-b9d4-5dcf4bf1228e', 'name': 'List Windows Firewall Rules via Netsh', 'metadata': {'creationDate': '2022-04-28', 'modificationDate': '2022-04-28', 'description': 'A threat actor might want to enumerate Windows firewall rules using netsh command.\n', 'contributors': ['Roberto Rodriguez @Cyb3rWard0g', 'MSTIC R&D'], 'mitreAttack': [{'technique': 'T1016', 'tactics': ['TA0007']}]}, 'steps': [{'schema': 'atomic', 'id': '1dddb866-957a-4cde-8a3d-0209381a831d', 'name': 'List Windows Firewall Rules via Netsh', 'metadata': {'creationDate': '2022-04-28', 'modificationDate': '2022-04-28', 'description': 'A threat actor might want to enumerate Windows firewall rules using netsh command.\n', 'contributors': ['Roberto Rodriguez @Cyb3rWard0g', 'MSTIC R&D'], 'mitreAttack': [{'technique': 'T1016', 'tactics': ['TA0007']}]}, 'execution': {'type': 'ScriptModule', 'platform': 'WindowsHybridWorker', 'executor': 'PowerShell', 'module': {'name': 'invoke-atomicredteam', 'function': 'Invoke-AtomicTest'}, 'parameters': {'AtomicTechnique': ['T1016']}}, 'file_name': 'list_windows_firewall_rules_via_netsh', 'number': 1}]}]

Send HTTP Request#

http_headers = {'Authorization': 'Bearer ' + bearer_token, 'Accept': 'application/json','Content-Type': 'application/json'}
results = requests.get(endpoint, json=data, headers=http_headers, stream=False).json()

time.sleep(30)

Explore Output#

query_status = requests.get(results['statusQueryGetUri'], headers=http_headers, stream=False).json()
query_results = query_status['output']
query_results