1.7 KiB
patdown
EDR/XDR (Endpoint Detection & Response) fingerprinting utility useful for predicting defense mechanisms in use on remote systems.
Abstract
Patdown probes a network's DNS servers to determine whether they have resolved domains associated with various EDR/XDR solutions.
Example: if a network's resolver has assets-public.falcon.crowdstrike.com
in its cache, chances are the 'CrowdStrike Falcon' EDR solution is present somewhere on the network.
These DNS servers can be specified as arguments (the preferred way), or patdown can automatically retrieve and analyze the authoritative nameservers of a target with the -t
flag.
⚠️ Authoritative nameservers are rarely used as egress recursive resolvers for networks and are not as efficacious for fingerprinting EDR/XDR.
Installation
Retrieve a binary corresponding to your architecture from Releases
or
git clone https://git.supernets.org/delorean/patdown.git && cd patdown/cmd/patdown && go build -o patdown main.go && ./patdown
Usage
Help
patdown -h
Target specific resolvers
patdown -n ns1.target.resolver -n ns2.another.target.resolver
Automatically snoop authoritative nameservers
patdown -t supernets.org
Currently Identified Vendors/Solutions:
- CrowdStrike Falcon
- Microsoft Defender for Endpoint
- VMWare Carbon Black
- CheckPoint Harmony
- Cybereason EDR
- Trellix EDR
- Palo Alto Networks Cortex XDR
- SentinelOne Singularity
- Symantec EDR
- Tanium EDR
- Nextron Aurora
- Trend Micro Endpoint Sensor
- Rapid7 InsightIDR
this is for christian purposes