diff --git a/atomics/T1214/T1214.md b/atomics/T1214/T1214.md index 8ecc0b91..63acf2d9 100644 --- a/atomics/T1214/T1214.md +++ b/atomics/T1214/T1214.md @@ -10,8 +10,10 @@ Example commands to find Registry keys related to password information: (Citatio ## Atomic Tests - [Atomic Test #1 - Enumeration for Credentials in Registry](#atomic-test-1---enumeration-for-credentials-in-registry) + - [Atomic Test #2 - Enumeration for PuTTY Credentials in Registry](#atomic-test-2---enumeration-for-putty-credentials-in-registry) +
## Atomic Test #1 - Enumeration for Credentials in Registry @@ -30,10 +32,13 @@ reg query HKCU /f password /t REG_SZ /s + + +

## Atomic Test #2 - Enumeration for PuTTY Credentials in Registry -Queries to enumerate for PuTTY credentials in the Registry. (Citation: TrendMicro Trickbot Analysis) +Queries to enumerate for PuTTY credentials in the Registry. **Supported Platforms:** Windows @@ -48,4 +53,5 @@ reg query HKCU\Software\SimonTatham\PuTTY\Sessions /t REG_SZ /s +
diff --git a/atomics/index.md b/atomics/index.md index 30917c2b..dfbe42c6 100644 --- a/atomics/index.md +++ b/atomics/index.md @@ -673,6 +673,7 @@ - Atomic Test #4: Access unattend.xml [windows] - [T1214 Credentials in Registry](./T1214/T1214.md) - Atomic Test #1: Enumeration for Credentials in Registry [windows] + - Atomic Test #2: Enumeration for PuTTY Credentials in Registry [windows] - T1212 Exploitation for Credential Access [CONTRIBUTE A TEST](https://atomicredteam.io/contributing) - T1187 Forced Authentication [CONTRIBUTE A TEST](https://atomicredteam.io/contributing) - [T1179 Hooking](./T1179/T1179.md) diff --git a/atomics/index.yaml b/atomics/index.yaml index ecca15ad..50d37bab 100644 --- a/atomics/index.yaml +++ b/atomics/index.yaml @@ -19997,6 +19997,18 @@ credential-access: command: | reg query HKLM /f password /t REG_SZ /s reg query HKCU /f password /t REG_SZ /s + - name: Enumeration for PuTTY Credentials in Registry + description: 'Queries to enumerate for PuTTY credentials in the Registry. + +' + supported_platforms: + - windows + executor: + name: command_prompt + elevation_required: false + command: 'reg query HKCU\Software\SimonTatham\PuTTY\Sessions /t REG_SZ /s + +' T1179: technique: x_mitre_data_sources: diff --git a/atomics/windows-index.md b/atomics/windows-index.md index d048ea07..217b401e 100644 --- a/atomics/windows-index.md +++ b/atomics/windows-index.md @@ -485,6 +485,7 @@ - Atomic Test #4: Access unattend.xml [windows] - [T1214 Credentials in Registry](./T1214/T1214.md) - Atomic Test #1: Enumeration for Credentials in Registry [windows] + - Atomic Test #2: Enumeration for PuTTY Credentials in Registry [windows] - T1212 Exploitation for Credential Access [CONTRIBUTE A TEST](https://atomicredteam.io/contributing) - T1187 Forced Authentication [CONTRIBUTE A TEST](https://atomicredteam.io/contributing) - [T1179 Hooking](./T1179/T1179.md)