diff --git a/atomics/T1081/T1081.md b/atomics/T1081/T1081.md index d5655dca..26f5bc32 100644 --- a/atomics/T1081/T1081.md +++ b/atomics/T1081/T1081.md @@ -6,18 +6,20 @@ It is possible to extract passwords from backups or saved virtual machines throu ## Atomic Tests -- [Atomic Test #1 - Browser and System credentials](#atomic-test-1---browser-and-system-credentials) +- [Atomic Test #1 - Extract Browser and System credentials with LaZagne](#atomic-test-1---extract-browser-and-system-credentials-with-lazagne) -- [Atomic Test #2 - Extract credentials from files](#atomic-test-2---extract-credentials-from-files) +- [Atomic Test #2 - Extract passwords with grep](#atomic-test-2---extract-passwords-with-grep) -- [Atomic Test #3 - Mimikatz & Kittenz](#atomic-test-3---mimikatz--kittenz) +- [Atomic Test #3 - Runs Mimikatz & Mimikittenz by name](#atomic-test-3---runs-mimikatz--mimikittenz-by-name) -- [Atomic Test #4 - Extracting credentials from files](#atomic-test-4---extracting-credentials-from-files) +- [Atomic Test #4 - Extracting passwords with findstr](#atomic-test-4---extracting-passwords-with-findstr) + +- [Atomic Test #5 - Access "unattend.xml"](#atomic-test-5---access-unattendxml)
-## Atomic Test #1 - Browser and System credentials +## Atomic Test #1 - Extract Browser and System credentials with LaZagne [LaZagne Source](https://github.com/AlessandroZ/LaZagne) **Supported Platforms:** macOS @@ -33,7 +35,7 @@ python2 laZagne.py all

-## Atomic Test #2 - Extract credentials from files +## Atomic Test #2 - Extract passwords with grep Extracting credentials from files **Supported Platforms:** macOS, Linux @@ -54,7 +56,7 @@ grep -ri password #{file_path}

-## Atomic Test #3 - Mimikatz & Kittenz +## Atomic Test #3 - Runs Mimikatz & Mimikittenz by name Mimikatz/kittenz - This will require a Mimikatz executable or invoke-mimikittenz ps module. **Supported Platforms:** Windows @@ -71,7 +73,7 @@ mimikatz.exe

