Generated docs from job=generate-docs branch=master [ci skip]
This commit is contained in:
@@ -2,7 +2,7 @@
|
||||
|
||||
# Atomic Red Team
|
||||
|
||||
  
|
||||
  
|
||||
|
||||
|
||||
Atomic Red Team™ is a library of tests mapped to the
|
||||
|
||||
File diff suppressed because one or more lines are too long
File diff suppressed because one or more lines are too long
@@ -1357,6 +1357,7 @@ command-and-control,T1219,Remote Access Software,11,MSP360 Connect Execution,b1b
|
||||
command-and-control,T1219,Remote Access Software,12,RustDesk Files Detected Test on Windows,f1641ba9-919a-4323-b74f-33372333bf0e,powershell
|
||||
command-and-control,T1219,Remote Access Software,13,Splashtop Execution,b025c580-029e-4023-888d-a42710d76934,powershell
|
||||
command-and-control,T1219,Remote Access Software,14,Splashtop Streamer Execution,3e1858ee-3550-401c-86ec-5e70ed79295b,powershell
|
||||
command-and-control,T1219,Remote Access Software,15,Microsoft App Quick Assist Execution,1aea6d15-70f1-4b4e-8b02-397b5d5ffe75,powershell
|
||||
command-and-control,T1572,Protocol Tunneling,1,DNS over HTTPS Large Query Volume,ae9ef4b0-d8c1-49d4-8758-06206f19af0a,powershell
|
||||
command-and-control,T1572,Protocol Tunneling,2,DNS over HTTPS Regular Beaconing,0c5f9705-c575-42a6-9609-cbbff4b2fc9b,powershell
|
||||
command-and-control,T1572,Protocol Tunneling,3,DNS over HTTPS Long Domain Query,748a73d5-cea4-4f34-84d8-839da5baa99c,powershell
|
||||
|
||||
|
@@ -925,6 +925,7 @@ command-and-control,T1219,Remote Access Software,11,MSP360 Connect Execution,b1b
|
||||
command-and-control,T1219,Remote Access Software,12,RustDesk Files Detected Test on Windows,f1641ba9-919a-4323-b74f-33372333bf0e,powershell
|
||||
command-and-control,T1219,Remote Access Software,13,Splashtop Execution,b025c580-029e-4023-888d-a42710d76934,powershell
|
||||
command-and-control,T1219,Remote Access Software,14,Splashtop Streamer Execution,3e1858ee-3550-401c-86ec-5e70ed79295b,powershell
|
||||
command-and-control,T1219,Remote Access Software,15,Microsoft App Quick Assist Execution,1aea6d15-70f1-4b4e-8b02-397b5d5ffe75,powershell
|
||||
command-and-control,T1572,Protocol Tunneling,1,DNS over HTTPS Large Query Volume,ae9ef4b0-d8c1-49d4-8758-06206f19af0a,powershell
|
||||
command-and-control,T1572,Protocol Tunneling,2,DNS over HTTPS Regular Beaconing,0c5f9705-c575-42a6-9609-cbbff4b2fc9b,powershell
|
||||
command-and-control,T1572,Protocol Tunneling,3,DNS over HTTPS Long Domain Query,748a73d5-cea4-4f34-84d8-839da5baa99c,powershell
|
||||
|
||||
|
@@ -1846,6 +1846,7 @@
|
||||
- Atomic Test #12: RustDesk Files Detected Test on Windows [windows]
|
||||
- Atomic Test #13: Splashtop Execution [windows]
|
||||
- Atomic Test #14: Splashtop Streamer Execution [windows]
|
||||
- Atomic Test #15: Microsoft App Quick Assist Execution [windows]
|
||||
- T1659 Content Injection [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
|
||||
- T1205 Traffic Signaling [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
|
||||
- [T1572 Protocol Tunneling](../../T1572/T1572.md)
|
||||
|
||||
@@ -1287,6 +1287,7 @@
|
||||
- Atomic Test #12: RustDesk Files Detected Test on Windows [windows]
|
||||
- Atomic Test #13: Splashtop Execution [windows]
|
||||
- Atomic Test #14: Splashtop Streamer Execution [windows]
|
||||
- Atomic Test #15: Microsoft App Quick Assist Execution [windows]
|
||||
- T1659 Content Injection [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
|
||||
- T1205 Traffic Signaling [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
|
||||
- [T1572 Protocol Tunneling](../../T1572/T1572.md)
|
||||
|
