Files
Hunt-AI/Modules/tips.py

257 lines
17 KiB
Python
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

import random
import re
TIPS = [
"💻 Make sure your Host Agents are not disabled by the APT/Red Team.",
"🛡️ Ensure EDR and antivirus solutions are actively monitoring all endpoints.",
"🔒 Monitor for unusual attempts to disable or uninstall security agents.",
"📊 Know what type of logs you are receiving.",
"🔍 Understand your log sources and validate their integrity.",
"📈 Ensure critical logs like authentication, network traffic, and process activity are being collected.",
"📧 Phishing is a common initial access attempt.",
"🛑 Train employees to recognize and report phishing emails promptly.",
"🕵️‍♀️ Investigate email attachments or links for suspicious behavior.",
"👽 Initial Access, Lateral Movement, and C2 are the easiest to catch.",
"🌐 Watch for strange connections to uncommon IPs or ports for C2 detection.",
"🔗 Track login patterns for signs of lateral movement across systems.",
"🛠️ Create Alerts tailored to your APT.",
"🚨 Develop rules based on TTPs of the threats your organization faces.",
"👾 Use known threat actor behavior as a baseline for detection.",
"🔐 Look for multiple failed login attempts followed by a success.",
"👥 Monitor for the creation of suspicious or unusual accounts.",
"🖋️ Keep an eye out for renamed files or sudden changes to file extensions.",
"🛡️ Always investigate signs of persistence mechanisms like scheduled tasks or services.",
"🔍 Check logs for lateral movement patterns within the network.",
"📂 Look for data exfiltration attempts during off-hours.",
"🕵️‍♂️ Watch for processes running in uncommon directories.",
"🗂️ Review changes to sensitive directories like /etc or C:\\Windows\\System32.",
"⚠️ Be alert to PowerShell scripts with obfuscation or base64 encoding.",
"📥 Investigate unusual inbound or outbound traffic patterns.",
"💻 Track the execution of unknown binaries or scripts.",
"📊 Analyze event logs for sequences that indicate privilege escalation.",
"🌐 Monitor for connections to known malicious IPs or domains.",
"📈 Look for unusual spikes in network activity or CPU usage.",
"🔑 Check for default or weak passwords in critical accounts.",
"🔗 Watch for newly created symbolic links or junction points.",
"🕒 Investigate task scheduler events outside of normal working hours.",
"📦 Look for recently installed software that wasnt approved.",
"🔓 Monitor for attempts to disable antivirus or EDR tools.",
"📜 Analyze browser history or bookmarks for connections to malicious sites.",
"📂 Look for files with double extensions like `.exe.pdf`.",
"🛠️ Check system startup items for unauthorized entries.",
"📤 Investigate signs of data compression and outbound transfer.",
"👀 Watch for registry modifications in persistence-related keys.",
"🔍 Scan for unsigned drivers or DLLs in system directories.",
"📡 Monitor DNS queries to unusual or high-risk domains.",
"💽 Look for rogue virtual machines or snapshots.",
"🖥️ Inspect remote desktop protocol (RDP) logs for unauthorized connections.",
"🛡️ Review firewall logs for changes in access rules or port scans.",
"📧 Analyze email headers for signs of phishing or spoofing.",
"📌 Monitor USB activity for unauthorized devices.",
"⚡ Look for processes with high privilege levels started by unprivileged users.",
"🔗 Watch for changes to trusted system binaries.",
"🛠️ Investigate event IDs related to new service installations.",
"📂 Check shadow copies for deleted or modified files.",
"🔍 Monitor account logins from unusual geographic locations.",
"📂 Investigate tampering with backup files or schedules.",
"🖥️ Look for signs of remote code execution (RCE) attempts.",
"🌐 Review web server logs for suspicious parameter tampering.",
"🚦 Monitor network flows for unusual traffic patterns or unexpected ports.",
"📡 Be suspicious of repeated DNS queries to non-existent domains.",
"🔒 Check for unauthorized changes to file or folder permissions.",
"📤 Look for encrypted or compressed outbound traffic to unknown hosts.",
"⚙️ Monitor changes in system startup configurations.",
"🔍 Search for PowerShell scripts that include encoded commands.",
"📁 Investigate files with zero-byte size in critical directories.",