-## Atomic Test #4 - Extracting credentials from files +## Atomic Test #4 - Extracting passwords with findstr Extracting Credentials from Files **Supported Platforms:** Windows @@ -85,4 +87,21 @@ ls -R | select-string -Pattern password +
+
+ +## Atomic Test #5 - Access "unattend.xml" +Attempts to access unattend.xml, where credentials are commonly stored, within the Panther directory where installation logs are stored. + +**Supported Platforms:** Windows + + +#### Run it with `command_prompt`! Elevation Required (e.g. root or admin) +``` +cmd /c type C:\Windows\Panther\unattend.xml > nul 2>&1 +cmd /c type C:\Windows\Panther\Unattend\unattend.xml > nul 2>&1 +``` + + +
diff --git a/atomics/index.md b/atomics/index.md index 23dcc2b4..5fcb9042 100644 --- a/atomics/index.md +++ b/atomics/index.md @@ -529,10 +529,11 @@ - Atomic Test #11: GPP Passwords (findstr) [windows] - Atomic Test #12: GPP Passwords (Get-GPPPassword) [windows] - [T1081 Credentials in Files](./T1081/T1081.md) - - Atomic Test #1: Browser and System credentials [macos] - - Atomic Test #2: Extract credentials from files [macos, linux] - - Atomic Test #3: Mimikatz & Kittenz [windows] - - Atomic Test #4: Extracting credentials from files [windows] + - Atomic Test #1: Extract Browser and System credentials with LaZagne [macos] + - Atomic Test #2: Extract passwords with grep [macos, linux] + - Atomic Test #3: Runs Mimikatz & Mimikittenz by name [windows] + - Atomic Test #4: Extracting passwords with findstr [windows] + - Atomic Test #5: Access "unattend.xml" [windows] - [T1214 Credentials in Registry](./T1214/T1214.md) - Atomic Test #1: Enumeration for Credentials in Registry [windows] - T1212 Exploitation for Credential Access [CONTRIBUTE A TEST](https://atomicredteam.io/contributing) diff --git a/atomics/index.yaml b/atomics/index.yaml index bee32c3d..ff5fe7ae 100644 --- a/atomics/index.yaml +++ b/atomics/index.yaml @@ -15484,7 +15484,7 @@ credential-access: - SYSTEM identifier: T1081 atomic_tests: - - name: Browser and System credentials + - name: Extract Browser and System credentials with LaZagne description: "[LaZagne Source](https://github.com/AlessandroZ/LaZagne)\n" supported_platforms: - macos @@ -15493,7 +15493,7 @@ credential-access: command: 'python2 laZagne.py all ' - - name: Extract credentials from files + - name: Extract passwords with grep description: 'Extracting credentials from files ' @@ -15510,7 +15510,7 @@ credential-access: command: 'grep -ri password #{file_path} ' - - name: Mimikatz & Kittenz + - name: Runs Mimikatz & Mimikittenz by name description: 'Mimikatz/kittenz - This will require a Mimikatz executable or invoke-mimikittenz ps module. @@ -15523,7 +15523,7 @@ credential-access: command: | invoke-mimikittenz mimikatz.exe - - name: Extracting credentials from files + - name: Extracting passwords with findstr description: 'Extracting Credentials from Files ' @@ -15535,6 +15535,19 @@ credential-access: command: | findstr /si pass *.xml | *.doc | *.txt | *.xls ls -R | select-string -Pattern password + - name: Access "unattend.xml" + description: 'Attempts to access unattend.xml, where credentials are commonly + stored, within the Panther directory where installation logs are stored. + +' + supported_platforms: + - windows + executor: + name: command_prompt + elevation_required: true + command: | + cmd /c type C:\Windows\Panther\unattend.xml > nul 2>&1 + cmd /c type C:\Windows\Panther\Unattend\unattend.xml > nul 2>&1 T1214: technique: external_references: diff --git a/atomics/linux-index.md b/atomics/linux-index.md index a8ddb6b9..0bae3637 100644 --- a/atomics/linux-index.md +++ b/atomics/linux-index.md @@ -129,7 +129,7 @@ - [T1110 Brute Force](./T1110/T1110.md) - [T1003 Credential Dumping](./T1003/T1003.md) - [T1081 Credentials in Files](./T1081/T1081.md) - - Atomic Test #2: Extract credentials from files [macos, linux] + - Atomic Test #2: Extract passwords with grep [macos, linux] - T1212 Exploitation for Credential Access [CONTRIBUTE A TEST](https://atomicredteam.io/contributing) - [T1056 Input Capture](./T1056/T1056.md) - [T1040 Network Sniffing](./T1040/T1040.md) diff --git a/atomics/macos-index.md b/atomics/macos-index.md index f36d7026..4293cb48 100644 --- a/atomics/macos-index.md +++ b/atomics/macos-index.md @@ -183,8 +183,8 @@ - [T1110 Brute Force](./T1110/T1110.md) - [T1003 Credential Dumping](./T1003/T1003.md) - [T1081 Credentials in Files](./T1081/T1081.md) - - Atomic Test #1: Browser and System credentials [macos] - - Atomic Test #2: Extract credentials from files [macos, linux] + - Atomic Test #1: Extract Browser and System credentials with LaZagne [macos] + - Atomic Test #2: Extract passwords with grep [macos, linux] - T1212 Exploitation for Credential Access [CONTRIBUTE A TEST](https://atomicredteam.io/contributing) - [T1056 Input Capture](./T1056/T1056.md) - [T1141 Input Prompt](./T1141/T1141.md) diff --git a/atomics/windows-index.md b/atomics/windows-index.md index 8f0eb6df..9edb0fda 100644 --- a/atomics/windows-index.md +++ b/atomics/windows-index.md @@ -362,8 +362,9 @@ - Atomic Test #11: GPP Passwords (findstr) [windows] - Atomic Test #12: GPP Passwords (Get-GPPPassword) [windows] - [T1081 Credentials in Files](./T1081/T1081.md) - - Atomic Test #3: Mimikatz & Kittenz [windows] - - Atomic Test #4: Extracting credentials from files [windows] + - Atomic Test #3: Runs Mimikatz & Mimikittenz by name [windows] + - Atomic Test #4: Extracting passwords with findstr [windows] + - Atomic Test #5: Access "unattend.xml" [windows] - [T1214 Credentials in Registry](./T1214/T1214.md) - Atomic Test #1: Enumeration for Credentials in Registry [windows] - T1212 Exploitation for Credential Access [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)