1
0
mirror of https://github.com/LOLBAS-Project/LOLBAS synced 2024-11-10 02:21:43 +01:00
LOLBAS/NOTICE.md

100 lines
9.0 KiB
Markdown
Raw Normal View History

## Purpose
* The LOLBAS Project is a community-driven open-source resource for documenting "Living-Off-The-Land" commands and techniques that are associated with common "Living-Off-The-Land" binaries (lolbins), scripts, and libraries within Microsoft(R) Windows(R) and associated software products. This notice serves as the primary document for terms, disclaimer, usage, structure, and license acknowledgements.
* Please refer to the README.md for "Living-Off-The-Land" criteria and definition.
* "LOLBAS Project" and "LOLBAS" are used interchangeably in this document and refer to the "LOLBAS Project"
## Project License
* The LOLBAS Project is licensed under GPL 3.0. For license information, please refer to the [LICENSE file](/LICENSE).
## Definitions
* Submitter: An individual, group, organization, or entity that contributes to the LOLBAS project through project maintenance, issue submission, Pull Request (PR) submission, etc.
* Consumer: An individual, group, organization, or entity that uses ("consumes") the LOLBAS project resources through the web portal or repository interfaces and capabilities.
* OLBAS: Living Off The Land Binaries and Scripts
* LOLBIN: Living Off The Land Binary
* LOL/"lol": Living Off The Land
## Project Terms of Use & Disclaimers
* The content presented in the LOLBAS Project, an open-source project, is for educational and informational purposes only. By using this project, including information presented on all project pages and resources in the project repository, you agree that the project authors and maintainers shall not be liable and/or held responsible/accountable for any damages resulting from the presentation, use, or misuse of the information contained on any project pages and repository documents.
* The LOLBAS Project does NOT claim that detection resources/information provided on any project pages and repository documents offer complete and proper defensive/analytic coverage for documented and undocumented LOLBIN commands, techniques, and/or use cases.
* The LOLBAS project is a consumable resource for commercial entities, private entities, and individuals. LOLBAS includes and references resources from open and public sources to enhance content quality, however, the LOLBAS Project does not endorse any particular entity, vendor, project, group, or individual. Furthermore, use of the LOLBAS project or any LOLBAS site/repository content by commercial entities, private entities, and individuals does not imply endorsement.
* LOLBAS references and links to many external/3rd party resources. Linked sites and references are not under the control of the LOLBAS Project, and as such, the LOLBAS Project is not responsible for content of external/3rd party resource sites. Furthermore, linking of external/3rd party resources does not imply endorsement of those who manage or maintain those resources.
## Project Usage
* For consuming content on the LOLBAS Project, please refer to the content on this page, navigate to resources under [/yml](/yml), and/or visit: https://lolbas-project.github.io.
* For making a contribution to the LOLBAS Project, please refer to this notice, [README.md](/README.md), and [CONTRIBUTING.md](/CONTRIBUTING.md).
## LOLBAS Entry Structure & Information
* `Name` Field: The name of the LOL binary, script, or library resource.
* `Description` Field: A short sentence of the legitimate functionality of the 'lol' resource.
* `Author` Field: The submitter of the 'lol' resource.
* `Created` Field: The date when the 'lol' resource is submitted or this entry is created.
* `Commands` Field: Contains subfields to describe usage of the 'lol' resource. Includes:
* `Command` (the command or sequence of commands/details needed to perform the 'lol' effect);
* `Description` (details of the 'lol' command behavior);
* `Usecase` (details of the use case such as the purpose and technique;
* `Category` (LOLBAS categories include AWL Bypass - Application Control Bypass; Execution; Defense Evasion; Download, Upload, Copy, Encode, Decode, Compile, ADS - Alternate Data Stream, UAC Bypass - User Account Control Bypass, Credentials - Harvest/Dump Credentials, Reconnaissance, Tamper);
* `Privilege` (User or Administrator level privileges required);
* `MitreId`[^1] (MITRE (R) ATT&CK(R) Tactic/Technique mapping);
* `OperatingSystem` (version such as Windows 10).
