Update T1552.yaml (#2829)
added an atomic which searches for password strings in powershell history file Co-authored-by: Carrie Roberts <clr2of8@gmail.com>
This commit is contained in:
@@ -55,3 +55,14 @@ atomic_tests:
|
||||
rm -rf stratus*
|
||||
name: sh
|
||||
elevation_required: false
|
||||
- name: Search for Passwords in Powershell History
|
||||
description: |
|
||||
Find passwords in the powershell history files
|
||||
Searching for following strings: "password", "-p", "key", "pwd", "pass"
|
||||
supported_platforms:
|
||||
- windows
|
||||
executor:
|
||||
command: |
|
||||
ls -R C:\Users\*\AppData\Roaming\Microsoft\Windows\PowerShell\PSReadLine\ConsoleHost_history.txt | Select-String "password", "-p", "key", "pwd", "pass"
|
||||
name: powershell
|
||||
elevation_required: true
|
||||
|
||||
Reference in New Issue
Block a user