{"id":17128,"date":"2023-07-20T10:28:23","date_gmt":"2023-07-20T08:28:23","guid":{"rendered":"https:\/\/www.nextron-systems.com\/?p=17128"},"modified":"2024-11-23T13:52:34","modified_gmt":"2024-11-23T12:52:34","slug":"how-to-perform-compromise-assessments-on-netscaler-citrix-adc-appliances-using-thor","status":"publish","type":"post","link":"https:\/\/www.nextron-systems.com\/2023\/07\/20\/how-to-perform-compromise-assessments-on-netscaler-citrix-adc-appliances-using-thor\/","title":{"rendered":"How to Perform Compromise Assessments on NetScaler \/ Citrix ADC Appliances Using THOR"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.19.5&#8243; _module_preset=&#8221;default&#8221; da_disable_devices=&#8221;off|off|off&#8221; global_colors_info=&#8221;{}&#8221; da_is_popup=&#8221;off&#8221; da_exit_intent=&#8221;off&#8221; da_has_close=&#8221;on&#8221; da_alt_close=&#8221;off&#8221; da_dark_close=&#8221;off&#8221; da_not_modal=&#8221;on&#8221; da_is_singular=&#8221;off&#8221; da_with_loader=&#8221;off&#8221; da_has_shadow=&#8221;on&#8221;][et_pb_row _builder_version=&#8221;4.19.5&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.19.5&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.19.5&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>In today&#8217;s interconnected world, cyber adversaries are increasingly targeting and exploiting Internet-facing appliances and devices with unconventional or restricted operating systems. A pressing concern for users is whether it&#8217;s possible to perform a compromise assessment scan on these systems using the YARA rules used in THOR.<\/p>\n<p>In light of recent events surrounding the unauthenticated remote code execution vulnerability of Internet-facing Citrix Netscaler (CVE-2023-3519), this blog post aims to explore methods for conducting remote scans on devices like Citrix Netscaler using THOR or the free THOR Lite YARA and IOC scanners. This approach can also extend to scanning other devices that may not be supported by real-time Antivirus engines or EDRs, such as ESX servers. Let&#8217;s delve into the details of this powerful method.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;2_5,3_5&#8243; _builder_version=&#8221;4.19.5&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;2_5&#8243; _builder_version=&#8221;4.19.5&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.19.5&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><span>Therefore, our approach involves mounting the remote file system using SSH (<a href=\"https:\/\/github.com\/libfuse\/sshfs\">SSHFS<\/a>) and subsequently instructing THOR to conduct the scan on the mounted remote filesystem. This method allows us to effectively assess the security of the remote system without the need for direct physical access.<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;3_5&#8243; _builder_version=&#8221;4.19.5&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2023\/07\/Screenshot-2023-07-20-at-12.40.48.png&#8221; title_text=&#8221;Screenshot 2023-07-20 at 12.40.48&#8243; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.19.5&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.19.5&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h1>Prerequisites<\/h1>\n<ul>\n<li>Access to Port 22\/tcp<br \/>Ensure that you can reach port 22\/tcp on the target system. This is essential for establishing an SSH connection, which is necessary for the remote file system mounting process.<\/li>\n<li>Source System with SSHFS Support<br \/>You&#8217;ll need a source system that supports sshfs. If you&#8217;re using Debian, you can install sshfs by running the following command: <code>sudo apt install sshfs<\/code>.<\/li>\n<li>THOR Lite or Full THOR with Lab License<br \/>Obtain either <a href=\"https:\/\/www.nextron-systems.com\/thor-lite\/\">THOR Lite<\/a> or the full THOR version with a valid <a href=\"https:\/\/www.nextron-systems.com\/2020\/11\/11\/thor-forensic-lab-license-features\/\">lab license<\/a>. This license is necessary to use the scanning capabilities of THOR effectively.<\/li>\n<li>Modified \/etc\/ssh\/sshd_config on NetScaler Appliance<br \/>It is crucial to modify the <code>\/etc\/ssh\/sshd_config<\/code> file on the NetScaler appliance to allow for SSH mounting. Ensure that the necessary changes are made to facilitate the process. (see configuration details below)<\/li>\n<\/ul>\n<h3>SSHD Config Changes<\/h3>\n<p><span>To enable remote mounting of the NetScaler file system, it is imperative to modify the configuration of the SSH daemon. The default configuration lacks support for ssh mounts through the sftp-server. Consequently, adjustments are required to allow for this functionality. (please refer to the provided banner and error message below for more details)<\/span><br \/><a href=\"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2023\/07\/Screenshot-2023-07-25-at-20.42.01.png\"><\/a><\/p>\n<p>[\/et_pb_text][et_pb_image src=&#8221;https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2023\/07\/Screenshot-2023-07-25-at-20.42.01.png&#8221; title_text=&#8221;Screenshot 2023-07-25 at 20.42.01&#8243; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>1. We change the following line in the file <code>\/etc\/ssh\/sshd_config<\/code>: <br \/>From:<\/p>\n<pre>Subsystem sftp \/usr\/lib\/openssh\/sftp-server\n<\/pre>\n<p>To:<\/p>\n<pre>Subsystem sftp internal-sftp<\/pre>\n<p>2. Restart the SSH service to apply the changes<\/p>\n<pre>kill -HUP `cat \/var\/run\/sshd.pid`<\/pre>\n<p>Optional: To persist the changes we copy <code>\/etc\/ssh\/sshd_config<\/code> to <code>\/nsconfig\/sshd_config<\/code><\/p>\n<pre>cp \/etc\/ssh\/sshd_config \/nsconfig\/sshd_config<\/pre>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.19.5&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.19.5&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.19.5&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2>Mounting the Remote File System via SSH<\/h2>\n<p>First we create a new folder and mount the remote file system to that local folder:<\/p>\n<pre>sudo mkdir -p \/mnt\/ns<br \/>sudo sshfs -o reconnect,allow_other root@ns.company:\/ \/mnt\/ns<\/pre>\n<p>The <code>-o reconnect<\/code> option makes sure to reconnect the session on unstable networks.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.19.5&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.19.5&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.19.5&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2>Scanning the Mount Point with THOR Lite<\/h2>\n<p>With THOR Lite we can now run a so-called &#8220;Filescan&#8221; on the mounted drive.<\/p>\n<pre>sudo .\/thor-lite-linux-64 -a FileScan --alldrives -p \/mnt\/ns<\/pre>\n<p>The following scan is much more intense as it scans every single file regardless of its extension or type. Scanning every file usually leads to much longer scan times and higher network load (be careful when using the <code>--intense<\/code> flag).<\/p>\n<pre>sudo .\/thor-lite-linux-64 -a FileScan --alldrives -p \/mnt\/ns --intense<\/pre>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.19.5&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;33px|||||&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.19.5&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.19.5&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2>Scanning the Mount Point with THOR<\/h2>\n<p>With a full featured THOR and a so-called Lab license we can use the <a href=\"https:\/\/thor-manual.nextron-systems.com\/en\/latest\/usage\/special-scan-modes.html#virtual-drive-mapping\">&#8211;virtual-map flag<\/a> to virtually map the folder <code>\/mnt\/ns<\/code> to <code>\/<\/code> internally. This means that signatures and filename patterns that make use of the virtual and not the actual path. We can also define a hostname that will appear in the log file using the <code>-j<\/code> flag. Otherwise the log would always contain the hostname of the scanning workstation.<\/p>\n<pre>sudo .\/thor-linux-64 -a FileScan --alldrives -p \/mnt\/ns<\/pre>\n<p>Using the full version, we would use a different flag combination for a more intense scan of the remote system. The full version with a lab license allows us to use the <code>--lab<\/code> flag.<\/p>\n<pre>sudo .\/thor-linux-64 --lab -p \/mnt\/ns --virtual-map \/mnt\/ns:\/ -j my-ns-hostname<\/pre>\n<p>The <code>--lab<\/code> flag automatically activates the intense scan mode that checks every file, multi-threaded scanning, deactivates resource control <a href=\"https:\/\/thor-manual.nextron-systems.com\/en\/latest\/usage\/special-scan-modes.html#lab-scanning-lab\">and some other flags<\/a> that can be useful in a lab scanning scenario.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.19.5&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.19.5&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.19.5&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h1>Example Match<\/h1>\n<p><span>The provided screenshot demonstrates an illustrative match of a web shell discovered on systems impacted by CVE-2023-3519 exploitation. Some of this attack&#8217;s specific rules and indicators of compromise (IOCs) are available in THOR but not in the free THOR Lite version. However, it&#8217;s worth noting that the free THOR Lite version includes many generic rules that successfully detected all of the known dropped web shells. (including the one shown below)<\/span><\/p>\n<p>[\/et_pb_text][et_pb_image src=&#8221;https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2023\/07\/Screenshot-2023-07-18-at-20.52.46.png&#8221; title_text=&#8221;Screenshot 2023-07-18 at 20.52.46&#8243; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.19.5&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.19.5&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h1>Specific Detection Rules<\/h1>\n<h3>File name IOCs<\/h3>\n<div>\n<ul>\n<li><a href=\"https:\/\/github.com\/Neo23x0\/signature-base\/blob\/master\/iocs\/filename-iocs.txt#L4321\">File Names used in Citrix NetScaler ADC exploitation CVE-2023-3519<\/a><\/li>\n<\/ul>\n<h3>YARA<\/h3>\n<ul>\n<li><a href=\"https:\/\/valhalla.nextron-systems.com\/info\/rule\/EXPL_Citrix_Netscaler_ADC_ForensicArtifacts_CVE_2023_3519_Jul23_3\">EXPL_Citrix_Netscaler_ADC_ForensicArtifacts_CVE_2023_3519_Jul23<\/a><\/li>\n<li><a href=\"https:\/\/valhalla.nextron-systems.com\/info\/rule\/EXPL_Citrix_Netscaler_ADC_ForensicArtifacts_CVE_2023_3519_Jul23_2\">EXPL_Citrix_Netscaler_ADC_ForensicArtifacts_CVE_2023_3519_Jul23_2<\/a><\/li>\n<li><a href=\"https:\/\/valhalla.nextron-systems.com\/info\/rule\/EXPL_Citrix_Netscaler_ADC_ForensicArtifacts_CVE_2023_3519_Jul23_3\">EXPL_Citrix_Netscaler_ADC_ForensicArtifacts_CVE_2023_3519_Jul23_3<\/a><\/li>\n<li><a href=\"https:\/\/valhalla.nextron-systems.com\/info\/rule\/WEBSHELL_PHP_Citrix_Netscaler_ADC_Jul23\">WEBSHELL_PHP_Citrix_Netscaler_ADC_Jul23<\/a> (only in full version)<\/li>\n<li><a href=\"https:\/\/valhalla.nextron-systems.com\/info\/rule\/WEBSHELL_SECRETSAUCE_Jul23_1\">WEBSHELL_SECRETSAUCE_Jul23_1<\/a><\/li>\n<li><a href=\"https:\/\/github.com\/search?q=repo%3ANeo23x0%2Fsignature-base%20WEBSHELL_PHP_OBFUSC_3&amp;type=code\">WEBSHELL_PHP_OBFUSC_3<\/a><\/li>\n<li><a href=\"https:\/\/github.com\/search?q=repo%3ANeo23x0%2Fsignature-base%20WEBSHELL_PHP_By_String_Known_Webshell&amp;type=code\">WEBSHELL_PHP_By_String_Known_Webshell<\/a><\/li>\n<\/ul>\n<\/div>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.19.5&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.19.5&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.19.5&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h1>Other Notes<\/h1>\n<ul>\n<li>Test scans on our customer&#8217;s NetScaler systems took between 30 and 60 minutes<\/li>\n<li>A network disconnect only pauses the scan, a forced &#8220;umount&#8221; crashes the scanner.<\/li>\n<li>We tested network disconnects of 1 and 5 minutes. After a reconnect THOR just resumes the scan where it left off.\u00a0<\/li>\n<\/ul>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h1>Conclusion<\/h1>\n<p><span>As the frequency and complexity of cyberattacks continue to rise, ensuring the security of Internet-facing devices becomes paramount. By incorporating YARA rules from THOR into compromise assessment scans, users can bolster their cybersecurity defense and remotely identify potential threats on devices like Citrix Netscaler and others. <\/span><\/p>\n<p><span>Additionally, the ability to extend this coverage to unsupported devices opens up new possibilities for safeguarding critical systems. Adopting these cutting-edge cybersecurity practices will undoubtedly prove instrumental in mitigating risks and protecting digital assets in an ever-evolving threat landscape.<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.19.5&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.19.5&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.19.5&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h1>Advantages of the full THOR version<\/h1>\n<p>Apart from the <a href=\"https:\/\/www.nextron-systems.com\/2021\/12\/04\/reasons-why-to-use-thor-instead-of-thor-lite\/\" target=\"_blank\" rel=\"noopener\">usual advantages<\/a> of the full THOR version over THOR Lite, there are a few more reasons to use the full version in this scenario:<\/p>\n<ul>\n<li>Use multiple instances on a single source system to scan many different remote systems at the same time<\/li>\n<li>Use virtual drive mapping to allow for additional detection opportunities<\/li>\n<li>Set a custom host name that appears in the log files (helpful when you scan many different targets)<\/li>\n<\/ul>\n<p>If you&#8217;re interested in the full version, contact us using the &#8220;Get Started&#8221; button in the upper right corner.