Files

56 lines
1.9 KiB
YAML
Raw Permalink Normal View History

2018-05-25 08:09:15 -04:00
attack_technique: T1007
display_name: System Service Discovery
atomic_tests:
- name: System Service Discovery
auto_generated_guid: 89676ba1-b1f8-47ee-b940-2e1a113ebc71
2018-05-25 08:09:15 -04:00
description: |
2020-03-19 21:23:10 -06:00
Identify system services.
Upon successful execution, cmd.exe will execute service commands with expected result to stdout.
2018-05-25 08:09:15 -04:00
supported_platforms:
- windows
2018-05-25 08:09:15 -04:00
executor:
command: |
tasklist.exe
sc query
sc query state= all
name: command_prompt
elevation_required: true
- name: System Service Discovery - net.exe
auto_generated_guid: 5f864a3f-8ce9-45c0-812c-bdf7d8aeacc3
description: |
Enumerates started system services using net.exe and writes them to a file. This technique has been used by multiple threat actors.
2020-03-19 21:23:10 -06:00
2022-12-14 13:34:57 -07:00
Upon successful execution, net.exe will run from cmd.exe that queries services. Expected output is to a txt file in in the temp directory called service-list.txt.
supported_platforms:
- windows
input_arguments:
output_file:
description: Path of file to hold net.exe output
type: path
2022-12-14 13:34:57 -07:00
default: '%temp%\service-list.txt'
executor:
command: |
net.exe start >> #{output_file}
2020-01-27 14:30:56 -06:00
cleanup_command: |
2020-02-07 18:29:17 -06:00
del /f /q /s #{output_file} >nul 2>&1
name: command_prompt
2023-11-13 16:45:43 -05:00
- name: System Service Discovery - systemctl/service
auto_generated_guid: f4b26bce-4c2c-46c0-bcc5-fce062d38bef
2022-04-29 23:05:33 +02:00
description: |
2023-11-13 16:45:43 -05:00
Enumerates system service using systemctl/service
2022-04-29 23:05:33 +02:00
supported_platforms:
- linux
executor:
command: |
2023-11-13 16:45:43 -05:00
if [ "$(uname)" = 'FreeBSD' ]; then service -e; else systemctl --type=service; fi;
2024-10-17 03:24:11 +03:00
name: bash
- name: Get-Service Execution
auto_generated_guid: 51f17016-d8fa-4360-888a-df4bf92c4a04
2024-10-17 03:24:11 +03:00
description: Executes the Get-Service cmdlet to gather objects representing all services on the local system.
supported_platforms:
- windows
executor:
name: command_prompt
command: powershell.exe Get-Service