"🕒 Check for processes running at scheduled intervals outside business hours.",
"📈 Review performance metrics for sudden resource spikes.",
"🚀 Look for signs of process injection into legitimate applications.",
"💻 Monitor for unauthorized changes to group memberships.",
"🔗 Watch for symbolic links pointing to unexpected locations.",
"🔍 Examine email attachments for hidden macros or scripts.",
"⚠️ Scan for privilege escalation techniques in event logs.",
"📦 Look for unexpected or unsigned updates to software packages.",
"💾 Review logs for signs of removable media usage.",
"🖥️ Investigate unusual usage of command-line utilities like `netstat` or `ipconfig`.",
"📤 Track unusual outbound connections to high-risk countries.",
"🔍 Look for registry keys with suspicious auto-start entries.",
"🔧 Investigate changes to WMI subscriptions or filters.",
"📊 Analyze account lockout patterns for brute-force attempts.",
"🛡️ Monitor processes using suspicious parent-child relationships.",
"📥 Investigate large file downloads from unusual IPs.",
"⚡ Check for unauthorized applications installed via package managers.",
"🔗 Look for SMB connections between unexpected hosts.",
"🔍 Search for processes masquerading as system utilities.",
"🖥️ Review logs for attempts to clear or disable event logging.",
"📂 Look for hidden files in critical directories.",
"🚦 Monitor outbound traffic for data transfers at odd hours.",
"🔓 Check for unauthorized access to sensitive configuration files.",
"🔧 Scan for unrecognized services or drivers in startup logs.",
"🌐 Review web application logs for unauthorized access attempts.",
"📜 Look for tampered audit logs or log file deletions.",
"💡 Investigate systems with unusual uptime patterns.",
"🕵️‍♂️ Monitor unusual changes to group policies.",
"📂 Investigate abnormal growth in specific file directories.",
"🛠️ Look for unusual process execution chains in forensic tools.",
"📋 Check for clipboard monitoring or keylogging behavior.",
"🚨 Monitor IDS/IPS alerts for common lateral movement patterns.",
"🌍 Correlate login activity with geolocation inconsistencies.",
"🔑 Investigate processes accessing security-critical files.",
"📤 Look for repeated failed data upload attempts to unknown servers.",
"🔍 Check for malicious scheduled tasks created recently.",
"🛡️ Watch for unusual changes to user password policies.",
"📈 Investigate sudden changes in user account activity levels.",
"🖥️ Review temporary files for evidence of script execution.",
"📦 Monitor endpoints for unauthorized package or library downloads.",
"📂 Look for anomalies in recently accessed files.",
"⚙️ Investigate mismatches in user-agent strings in web traffic.",
"🔍 Look for attackers leaving test artifacts like `1.txt` or `test.ps1`.",
"📜 Track file hashes for unauthorized changes to key binaries.",
"🚦 Review network traffic for abnormal TTL values.",
"🛡️ Identify rare parent-child process relationships in your environment.",
"🔍 Investigate long-running processes, especially with elevated privileges.",
"📊 Analyze PowerShell logs for encoded or obfuscated commands.",
"🌐 Review TLS/SSL traffic for connections to self-signed certificates.",
"📁 Monitor for temporary files with sensitive data remnants.",
"🚦 Analyze unusual ICMP traffic patterns, often used in C2 communications.",
"🔗 Watch for new shares created on file servers.",
"🕵️‍♂️ Search for suspicious DNS TXT record queries.",
"🔍 Investigate commands executed by `cmd.exe` or `bash`.",
"🖥️ Look for abnormal usage of tools like `certutil` or `wget`.",
"🔓 Monitor for attempted privilege escalation via sudo or su.",
"📂 Search for files with names mimicking system executables.",
"🚨 Look for multiple simultaneous logins to a single account.",
"🛡️ Track binaries executed directly from the browser download folder.",
"🌐 Monitor HTTP POST requests to unknown domains.",
"📊 Analyze VPN connections for anomalies in duration or frequency.",
"🔍 Check for DLLs loaded from unexpected directories.",
"📂 Monitor `.tmp` files in system directories.",
"🖋️ Look for encoded payloads in commonly abused file formats like `.docx`.",
"🚦 Watch for network traffic containing known C2 patterns.",
"🔧 Investigate changes to Local Security Authority (LSA) configuration.",
