Skip to content

An EDR server designed to monitor, detect, and respond to threats on network endpoints.

License

Notifications You must be signed in to change notification settings

scrymastic/edr-server

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

30 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

EDR Server

EDR Server License Status

EDR Server is a comprehensive (simple for now) Endpoint Detection and Response (EDR) system designed to monitor, detect, and respond to threats on network endpoints. It aims to provide real-time security against malware and other cyber threats by continuously monitoring endpoint activities and identifying suspicious behaviors.

Features

  • Real-time Monitoring: Continuous observation of endpoint activities to identify suspicious behaviors.
  • Threat Detection: Advanced algorithms to detect known and unknown threats.
  • Automated Response: Immediate action on detected threats to mitigate damage. (not implemented yet)
  • Incident Reporting: Detailed reports on security incidents for analysis and compliance. (not implemented yet)
  • Customizable Policies: Tailor security policies to meet specific organizational needs.

Installation

  1. Clone the repository:
git clone https://github.com/scrymastic/edr-server.git
  1. Build the Docker compose file:
docker-compose build
  1. Run the Docker compose file:
docker-compose up
  1. Access the EDR Server at http://localhost:8001. Default credentials are kali:kali.

Usage

Dashboard

After logging in with the default credentials, navigate to the Dashboard to get an overview of the system's status, including the distribution of alerts and events.

Alerts View

The Alerts tab shows all real-time alerts generated by the system, enabling quick identification and response to potential threats.

Events View

The Events tab displays a timeline of all security events detected by the system, allowing for easy tracking and investigation of potential threats.

Read events button will enable you to read the events from the event log file (extension: .evtx).

Search for specific events using the search bar.

Supported operators are =, ~ (contains), >, <. All queries are case-insensitive.

Simple logical operators AND, OR (not nested) are also supported.

For example, to search for events with the event ID 13, use the query event_id="13". To search for events with the username kali, use the query username~"kali". To search for time range, use the query time_created__SystemTime<"2024-07-17T12:00:00.0000000Z".

Rules Engine

Under the Rules tab, users can create and manage detection rules based on specific criteria, enhancing the system's ability to identify threats.

There are 1814 rules available in the system, imported from Sigma rules for Windows

alt text

Agents View

The Agents tab provides a detailed view of all endpoints monitored by the system, including their current status and recent activities.

The system offers the capability to establish a connection with the agent via a reverse shell. However, this functionality has raised security concerns.

To start a connection from the server, initiate a listening service by executing the command below. Ensure you replace 4444 with your preferred port number, which should match the one specified in the edr-agent's configuration file:

nc -lvp 4444

Subsequently, establish a connection to the agent by selecting the Connect button.

alt text

Testing

Perform attacks on the endpoint to test the EDR system.

Note: Install edr-agent to enable endpoint monitoring.

After completing the installation, connect the agent to the EDR server by running the following command:

edr-agent.exe

alt text

Reconnaissance

Gain information about the system using the following commands:

whoami
systeminfo

After running the commands, the EDR system will generate alerts for the following events:

alt text

Weaponization

Delivery

Exploitation

Start a process, notepad.exe in this case, using powershell base64 encoded command:

powershell.exe -EncodedCommand UwB0AGEAcgB0AC0AUAByAG8AYwBlAHMAcwAgAG4AbwB0AGUAcABhAGQALgBlAHgAZQA=

alt text

Installation

Command and Control (C2)

Actions on Objectives

Contributing

Contributions are welcome! Feel free to open issues and pull requests to help improve the project.

License

This project is licensed under the MIT License. See the LICENSE file for details.

About

An EDR server designed to monitor, detect, and respond to threats on network endpoints.

Topics

Resources

License

Stars

Watchers

Forks

Packages

No packages published