* `FullPath` Field: Includes the `Path` subfield to record commonly located file system paths of the 'lol' resource.
* `Code Sample` Field: Includes the `Code` subfield to specify a link to a code snippet (if applicable).
* `Detection` Field: Contains subfields to describe potential detection criteria of the 'lol' resource. Includes:
* `Sigma`[^2] (a link to Sigma detection rule on Sigma's git repository);
* `Splunk`[^2] (a link to Splunk detection rule on Splunk's git repository);
* `Elastic`[^2] (a link to Elastic detection rule on Elastic's git repository);
* `IOC`[^3] (to provide information about indicators of compromise);
* `Analysis`[^4] (a placeholder for linked resources - e.g. blog, gist, write-up, Twitter post, etc.).
* `Resources` Field[^5]: The `Link` subfield is a placeholder for a referenced resource link about the 'lol' resource.
* `Acknowledgements` Field: Includes the following subfields:
* `Person` (identifies the individual who originally discovered the technique/command);
* `Handle` (the person's Twitter handle if applicable).
[^1]: Note on MITRE(R) ATT&CK(R) Reference Model: Since the ATT&CK(R) model is widely adopted, LOLBAS attempts map to the appropriate technique if applicable. The applicable ATT&CK(R) license appears in the 'Licenses' section.
[^2]: Note on Detection References: LOLBAS does not guarantee that a particular detection reference included by a submitter/maintainer will detect associated LOLBIN behavior. The reference is simply an acknowledgment that a resource exists, and the resource could potentially be useful for a consumer. Furthermore, LOLBAS does not endorse any referenced project over another, but rather, appreciates the efforts made by individuals and organizations for providing publicly available resources/projects. Consumers of such projects are encouraged to understand a referenced project's Terms of Use and abide by the project's licensing criteria if applicable.
[^3]: Note on Detection IOCs: LOLBAS does not guarantee that a particular detection IOC included by a submitter/maintainer will detect associated LOLBIN behavior.
[^4]: Note on Detection Analysis Links: A linked analysis resource under the Detection Field (e.g. blog, gist, write-up, etc.) and contents provided by a submitter/maintainer are not endorsed by the LOLBAS project. However, LOLBAS does appreciate the efforts made by individuals and organizations for providing publicly available resources. Consumers of the 'Analysis' resource are encouraged to understand the respective resource's Terms of Use and abide by the resource's licensing criteria if applicable.
[^5]: Note on Resource Links: A linked resource under the Resources Field (e.g. blog, gist, write-up, Twitter post, etc.) and contents provided by submitters/maintainers are not endorsed by the LOLBAS project. However, LOLBAS does appreciate the efforts made by individuals and organizations for providing publicly available resources. Consumers of the linked resource are encouraged to understand the respective resource's Terms of Use and abide by the resource's licensing criteria if applicable.
## MITRE ATT&CK License
* MITRE ATT&CK Terms of Use Link: https://attack.mitre.org/resources/terms-of-use/
LICENSE
The MITRE Corporation (MITRE) hereby grants you a non-exclusive, royalty-free license to use ATT&CK® for research, development, and commercial purposes. Any copy you make for such purposes is authorized provided that you reproduce MITRE's copyright designation and this license in any such copy.
"© 2021 The MITRE Corporation. This work is reproduced and distributed with the permission of The MITRE Corporation."
DISCLAIMERS
MITRE does not claim ATT&CK enumerates all possibilities for the types of actions and behaviors documented as part of its adversary model and framework of techniques. Using the information contained within ATT&CK to address or cover full categories of techniques will not guarantee full defensive coverage as there may be undisclosed techniques or variations on existing techniques not documented by ATT&CK.
ALL DOCUMENTS AND THE INFORMATION CONTAINED THEREIN ARE PROVIDED ON AN "AS IS" BASIS AND THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS OR IS SPONSORED BY (IF ANY), THE MITRE CORPORATION, ITS BOARD OF TRUSTEES, OFFICERS, AGENTS, AND EMPLOYEES, DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION THEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
## Other Notices
* Microsoft(R) Windows(R) is a registered trademark of the Microsoft Corporation