Generate docs from job=validate_atomics_generate_docs branch=master

This commit is contained in:
CircleCI Atomic Red Team doc generator
2020-08-07 17:14:19 +00:00
parent d8733662f9
commit 99a4e8850a
22 changed files with 23 additions and 10 deletions
+1
View File
@@ -108,6 +108,7 @@ Changes ProviderOrder Registry Key Parameter and creates Key for NPPSpy.
After user's logging in cleartext password is saved in C:\NPPSpy.txt.
Clean up deletes the files and reverses Registry changes.
NPPSpy Source: https://github.com/gtworek/PSBits/tree/master/PasswordStealing/NPPSpy
**Supported Platforms:** Windows
+1
View File
@@ -15,6 +15,7 @@ When automated exfiltration is used, other exfiltration techniques likely apply
Creates a text file
Tries to upload to a server via HTTP PUT method with ContentType Header
Deletes a created file
**Supported Platforms:** Windows
+1
View File
@@ -198,6 +198,7 @@ invoke-command -ComputerName #{host_name} -scriptblock {#{remote_command}}
## Atomic Test #6 - WinRM Access with Evil-WinRM
An adversary may attempt to use Evil-WinRM with a valid account to interact with remote systems that have WinRM enabled
**Supported Platforms:** Windows
+1
View File
@@ -84,6 +84,7 @@ who
## Atomic Test #3 - Find computers where user has session - Stealth mode (PowerView)
Find existing user session on other computers. Upon execution, information about any sessions discovered will be displayed.
**Supported Platforms:** Windows
+1
View File
@@ -143,6 +143,7 @@ c:\windump.exe
## Atomic Test #4 - Windows Internal Packet Capture
Uses the built-in Windows packet capture
After execution you should find a file named trace.etl and trace.cab in the temp directory
**Supported Platforms:** Windows
+1
View File
@@ -93,6 +93,7 @@ echo "Install nmap on the machine to run the test."; exit 1;
## Atomic Test #3 - Port Scan NMap for Windows
Scan ports to check for listening ports for the local host 127.0.0.1
**Supported Platforms:** Windows
+1 -1
View File
@@ -12,7 +12,7 @@ An adversary may use the <code>launchd</code> daemon in macOS environments to sc
<br/>
## Atomic Test #1 - Event Monitor Daemon Persistence
This test adds persistence via a plist to execute via the macOS Event Monitor Daemon.
This test adds persistence via a plist to execute via the macOS Event Monitor Daemon.
**Supported Platforms:** macOS
+1 -1
View File
@@ -52,7 +52,7 @@ rm #{output_file}
## Atomic Test #2 - Process Discovery - tasklist
Utilize tasklist to identify processes.
Upon successful execution, cmd.exe will execute tasklist.exe to list processes. Output will be via stdout.
Upon successful execution, cmd.exe will execute tasklist.exe to list processes. Output will be via stdout.
**Supported Platforms:** Windows
+1
View File
@@ -13,6 +13,7 @@ Default accounts are not limited to client machines, rather also include account
## Atomic Test #1 - Enable Guest account with RDP capability and admin priviliges
After execution the Default Guest account will be enabled (Active) and added to Administrators and Remote Desktop Users Group, and desktop will allow multiple RDP connections
**Supported Platforms:** Windows
+1
View File
@@ -17,6 +17,7 @@ Adversaries may abuse these native API functions as a means of executing behavio
## Atomic Test #1 - Execution through API - CreateProcess
Execute program by leveraging Win32 API's. By default, this will launch calc.exe from the command prompt.
**Supported Platforms:** Windows
+1
View File
@@ -35,6 +35,7 @@ CAUTION! Be very careful to not exceed the password lockout threshold for users
This atomic attempts to map the IPC$ share on one of the Domain Controllers using a password of Spring2020 for each user in the %temp%\users.txt list. Any successful authentications will be printed to the screen with a message like "[*] username:password", whereas a failed auth will simply print a period. Use the input arguments to specify your own password to use for the password spray.
Use the get_prereq_command's to create a list of all domain users in the temp directory called users.txt.
See the "Windows FOR Loop Password Spraying Made Easy" blog by @OrEqualsOne for more details on how these spray commands work. https://medium.com/walmartlabs/windows-for-loop-password-spraying-made-easy-c8cd4ebb86b5
**Supported Platforms:** Windows
+1
View File
@@ -115,6 +115,7 @@ get-smbshare -Name #{computer_name}
## Atomic Test #4 - View available share drives
View information about all of the resources that are shared on the local computer Upon execution, avalaible share drives will be displayed in the powershell session
**Supported Platforms:** Windows
+2
View File
@@ -21,6 +21,7 @@ There have also been instances of botnets using a persistent backdoor through ma
## Atomic Test #1 - Chrome (Developer Mode)
**Supported Platforms:** Linux, Windows, macOS
@@ -46,6 +47,7 @@ tick 'Developer Mode'.
