- 10 Jul 2023
- 2 Minutes to read
- Print
- Dark
Payloads
- Updated on 10 Jul 2023
- 2 Minutes to read
- Print
- Dark
Payloads
run
Execute a payload or a shell command on the sensor.
Platforms:
Note on usage scenarios for the --is-ignore-cert
flag: If the sensor is deployed on a host where built-in root CAs are not up to date or present at all, it may be necessary to use the --is-ignore-cert
flag to allow the sensor to pull the payload to execute from the cloud.
In some cases, using the --arguments
parameter may result in an error. If so, insert a leading space into the provided arguments.
For example --arguments ' -ano'
Unlike the main sensor transport (which uses a pinned certificate), the Payloads feature uses Google infrastructure and their public SSL certificates.
This may sometimes come up in unexpected ways. For example fresh Windows Server installations do not have the root CAs for google.com
enabled by default.
put
Upload a payload to an endpoint without executing it.
Platforms:
Response Event(s):
RECEIPT
CLOUD_NOTIFICATION
A 200 ERROR
code implies a successful put
command, and will include the resulting file path. Any other error codes can be investigated here.
Command Notes:
Note on usage scenarios for the --is-ignore-cert
flag: If the sensor is deployed on a host where built-in root CAs are not up to date or present at all, it may be necessary to use the --is-ignore-cert
flag to allow the sensor to pull the payload to execute from the cloud.
Unlike the main sensor transport (which uses a pinned certificate), the Payloads feature uses Google infrastructure and their public SSL certificates.
This may sometimes come up in unexpected ways. For example fresh Windows Server installations do not have the root CAs for google.com
enabled by default.
Example:
Assume you have a payload named sample-script.sh
, and you wanted to upload it to the /tmp
folder on a remote system, keeping the same name:
If successful, this action will yield the following RECEIPT
event: