Create T1555.004.yaml (#1843)
* Create T1555.004.yaml * remove blank auto-generated guid * use standard quotes Co-authored-by: Carrie Roberts <clr2of8@gmail.com>
This commit is contained in:
@@ -0,0 +1,16 @@
|
||||
attack_technique: T1555.004
|
||||
display_name: 'Credentials from Password Stores: Windows Credential Manager'
|
||||
atomic_tests:
|
||||
- name: Access Saved Credentials via VaultCmd
|
||||
description: |
|
||||
List credentials currently stored in Windows Credential Manager via the native Windows utility vaultcmd.exe
|
||||
Credential Manager stores credentials for signing into websites, applications, and/or devices that request authentication through NTLM or Kerberos
|
||||
https://blog.malwarebytes.com/101/2016/01/the-windows-vaults/
|
||||
https://medium.com/threatpunter/detecting-adversary-tradecraft-with-image-load-event-logging-and-eql-8de93338c16
|
||||
supported_platforms:
|
||||
- windows
|
||||
executor:
|
||||
name: command_prompt
|
||||
elevation_required: false
|
||||
command: |
|
||||
vaultcmd /listcreds:"Windows Credentials"
|
||||
Reference in New Issue
Block a user