\u00a0<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In today&#8217;s interconnected world, cyber adversaries are increasingly targeting and exploiting Internet-facing appliances and devices with unconventional or restricted operating systems. A pressing concern for users is whether it&#8217;s possible to perform a compromise assessment scan on these systems using the YARA rules used in THOR. In light of recent events surrounding the unauthenticated remote code execution vulnerability of Internet-facing Citrix Netscaler (CVE-2023-3519), this blog post aims to explore methods for conducting remote scans on devices like Citrix Netscaler using THOR or the free THOR Lite YARA and IOC scanners. This approach can also extend to scanning other devices that may not be supported by real-time Antivirus engines or EDRs, such as ESX servers. Let&#8217;s delve into the details of this powerful method.Therefore, our approach involves mounting the remote file system using SSH (SSHFS) and subsequently instructing THOR to conduct the scan on the mounted remote filesystem. This method allows us to effectively assess the security of the remote system without the need for direct physical access.Prerequisites Access to Port 22\/tcpEnsure that you can reach port 22\/tcp on the target system. This is essential for establishing an SSH connection, which is necessary for the remote file system mounting process. Source [&hellip;]<\/p>\n","protected":false},"author":10,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[749,1,32,269],"tags":[88,382,239,69,719,118,241,172,117,7,12,48],"class_list":["post-17128","post","type-post","status-publish","format-standard","hentry","category-homepage","category-nextron","category-thor","category-tutorial","tag-antivirus","tag-check","tag-citrix","tag-compromise-assessment","tag-cve-2023-3519","tag-iocs","tag-netscaler","tag-remote","tag-scan","tag-scanner","tag-threat","tag-yara"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How to Perform Compromise Assessments on NetScaler \/ Citrix ADC Appliances Using THOR - Nextron Systems<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.nextron-systems.com\/2023\/07\/20\/how-to-perform-compromise-assessments-on-netscaler-citrix-adc-appliances-using-thor\/\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.nextron-systems.com\/2023\/07\/20\/how-to-perform-compromise-assessments-on-netscaler-citrix-adc-appliances-using-thor\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.nextron-systems.com\/2023\/07\/20\/how-to-perform-compromise-assessments-on-netscaler-citrix-adc-appliances-using-thor\/\"},\"author\":{\"name\":\"Christian Burkard\",\"@id\":\"https:\/\/www.nextron-systems.com\/#\/schema\/person\/2f316d4e46f0e9b705e63b8a4b1303ea\"},\"headline\":\"How to Perform Compromise Assessments on NetScaler \/ Citrix ADC Appliances Using THOR\",\"datePublished\":\"2023-07-20T08:28:23+00:00\",\"dateModified\":\"2024-11-23T12:52:34+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.nextron-systems.com\/2023\/07\/20\/how-to-perform-compromise-assessments-on-netscaler-citrix-adc-appliances-using-thor\/\"},\"wordCount\":1656,\"publisher\":{\"@id\":\"https:\/\/www.nextron-systems.com\/#organization\"},\"keywords\":[\"antivirus\",\"check\",\"Citrix\",\"compromise assessment\",\"CVE-2023-3519\",\"IOCs\",\"Netscaler\",\"remote\",\"scan\",\"scanner\",\"threat\",\"YARA\"],\"articleSection\":[\"Homepage\",\"Nextron\",\"THOR\",\"Tutorial\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.nextron-systems.com\/2023\/07\/20\/how-to-perform-compromise-assessments-on-netscaler-citrix-adc-appliances-using-thor\/\",\"url\":\"https:\/\/www.nextron-systems.com\/2023\/07\/20\/how-to-perform-compromise-assessments-on-netscaler-citrix-adc-appliances-using-thor\/\",\"name\":\"How to Perform Compromise Assessments on NetScaler \/ Citrix ADC Appliances Using THOR - Nextron Systems\",\"isPartOf\":{\"@id\":\"https:\/\/www.nextron-systems.com\/#website\"},\"datePublished\":\"2023-07-20T08:28:23+00:00\",\"dateModified\":\"2024-11-23T12:52:34+00:00\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.nextron-systems.com\/2023\/07\/20\/how-to-perform-compromise-assessments-on-netscaler-citrix-adc-appliances-using-thor\/\"]}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.nextron-systems.com\/#website\",\"url\":\"https:\/\/www.nextron-systems.com\/\",\"name\":\"Nextron Systems\",\"description\":\"We Detect Hackers\",\"publisher\":{\"@id\":\"https:\/\/www.nextron-systems.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.nextron-systems.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.nextron-systems.com\/#organization\",\"name\":\"Nextron Systems GmbH\",\"url\":\"https:\/\/www.nextron-systems.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.nextron-systems.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2017\/11\/Nextron_0.2s_inv_symbol_only.png\",\"contentUrl\":\"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2017\/11\/Nextron_0.2s_inv_symbol_only.png\",\"width\":260,\"height\":260,\"caption\":\"Nextron Systems GmbH\"},\"image\":{\"@id\":\"https:\/\/www.nextron-systems.