Cyber security logo

Competition Cheat Sheet

Quick reference for Arkime, Velociraptor, and system hunts

Arkime

Operators: ==, != (not =), && (and), || (or)

Velociraptor

Custom PE Parser

name: Custom.PEwithParam.Parser
description: |
   A custom artifact to parse executable files

# Can be CLIENT, CLIENT_EVENT, SERVER, SERVER_EVENT
type: CLIENT

parameters:
   - name: FilePath
     
sources:
  - precondition:
      SELECT OS From info() where OS = 'windows'

    query: |
      SELECT parse_pe(file=FilePath)
      FROM scope()

Custom Hash Search

name: Custom.Hash.Search
description: |
   This is a custom artifact to find a file by hash

# Can be CLIENT, CLIENT_EVENT, SERVER, SERVER_EVENT
type: CLIENT

parameters:
   - name: SizeofFile
     type: int
     default: 46098856
   - name: FileHash
     default: "df93462351b227368d2398f94964ede6e19c694b19bc82ce9908ea8754beb5ce"

sources:
  - precondition:
      SELECT OS From info() where OS = 'windows' 
      
    query: |
      SELECT *, hash(path="C:/" + FullPath) AS Hash
      FROM parse_mft(filename="C:/$MFT", accessor="ntfs")
      WHERE FileSize = SizeofFile AND Hash.SHA256 = FileHash

Windows Hunts

Windows.EventLogs.Modifications

Specialized Hunts

Linux Hunts