"📈 Analyze system uptime for anomalies indicating potential reboots.",
"🌐 Monitor unusual redirects in web server logs.",
"📂 Investigate changes to `/etc/passwd` or SAM files.",
"🛡️ Look for unauthorized modifications to PAM modules.",
"🖋️ Examine email forwarding rules set by attackers for persistence.",
"🚦 Analyze protocol mismatches in encrypted traffic.",
"🔍 Search for executables or scripts hidden with spaces or special characters.",
"📂 Look for ZIP/RAR archives with embedded malicious scripts.",
"🌐 Monitor user-agent strings for indicators of automation.",
"🚦 Watch for port scanning or unusual sequential connections.",
"🔒 Track processes that directly modify system logs.",
"📂 Monitor suspicious changes to file ownership or permissions.",
"🛡️ Investigate suspicious network shares with modified permissions.",
"🚀 Look for scripts invoking unauthorized API calls.",
"🔧 Monitor changes to firewall rules allowing external access.",
"🌍 Correlate suspicious geolocation patterns in remote logins.",
"🖥️ Analyze command history for unusual usage.",
"📤 Watch for data egress in unconventional formats.",
"📊 Investigate mismatches between file metadata and actual content.",
"🔍 Search for execution of commands like `nc` or `netcat`.",
"🚨 Track endpoints with repeated failed DNS lookups.",
"📂 Monitor files compressed using password protection.",
"📡 Look for inbound SSH connections from unknown sources.",
"🖋️ Investigate office documents with unusual macros.",
"🚦 Watch for packet size anomalies in encrypted traffic.",
"🔍 Analyze event logs for attempts to tamper with security settings.",
"🛡️ Monitor software installations from untrusted certificates.",
"📥 Investigate repeated connections to IPs without associated domains.",
"📊 Look for binary downloads from suspicious URLs.",
"🕵️‍♂️ Monitor registry changes related to persistence mechanisms.",
"🛠️ Analyze anomalous changes in group memberships.",
"📂 Investigate tampered antivirus exclusions or policies.",
"📈 Search for inconsistencies in time-stamped files.",
"🔧 Monitor default admin shares for unusual access.",
"📜 Look for signs of log tampering in security audit logs.",
"📡 Check SMB traffic for unauthorized access attempts.",
"🖋️ Investigate PDFs with hidden payloads or JavaScript.",
"🌐 Analyze web server headers for outdated or misconfigured software.",
"📊 Look for modified or unexpected system images.",
"🖥️ Monitor endpoint connections to public paste sites.",
"🚦 Watch for stealthy TCP retransmissions in packet captures.",
"📂 Investigate newly created service accounts with high privileges.",
"🔧 Analyze processes creating non-standard network connections.",
"📈 Monitor CPU and memory spikes during off-hours.",
"🚀 Investigate scripts executed from uncommon locations.",
"🌍 Correlate network traffic against threat intelligence sources.",
"📤 Look for encrypted or compressed outbound data at odd times.",
"📂 Monitor endpoints for large, unexpected file deletions.",
"📡 Look for reverse shell attempts in network logs.",
"🛡️ Investigate unusual browser plugins or extensions.",
"📊 Search for unexplained registry run keys.",
"🔧 Investigate unusual file naming conventions in backup locations.",
"🖥️ Monitor desktop activity for unscheduled screenshots or keylogging.",
"📜 Investigate systems with missing or altered critical files.",
"🚦 Correlate failed authentications with brute-force patterns.",
"📂 Analyze temporary folders for suspicious script files.",
"🔍 Look for attackers testing connectivity via `ping` or traceroute.",
"📊 Track spikes in file-sharing activity.",
"🌐 Review web traffic logs for possible data leakage.",
"🖋️ Investigate documents with high entropy in their metadata.",
"📤 Look for staging directories with suspicious files.",
"🕵️‍♂️ Monitor access logs for unauthorized application startups.",
"📂 Investigate tampered scheduled jobs or cron entries.",
"🛡️ Analyze unauthorized password resets or account creations.",
"🔧 Search for hidden tasks in task scheduler or cron jobs.",
"📡 Investigate unusual or repeated ARP requests.",
"🌍 Correlate IoT device traffic patterns with known exploits.",
"🚦 Monitor DNS requests with large or binary-like payloads.",
"📈 Look for repeated HTTP 401 (Unauthorized) responses."
]
# Cybersecurity jokes
JOKES = [
"🤖 Why did the hacker cross the road? To get to the other .NET.",
"❄️ Why was the computer cold? It left its Windows open.",
"🪥 How do hackers freshen their breath? With CyberTic Tac!",
"❤️‍🩹 Why don't hackers ever get into relationships? They're afraid of commitments.",
"🐾 What do you call a hacker who loves animals? A purr-sistence threat!",
"💸 Why did the server go broke? It lost all its cache.",
"😂 How do you make a malware laugh? Give it a worm joke!",
"📉 Why did the sysadmin go broke? Too many root expenses.",
"🥣 Whats a hackers favorite kind of cereal? Spy-ders!",
"🛡️ Why did the password break up with the hacker? It was too weak.",
"🔒 Why are cybersecurity experts bad at telling jokes? They always encrypt the punchline.",
"🎵 Whats a hackers favorite music genre? Phishing!",
"👓 Why do hackers wear glasses? Because they lost their focus.",
"📶 Why did the WiFi break up with the laptop? It found a stronger connection.",
"😌 Why was the antivirus program so relaxed? It knew how to quarantine stress.",
"🍁 Whats a hackers favorite season? Phall.",
"🌑 Why do programmers prefer dark mode? Because light attracts bugs.",
"🚩 Whats a hackers favorite game? Capture the flag!",
"☠️ Why dont hackers get along with pirates? Too many patches.",
"🎉 How do you throw a cybersecurity party? Invite everyone to the LAN!",
"🔥 Why was the firewall so happy? It finally blocked its ex.",
"🔑 Why was the keyboard locked out of the server room? Too many CAPS.",
"🍺 Whats a hackers least favorite drink? Root beer.",
"⚾ Why was the hacker bad at baseball? It couldnt handle the curve (encryption).",
"☕ How do cybersecurity experts like their coffee? Encrypted.",
"😭 Why did the antivirus cry? It couldnt handle the worm.",
"🤫 Why dont hackers tell secrets? Theyre worried about key-loggers.",
"🏕️ Why dont hackers go camping? Too many phishing attacks.",
"💃 Whats a hackers favorite dance? The worm.",
"🐴 Why was the Trojan horse so good at infiltration? It always had the write access.",
"🧗 Whats the cybersecurity experts favorite sport? Fire-wall climbing.",
"🕵️‍♂️ Why was the hacker great at hide-and-seek? It always hid in the registry.",
"🛜 What did the router say to the server? Youve got the bandwidth for this!",
"🍽️ Whats a phishing scammers favorite dish? Spam.",
"🌞 Why dont hackers get sunburned? They stay in the shadows.",
"🧑‍🔬 What do you call a group of math and science geeks at a party? Social engineers.",
"🌐 Whats the best way to catch a runaway robot? Use a botnet.",
"🐛 Why did the programmer leave the camping trip early? There were too many bugs."
]
ANSI_ESCAPE_REGEX = re.compile(r'\x1B(?:[@-Z\\-_]|\[[0-?]*[ -/]*[@-~])')
def get_random_tip_or_joke(clean=False):
# Pick a random tip or joke and assign a color
item = random.choice(TIPS + JOKES)
formatted_item = f"{item}"
if clean:
# Remove ANSI escape codes if clean output is requested
return ANSI_ESCAPE_REGEX.sub('', formatted_item)
return formatted_item