Replies: 1 comment 4 replies
-
Hi, thanks for checking out the project. We have looked into several techniques to break the connection between ghosts and the processes it controls, but for training and exercise purposes, we've not released this as most teams write it into the rules of engagement and exercising teams ignore it. Sorry. |
Beta Was this translation helpful? Give feedback.
4 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
Hello,
Thank you very much for your work on Ghosts.
I'd like to deploy the tool to create real life activity on a Security detection lab. Yet, I realised that many of the processes (chromedriver.exe, notepad, ...) spawned by Ghost are child processes of the "ghosts.exe" process.
This "artificial" activity can be easily detected compared to manual activities (malicious activities in the case of a "SOC detection lab").
Thus, would there be a way to make those child processes spawn outside of the "ghosts.exe" parent process ?
It is for instance the case for Office processes:
Thanks for your reply !
Beta Was this translation helpful? Give feedback.
All reactions