diff --git a/atomics/T1003.008/T1003.008.md b/atomics/T1003.008/T1003.008.md
new file mode 100644
index 00000000..c5d38f78
--- /dev/null
+++ b/atomics/T1003.008/T1003.008.md
@@ -0,0 +1,80 @@
+# T1003.008 - /etc/passwd and /etc/shadow
+## [Description from ATT&CK](https://attack.mitre.org/wiki/Technique/T1003/008)
+
Adversaries may attempt to dump the contents of /etc/passwd and /etc/shadow to enable offline password cracking. Most modern Linux operating systems use a combination of /etc/passwd and /etc/shadow to store user account information including password hashes in /etc/shadow. By default, /etc/shadow is only readable by the root user.(Citation: Linux Password and Shadow File Formats)
+
+The Linux utility, unshadow, can be used to combine the two files in a format suited for password cracking utilities such as John the Ripper:(Citation: nixCraft - John the Ripper) # /usr/bin/unshadow /etc/passwd /etc/shadow > /tmp/crack.password.db
+
+
+## Atomic Tests
+
+- [Atomic Test #1 - Access /etc/shadow (Local)](#atomic-test-1---access-etcshadow-local)
+
+
+
+
+## Atomic Test #1 - Access /etc/shadow (Local)
+/etc/shadow file is accessed in Linux environments
+
+**Supported Platforms:** Linux
+
+
+
+
+#### Inputs:
+| Name | Description | Type | Default Value |
+|------|-------------|------|---------------|
+| output_file | Path where captured results will be placed | Path | /tmp/T1003.008.txt|
+
+
+#### Attack Commands: Run with `bash`! Elevation Required (e.g. root or admin)
+
+
+```bash
+sudo cat /etc/shadow > #{output_file}
+cat #{output_file}
+```
+
+#### Cleanup Commands:
+```bash
+rm -f #{output_file}
+```
+
+
+
+
+
+
+
+
+## Atomic Test #2 - Access /etc/passwd (Local)
+/etc/passwd file is accessed in Linux environments
+
+**Supported Platforms:** Linux
+
+
+
+
+#### Inputs:
+| Name | Description | Type | Default Value |
+|------|-------------|------|---------------|
+| output_file | Path where captured results will be placed | Path | /tmp/T1003.008.txt|
+
+
+#### Attack Commands: Run with `sh`!
+
+
+```sh
+cat /etc/passwd > #{output_file}
+cat #{output_file}
+```
+
+#### Cleanup Commands:
+```sh
+rm -f #{output_file}
+```
+
+
+
+
+
+
diff --git a/atomics/T1003.008/T1003.008.yaml b/atomics/T1003.008/T1003.008.yaml
new file mode 100644
index 00000000..68ddee87
--- /dev/null
+++ b/atomics/T1003.008/T1003.008.yaml
@@ -0,0 +1,40 @@
+attack_technique: T1003.008
+display_name: 'OS Credential Dumping: /etc/passwd and /etc/shadow'
+atomic_tests:
+- name: Access /etc/shadow (Local)
+ auto_generated_guid: 3723ab77-c546-403c-8fb4-bb577033b235
+ description: |
+ /etc/shadow file is accessed in Linux environments
+ supported_platforms:
+ - linux
+ input_arguments:
+ output_file:
+ description: Path where captured results will be placed
+ type: Path
+ default: /tmp/T1003.008.txt
+ executor:
+ command: |
+ sudo cat /etc/shadow > #{output_file}
+ cat #{output_file}
+ cleanup_command: |
+ rm -f #{output_file}
+ name: bash
+ elevation_required: true
+- name: Access /etc/passwd (Local)
+ auto_generated_guid: 60e860b6-8ae6-49db-ad07-5e73edd88f5d
+ description: |
+ /etc/passwd file is accessed in Linux environments
+ supported_platforms:
+ - linux
+ input_arguments:
+ output_file:
+ description: Path where captured results will be placed
+ type: Path
+ default: /tmp/T1003.008.txt
+ executor:
+ command: |
+ cat /etc/passwd > #{output_file}
+ cat #{output_file}
+ cleanup_command: |
+ rm -f #{output_file}
+ name: sh