||||
@@ -77109,6 +77109,17 @@ command-and-control:
|
||||
Remote\Server\#{srserver_exe}"
|
||||
name: powershell
|
||||
elevation_required: true
|
||||
- name: Microsoft App Quick Assist Execution
|
||||
auto_generated_guid: 1aea6d15-70f1-4b4e-8b02-397b5d5ffe75
|
||||
description: "An adversary may attempt to trick a user into executing Microsoft
|
||||
Quick Assist Microsoft Store app and connect to the user's machine. \n"
|
||||
supported_platforms:
|
||||
- windows
|
||||
executor:
|
||||
command: Start-Process "shell:AppsFolder\MicrosoftCorporationII.QuickAssist_8wekyb3d8bbwe!App"
|
||||
cleanup_command: Stop-Process -Name quickassist
|
||||
name: powershell
|
||||
elevation_required: true
|
||||
T1659:
|
||||
technique:
|
||||
modified: '2023-10-01T02:28:45.147Z'
|
||||
|
||||
@@ -63558,6 +63558,17 @@ command-and-control:
|
||||
Remote\Server\#{srserver_exe}"
|
||||
name: powershell
|
||||
elevation_required: true
|
||||
- name: Microsoft App Quick Assist Execution
|
||||
auto_generated_guid: 1aea6d15-70f1-4b4e-8b02-397b5d5ffe75
|
||||
description: "An adversary may attempt to trick a user into executing Microsoft
|
||||
Quick Assist Microsoft Store app and connect to the user's machine. \n"
|
||||
supported_platforms:
|
||||
- windows
|
||||
executor:
|
||||
command: Start-Process "shell:AppsFolder\MicrosoftCorporationII.QuickAssist_8wekyb3d8bbwe!App"
|
||||
cleanup_command: Stop-Process -Name quickassist
|
||||
name: powershell
|
||||
elevation_required: true
|
||||
T1659:
|
||||
technique:
|
||||
modified: '2023-10-01T02:28:45.147Z'
|
||||
|
||||
@@ -42,6 +42,8 @@ Installation of many remote access software may also include persistence (e.g.,
|
||||
|
||||
- [Atomic Test #14 - Splashtop Streamer Execution](#atomic-test-14---splashtop-streamer-execution)
|
||||
|
||||
- [Atomic Test #15 - Microsoft App Quick Assist Execution](#atomic-test-15---microsoft-app-quick-assist-execution)
|
||||
|
||||
|
||||
<br/>
|
||||
|
||||
@@ -678,4 +680,36 @@ Start-Process "c:\Temp\ExternalPayloads\Splashtop.exe" -Wait -ArgumentList "/s"
|
||||
|
||||
|
||||
|
||||
<br/>
|
||||
<br/>
|
||||
|
||||
## Atomic Test #15 - Microsoft App Quick Assist Execution
|
||||
An adversary may attempt to trick a user into executing Microsoft Quick Assist Microsoft Store app and connect to the user's machine.
|
||||
|
||||
**Supported Platforms:** Windows
|
||||
|
||||
|
||||
**auto_generated_guid:** 1aea6d15-70f1-4b4e-8b02-397b5d5ffe75
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
#### Attack Commands: Run with `powershell`! Elevation Required (e.g. root or admin)
|
||||
|
||||
|
||||
```powershell
|
||||
Start-Process "shell:AppsFolder\MicrosoftCorporationII.QuickAssist_8wekyb3d8bbwe!App"
|
||||
```
|
||||
|
||||
#### Cleanup Commands:
|
||||
```powershell
|
||||
Stop-Process -Name quickassist
|
||||
```
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
<br/>
|
||||
|
||||
@@ -343,6 +343,7 @@ atomic_tests:
|
||||
name: powershell
|
||||
elevation_required: true
|
||||
- name: Microsoft App Quick Assist Execution
|
||||
auto_generated_guid: 1aea6d15-70f1-4b4e-8b02-397b5d5ffe75
|
||||
description: |
|
||||
An adversary may attempt to trick a user into executing Microsoft Quick Assist Microsoft Store app and connect to the user's machine.
|
||||
supported_platforms:
|
||||
|
||||
@@ -1738,3 +1738,4 @@ cfb6d400-a269-4c06-a347-6d88d584d5f7
|
||||
a4b74723-5cee-4300-91c3-5e34166909b4
|
||||
7b5d350e-f758-43cc-a761-8e3f6b052a03
|
||||
8e139e1f-1f3a-4be7-901d-afae9738c064
|
||||
1aea6d15-70f1-4b4e-8b02-397b5d5ffe75
|
||||
|
||||
Reference in New Issue
Block a user