Flerken – obfuscated command detection
Flerken – obfuscated command detection
Command line obfuscation has been proved to be a non-negligible factor in file less malware or malicious actors that are “living off the land”. To bypass signature-based detection, dedicated obfuscation techniques are shown to be used by red-team penetrations and even APT activities. Meanwhile, numerous obfuscators (namely tools perform syntax transformation) are open sourced, thus making obfuscating given commands increasingly effortless.
However, the number of suitable defenses remains to be few. For Linux command line obfuscation, we can barely find any detection tools. Concerning defenses against Windows command obfuscation, existing schemes turn out to either lack of toolization, or only partially resolve the entire problem, sometimes even inaccurately.
To better facilitate obfuscation detection,
Documentation
For a detailed description of Flerken, please review our specification document here.
Quickstart
Installation
Step 1: Ensure you have installed python 3.x on your server, you can use the following command to check it.
Code:
Step 2: Install the required components, all the prerequisite components that also have been declared in requirement.txt.
Code:
Step3: Custom your Flerken APP config as you want.
Path: flerken/config/global_config.py
Step4: Now you can run it!
Code:
Step 5(Optional): then You can build your own whitelists for reducing false positive rate.Path: flerken/config/whitelists/
How to use
It’s very easy to use as shown in the following picture, and we will also release API interfaces as soon.
Getting Help
If you have any question or feedbacks on Flerken. also Please create an issue and choose a suitable label for it. We will solve it as soon as possible.
You can also buy instant:
Cashapp Money Transfer Click here
Paypal Money Transfer Click here
Western Union Money Transfer Click here
Venmo Money Transfer Click here
Bank Money Transfer Click here to Contact Us