Nemesis: Open-source offensive data enrichment and analytic pipeline
Nemesis is a centralized data processing platform that ingests, enriches, and performs analytics on offensive security assessment data (i.e., data collected during penetration tests and red team engagements). Nemesis was created by Lee Chagolla-Christensen, Will Schroeder, and Max Harley from SpecterOps.
Analyzing the details of an individual file
Centralized data processing with Nemesis
The solution attempts to address three main issues:
- Knowledge about offensive tradecraft is difficult to scale due to the rapid pace at which new techniques are released, the vast array of technologies companies use, and the time requirements to learn about new tradecraft.
- Offensive data is not unified: it’s siloed inside specific tools and machines rather than being modeled and analyzed holistically.
- File and tool output triaging is inconsistent due to differing levels of experience, training, knowledge, tedium, and time constraints.
Chagolla-Christensen told us that Nemesis aggregates data from several C2 platforms (e.g., Cobalt Strike, Mythic, Sliver, etc.) to a central location, where it then analyzes, enriches and provides collaborative UI interfaces for the data. Nemesis right now primarily focuses on analyzing downloaded files, and notable features include:
Document processing: Converts all documents to a PDF accessible in a browser, extracts text from the documents and makes them searchable, scans all the text in all documents/files for credentials, and attempts to crack password-protected documents.
Software vulnerability analysis: Extracts and stores common features from executable files (e.g., PE imports and exports, version/signature details, .NET metadata, section information), decompiles .NET code, scans .NET executables for potential vulnerabilities, and indexes source code so easily searchable/viewable.
Automatic decryption of sensitive data: Scans all files for data encrypted using Window’s data protection API (which includes data like saved Wi-Fi passwords or passwords/cookies in Chrome or Edge), tracks and cracks cryptographic keys used to protect this data, and automatically decrypts the data to reveal the sensitive data.
File triage view
The SpecterOps team uses Nemesis internally, and Chagolla-Christensen told us some great wins have included:
- Secret scanning greatly expediting the triage of downloaded files (e.g., instantly identifying credentials in bash histories and long bash/PowerShell/VBS scripts) and discovering several API keys embedded in a third-party product (a .zip containing all of the product’s binaries was uploaded to Nemesis and it extracted the zip and discovered the API keys).
- Automated file processing discovering files and registry key values containing DPAPI blobs that were previously unknown.
- Great feedback from our assessment teams regarding the file triage user interface enabling them to quickly analyze files (e.g., in the embedded text editor or viewing converted Microsoft Office documents in the browser) and to collaboratively track their file triaging efforts.
What’s next for Nemesis?
“The next big thing we plan to add to Nemesis is host data modeling. We’re excited about this since it will allow us to highlight workflow-specific tradecraft suggestions derived from data collected (so far) in the target network, such as local privilege escalation opportunities and/or better host and network situational awareness. In addition to the host data modeling, we plan to add many more file processing capabilities over the next year, squash some bugs that have arisen, and ease some deployment burdens,” Chagolla-Christensen told Help Net Security.
Nemesis is available for download on GitHub.
More open-source tools to consider:
- Latio Application Security Tester: Use AI to scan your code
- CVEMap: Open-source tool to query, browse and search CVEs
- Faction: Open-source pentesting report generation and collaboration framework
- Adalanche: Open-source Active Directory ACL visualizer, explorer
- AuthLogParser: Open-source tool for analyzing Linux authentication logs
- DriveFS Sleuth: Open-source tool for investigating Google Drive File Stream’s disk forensic artifacts
- Subdominator: Open-source tool for detecting subdomain takeovers
- EMBA: Open-source security analyzer for embedded devices