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.nextron-systems.com\/#\/schema\/person\/2f316d4e46f0e9b705e63b8a4b1303ea\",\"name\":\"Christian Burkard\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.nextron-systems.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/2fd90eec7befb8360376a2489ea979b7?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/2fd90eec7befb8360376a2489ea979b7?s=96&d=mm&r=g\",\"caption\":\"Christian Burkard\"},\"url\":\"https:\/\/www.nextron-systems.com\/author\/christian\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to Perform Compromise Assessments on NetScaler \/ Citrix ADC Appliances Using THOR - Nextron Systems","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.nextron-systems.com\/2023\/07\/20\/how-to-perform-compromise-assessments-on-netscaler-citrix-adc-appliances-using-thor\/","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.nextron-systems.com\/2023\/07\/20\/how-to-perform-compromise-assessments-on-netscaler-citrix-adc-appliances-using-thor\/#article","isPartOf":{"@id":"https:\/\/www.nextron-systems.com\/2023\/07\/20\/how-to-perform-compromise-assessments-on-netscaler-citrix-adc-appliances-using-thor\/"},"author":{"name":"Christian Burkard","@id":"https:\/\/www.nextron-systems.com\/#\/schema\/person\/2f316d4e46f0e9b705e63b8a4b1303ea"},"headline":"How to Perform Compromise Assessments on NetScaler \/ Citrix ADC Appliances Using THOR","datePublished":"2023-07-20T08:28:23+00:00","dateModified":"2024-11-23T12:52:34+00:00","mainEntityOfPage":{"@id":"https:\/\/www.nextron-systems.com\/2023\/07\/20\/how-to-perform-compromise-assessments-on-netscaler-citrix-adc-appliances-using-thor\/"},"wordCount":1656,"publisher":{"@id":"https:\/\/www.nextron-systems.com\/#organization"},"keywords":["antivirus","check","Citrix","compromise assessment","CVE-2023-3519","IOCs","Netscaler","remote","scan","scanner","threat","YARA"],"articleSection":["Homepage","Nextron","THOR","Tutorial"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.nextron-systems.com\/2023\/07\/20\/how-to-perform-compromise-assessments-on-netscaler-citrix-adc-appliances-using-thor\/","url":"https:\/\/www.nextron-systems.com\/2023\/07\/20\/how-to-perform-compromise-assessments-on-netscaler-citrix-adc-appliances-using-thor\/","name":"How to Perform Compromise Assessments on NetScaler \/ Citrix ADC Appliances Using THOR - Nextron Systems","isPartOf":{"@id":"https:\/\/www.nextron-systems.com\/#website"},"datePublished":"2023-07-20T08:28:23+00:00","dateModified":"2024-11-23T12:52:34+00:00","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.nextron-systems.com\/2023\/07\/20\/how-to-perform-compromise-assessments-on-netscaler-citrix-adc-appliances-using-thor\/"]}]},{"@type":"WebSite","@id":"https:\/\/www.nextron-systems.com\/#website","url":"https:\/\/www.nextron-systems.com\/","name":"Nextron Systems","description":"We Detect Hackers","publisher":{"@id":"https:\/\/www.nextron-systems.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.nextron-systems.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.nextron-systems.com\/#organization","name":"Nextron Systems GmbH","url":"https:\/\/www.nextron-systems.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.nextron-systems.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2017\/11\/Nextron_0.2s_inv_symbol_only.png","contentUrl":"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2017\/11\/Nextron_0.2s_inv_symbol_only.png","width":260,"height":260,"caption":"Nextron Systems GmbH"},"image":{"@id":"https:\/\/www.nextron-systems.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.nextron-systems.com\/#\/schema\/person\/2f316d4e46f0e9b705e63b8a4b1303ea","name":"Christian Burkard","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.nextron-systems.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/2fd90eec7befb8360376a2489ea979b7?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/2fd90eec7befb8360376a2489ea979b7?s=96&d=mm&r=g","caption":"Christian Burkard"},"url":"https:\/\/www.nextron-systems.com\/author\/christian\/"}]}},"_links":{"self":[{"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/posts\/17128","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/comments?post=17128"}],"version-history":[{"count":40,"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/posts\/17128\/revisions"}],"predecessor-version":[{"id":17205,"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/posts\/17128\/revisions\/17205"}],"wp:attachment":[{"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/media?parent=17128"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/categories?post=17128"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/tags?post=17128"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}