Answer the question
In order to leave comments, you need to log in
How to find a DLP agent in the system?
Good afternoon.
At work, UB implemented DLP. Most likely FalconGaze SecureTower.
How does the agent appear in the system? For example Win7 x64. Where to look for an agent? what software you can see where it sends requests and so on.
I would very much like to find a DLP agent in the system.
Thank you.
Answer the question
In order to leave comments, you need to log in
First of all, you need admin rights on the machine. They are?
If there is, then ProcessHacker to the rescue.
Good day!
I would like to share my observations - maybe it will be useful to someone.
All of the following will apply to the Falcongaze SecureTower.
Despite the fact that the client tries to hide his presence by any means, everything secret sooner or later becomes clear.
1. Certificate substitution.
We tear off in the browser any resource that uses https and look at the certificate data. With the DLP client installed, the " Certification Path " section will contain a certificate signed by Falcongaze SecureTower.
During installation, the SecureTower client adds its certificate to the trusted root certificate store (Trusted Root Certification Authorities ).
In general, with any suspicions, this repository can be periodically viewed - suddenly you find something interesting.
2. Location of files.
If you search for files and directories of the client installation visually, or using the search mechanism in Explorer (any other file manager) - most likely nothing will be found.
But there is a way out, everything turns out to be much simpler - we take the paths:
C:\Program Files\Falcongaze SecureTower
C:\Program Files (x86)\Falcongaze SecureTower #для x64
C:\Users\%username%\AppData\Local\Falcongaze SecureTower
FgstEpaCss.exe
FgstEpaCssHlp.exe
FgStEPAgentSvcHost.exe
----------------------------------------
| Column | Relation | Value | Action |
----------------------------------------
Path contains main.db Include
You can see which ports on the working machine are in the listen status, you can look at established connections by comparing them with the list of tasks, you can search for recently installed software, etc. Options - a lot.
The main thing is why?
If UB put it, then they are looking for something. If they see extra activity ... then this usually ends with the fact that they are given a bonus for their vigilance.
Didn't find what you were looking for?
Ask your questionAsk a Question
731 491 924 answers to any question