Remotely predicts and identifies the presence of EDR/XDR solutions on networks
patdown is an EDR/XDR fingerprinting utility used for remotely predicting defense mechanisms in use on a network.
This allows you to forecast the security posture of a network during the earliest stages of access, or even prior to any access at all.
Fingerprinting is achieved via the probing of DNS servers to determine whether they have resolved domains associated with various EDR/XDR solutions.
Example: if a network's resolver has assets-public.falcon.crowdstrike.com
cached, chances are the CrowdStrike Falcon EDR solution is present on the network.
These DNS servers can be specified as arguments (most effective), or patdown can automatically retrieve and analyze the authoritative nameservers of a target with the -d
flag.
⚠️ Authoritative nameservers are rarely used as egress resolvers for networks and are not as reliable for fingerprinting EDR/XDR, making them prone to false positives.
Retrieve a binary corresponding to your architecture from Releases
or
git clone https://github.com/speedboat/patdown.git ; cd patdown/cmd/patdown ; go build -o patdown main.go ; ./patdown -h
d | target fqdn (not as reliable, prone to false positives)
n | nameserver to query (can be specified multiple times)
v | enable verbosity [false]
t | threads [5]
s | delay between requests in milliseconds, per thread [250]
e.g.
patdown -d target.network
patdown -n egress.ns.target.network -n another.egress.ns.target.network
patdown -n dc.target.network -v -t 25
- CrowdStrike Falcon
- Microsoft Defender for Endpoint
- VMWare Carbon Black
- Check Point Harmony
- Cybereason EDR
- Trellix EDR
- Palo Alto Networks Cortex XDR
- SentinelOne Singularity
- Symantec Endpoint Security
- Tanium EDR
- Nextron Aurora
- Trend Micro Endpoint Sensor
- Rapid7 InsightIDR
- ESET Inspect
- Harfanglab EDR
- Limacharlie EDR
- Elastic Security
- Qualys EDR
- Uptycs XDR
- WatchGuard EDR