diff --git a/atomics/T1003.008/T1003.008.md b/atomics/T1003.008/T1003.008.md new file mode 100644 index 00000000..c5d38f78 --- /dev/null +++ b/atomics/T1003.008/T1003.008.md @@ -0,0 +1,80 @@ +# T1003.008 - /etc/passwd and /etc/shadow +## [Description from ATT&CK](https://attack.mitre.org/wiki/Technique/T1003/008) +
Adversaries may attempt to dump the contents of /etc/passwd and /etc/shadow to enable offline password cracking. Most modern Linux operating systems use a combination of /etc/passwd and /etc/shadow to store user account information including password hashes in /etc/shadow. By default, /etc/shadow is only readable by the root user.(Citation: Linux Password and Shadow File Formats) + +The Linux utility, unshadow, can be used to combine the two files in a format suited for password cracking utilities such as John the Ripper:(Citation: nixCraft - John the Ripper) # /usr/bin/unshadow /etc/passwd /etc/shadow > /tmp/crack.password.db +
+ +## Atomic Tests + +- [Atomic Test #1 - Access /etc/shadow (Local)](#atomic-test-1---access-etcshadow-local) + + +
+ +## Atomic Test #1 - Access /etc/shadow (Local) +/etc/shadow file is accessed in Linux environments + +**Supported Platforms:** Linux + + + + +#### Inputs: +| Name | Description | Type | Default Value | +|------|-------------|------|---------------| +| output_file | Path where captured results will be placed | Path | /tmp/T1003.008.txt| + + +#### Attack Commands: Run with `bash`! Elevation Required (e.g. root or admin) + + +```bash +sudo cat /etc/shadow > #{output_file} +cat #{output_file} +``` + +#### Cleanup Commands: +```bash +rm -f #{output_file} +``` + + + + + +
+
+ +## Atomic Test #2 - Access /etc/passwd (Local) +/etc/passwd file is accessed in Linux environments + +**Supported Platforms:** Linux + + + + +#### Inputs: +| Name | Description | Type | Default Value | +|------|-------------|------|---------------| +| output_file | Path where captured results will be placed | Path | /tmp/T1003.008.txt| + + +#### Attack Commands: Run with `sh`! + + +```sh +cat /etc/passwd > #{output_file} +cat #{output_file} +``` + +#### Cleanup Commands: +```sh +rm -f #{output_file} +``` + + + + + +
diff --git a/atomics/T1003.008/T1003.008.yaml b/atomics/T1003.008/T1003.008.yaml new file mode 100644 index 00000000..68ddee87 --- /dev/null +++ b/atomics/T1003.008/T1003.008.yaml @@ -0,0 +1,40 @@ +attack_technique: T1003.008 +display_name: 'OS Credential Dumping: /etc/passwd and /etc/shadow' +atomic_tests: +- name: Access /etc/shadow (Local) + auto_generated_guid: 3723ab77-c546-403c-8fb4-bb577033b235 + description: | + /etc/shadow file is accessed in Linux environments + supported_platforms: + - linux + input_arguments: + output_file: + description: Path where captured results will be placed + type: Path + default: /tmp/T1003.008.txt + executor: + command: | + sudo cat /etc/shadow > #{output_file} + cat #{output_file} + cleanup_command: | + rm -f #{output_file} + name: bash + elevation_required: true +- name: Access /etc/passwd (Local) + auto_generated_guid: 60e860b6-8ae6-49db-ad07-5e73edd88f5d + description: | + /etc/passwd file is accessed in Linux environments + supported_platforms: + - linux + input_arguments: + output_file: + description: Path where captured results will be placed + type: Path + default: /tmp/T1003.008.txt + executor: + command: | + cat /etc/passwd > #{output_file} + cat #{output_file} + cleanup_command: | + rm -f #{output_file} + name: sh