## Atomic Test #2 - Chrome (Chrome Web Store)
**Supported Platforms:** Linux, Windows, macOS
+1 -1
View File
@@ -19,7 +19,7 @@ The values of the keys listed are commands that are executed when the handler op
## Atomic Test #1 - Change Default File Association
Change Default File Association From cmd.exe of hta to notepad.
Upon successful execution, cmd.exe will change the file association of .hta to notepad.exe.
Upon successful execution, cmd.exe will change the file association of .hta to notepad.exe.
**Supported Platforms:** Windows
+2 -2
View File
@@ -56,7 +56,7 @@ Adversaries can use these configuration locations to execute malware, such as re
## Atomic Test #1 - Reg Key Run
Run Key Persistence
Upon successful execution, cmd.exe will modify the registry by adding \"Atomic Red Team\" to the Run key. Output will be via stdout.
Upon successful execution, cmd.exe will modify the registry by adding \"Atomic Red Team\" to the Run key. Output will be via stdout.
**Supported Platforms:** Windows
@@ -91,7 +91,7 @@ REG DELETE "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Atomic Red T
## Atomic Test #2 - Reg Key RunOnce
RunOnce Key Persistence.
Upon successful execution, cmd.exe will modify the registry to load AtomicRedTeam.dll to RunOnceEx. Output will be via stdout.
Upon successful execution, cmd.exe will modify the registry to load AtomicRedTeam.dll to RunOnceEx. Output will be via stdout.
**Supported Platforms:** Windows
+1
View File
@@ -13,6 +13,7 @@ The SSP configuration is stored in two Registry keys: <code>HKLM\SYSTEM\CurrentC
## Atomic Test #1 - Modify SSP configuration in registry
Add a value to a Windows registry SSP key, simulating an adversarial modification of those keys.
**Supported Platforms:** Windows
-1
View File
@@ -72,7 +72,6 @@ start $PathToAtomicsFolder\T1559.002\bin\DDE_Document.docx
<br/>
## Atomic Test #3 - DDEAUTO
TrustedSec - Unicorn - https://github.com/trustedsec/unicorn
SensePost DDEAUTO - https://sensepost.com/blog/2017/macro-less-code-exec-in-msword/
+1 -1
View File
@@ -27,7 +27,7 @@ Some 3rd party utilities may be preinstalled, such as `tar` on Linux and macOS o
## Atomic Test #1 - Compress Data for Exfiltration With Rar
An adversary may compress data (e.g., sensitive documents) that is collected prior to exfiltration.
When the test completes you should find the txt files from the %USERPROFILE% directory compressed in a file called T1560.001-data.rar in the %USERPROFILE% directory
When the test completes you should find the txt files from the %USERPROFILE% directory compressed in a file called T1560.001-data.rar in the %USERPROFILE% directory
**Supported Platforms:** Windows
+1 -1
View File
@@ -13,7 +13,7 @@ Both compression and encryption are done prior to exfiltration, and can be perfo
## Atomic Test #1 - Compress Data for Exfiltration With PowerShell
An adversary may compress data (e.g., sensitive documents) that is collected prior to exfiltration.
When the test completes you should find the files from the $env:USERPROFILE directory compressed in a file called T1560-data-ps.zip in the $env:USERPROFILE directory
When the test completes you should find the files from the $env:USERPROFILE directory compressed in a file called T1560-data-ps.zip in the $env:USERPROFILE directory
**Supported Platforms:** Windows
+1 -1
View File
@@ -725,7 +725,7 @@ if (Test-Path "#{falcond_path}") {. "#{falcond_path}" /repair /uninstall /quiet
## Atomic Test #21 - Tamper with Windows Defender Evade Scanning -Folder
Malware can exclude a specific path from being scanned and evading detection.
Upon successul execution, the file provided should be on the list of excluded path.
To check the exclusion list using poweshell (Get-MpPreference).ExclusionPath
To check the exclusion list using poweshell (Get-MpPreference).ExclusionPath
**Supported Platforms:** Windows
+1
View File
@@ -47,6 +47,7 @@ export HISTCONTROL=ignoreboth
## Atomic Test #2 - Mac HISTCONTROL
**Supported Platforms:** macOS, Linux
+1 -1
View File
@@ -18,7 +18,7 @@ LD_PRELOAD hijacking may grant access to the victim process's memory, system/net
## Atomic Test #1 - Shared Library Injection via /etc/ld.so.preload
This test adds a shared library to the `ld.so.preload` list to execute and intercept API calls. This technique was used by threat actor Rocke during the exploitation of Linux web servers. This requires the `glibc` package.
Upon successful execution, bash will echo `../bin/T1574.006.so` to /etc/ld.so.preload.
Upon successful execution, bash will echo `../bin/T1574.006.so` to /etc/ld.so.preload.
**Supported Platforms:** Linux