diff --git a/atomics/T1014/T1014.md b/atomics/T1014/T1014.md
index 615c5df0..8481e449 100644
--- a/atomics/T1014/T1014.md
+++ b/atomics/T1014/T1014.md
@@ -22,6 +22,8 @@ Permissions Required: Administrator, SYSTEM, root
- [Atomic Test #3 - LD_PRELOAD based Rootkit](#atomic-test-3---ld_preload-based-rootkit)
+- [Atomic Test #4 - Windows Driver Exploit To Load Rootkit](#atomic-test-4---windows-driver-exploit-to-load-rootkit)
+
@@ -72,3 +74,26 @@ LD_PRELOAD based Rootkit
export LD_PRELOAD=$PWD/#{rootkit_file}
```
+
+
+## Atomic Test #4 - Windows Driver Exploit To Load Rootkit
+We will leverage a signed vulnerable driver to test this.
+You are responsible for obtaining the specific driver for the test.
+SHA1 for puppetstrings.exe DD8DA630C00953B6D5182AA66AF999B1E117F441
+Fullcredit for this test here:
+https://zerosum0x0.blogspot.com/2017/07/puppet-strings-dirty-secret-for-free.html
+Signed Driver Hash: C1D5CF8C43E7679B782630E93F5E6420CA1749A7
+
+**Supported Platforms:** Windows
+
+
+#### Inputs
+| Name | Description | Type | Default Value |
+|------|-------------|------|---------------|
+| capcom_path | Path to vulnerable CapCom Driver | Path | C:\Drivers\CapCom.sys|
+
+#### Run it with `command_prompt`!
+```
+puppetstrings.exe #{capcom_path}
+```
+
diff --git a/atomics/index.md b/atomics/index.md
index e6983303..1152255b 100644
--- a/atomics/index.md
+++ b/atomics/index.md
@@ -242,6 +242,7 @@
- Atomic Test #1: Loadable Kernel Module based Rootkit [linux]
- Atomic Test #2: Loadable Kernel Module based Rootkit [linux]
- Atomic Test #3: LD_PRELOAD based Rootkit [linux]
+ - Atomic Test #4: Windows Driver Exploit To Load Rootkit [windows]
- [T1085 Rundll32](./T1085/T1085.md)
- Atomic Test #1: Rundll32 execute JavaScript Remote Payload With GetObject [windows]
- T1198 SIP and Trust Provider Hijacking [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
diff --git a/atomics/windows-index.md b/atomics/windows-index.md
index ad162f79..cb87281e 100644
--- a/atomics/windows-index.md
+++ b/atomics/windows-index.md
@@ -76,6 +76,7 @@
- Atomic Test #2: Regsvr32 remote COM scriptlet execution [windows]
- Atomic Test #3: Regsvr32 local DLL execution [windows]
- [T1014 Rootkit](./T1014/T1014.md)
+ - Atomic Test #4: Windows Driver Exploit To Load Rootkit [windows]
- [T1085 Rundll32](./T1085/T1085.md)
- Atomic Test #1: Rundll32 execute JavaScript Remote Payload With GetObject [windows]
- T1198 SIP and Trust Provider Hijacking [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)