Generated docs from job=generate-docs branch=master [ci skip]
This commit is contained in:
@@ -2,7 +2,7 @@
|
||||
|
||||
# Atomic Red Team
|
||||
|
||||
  
|
||||
  
|
||||
|
||||
Atomic Red Team™ is a library of tests mapped to the
|
||||
[MITRE ATT&CK®](https://attack.mitre.org/) framework. Security teams can use
|
||||
|
||||
File diff suppressed because one or more lines are too long
File diff suppressed because one or more lines are too long
@@ -1822,6 +1822,7 @@ discovery,T1082,System Information Discovery,32,ESXi - Darkside system informati
|
||||
discovery,T1082,System Information Discovery,33,sysctl to gather macOS hardware info,c8d40da9-31bd-47da-a497-11ea55d1ef6c,sh
|
||||
discovery,T1082,System Information Discovery,34,operating system discovery ,70e13ef4-5a74-47e4-9d16-760b41b0e2db,powershell
|
||||
discovery,T1082,System Information Discovery,35,"Check OS version via ""ver"" command",f6ecb109-df24-4303-8d85-1987dbae6160,command_prompt
|
||||
discovery,T1082,System Information Discovery,36,"Display volume shadow copies with ""vssadmin""",7161b085-816a-491f-bab4-d68e974b7995,command_prompt
|
||||
discovery,T1016.002,System Network Configuration Discovery: Wi-Fi Discovery,1,Enumerate Stored Wi-Fi Profiles And Passwords via netsh,53cf1903-0fa7-4177-ab14-f358ae809eec,command_prompt
|
||||
discovery,T1010,Application Window Discovery,1,List Process Main Windows - C# .NET,fe94a1c3-3e22-4dc9-9fdf-3a8bdbc10dc4,command_prompt
|
||||
discovery,T1497.003,Time Based Evasion,1,Delay execution with ping,8b87dd03-8204-478c-bac3-3959f6528de3,sh
|
||||
|
||||
|
@@ -1230,6 +1230,7 @@ discovery,T1082,System Information Discovery,31,ESXi - VM Discovery using ESXCLI
|
||||
discovery,T1082,System Information Discovery,32,ESXi - Darkside system information discovery,f89812e5-67d1-4f49-86fa-cbc6609ea86a,command_prompt
|
||||
discovery,T1082,System Information Discovery,34,operating system discovery ,70e13ef4-5a74-47e4-9d16-760b41b0e2db,powershell
|
||||
discovery,T1082,System Information Discovery,35,"Check OS version via ""ver"" command",f6ecb109-df24-4303-8d85-1987dbae6160,command_prompt
|
||||
discovery,T1082,System Information Discovery,36,"Display volume shadow copies with ""vssadmin""",7161b085-816a-491f-bab4-d68e974b7995,command_prompt
|
||||
discovery,T1016.002,System Network Configuration Discovery: Wi-Fi Discovery,1,Enumerate Stored Wi-Fi Profiles And Passwords via netsh,53cf1903-0fa7-4177-ab14-f358ae809eec,command_prompt
|
||||
discovery,T1010,Application Window Discovery,1,List Process Main Windows - C# .NET,fe94a1c3-3e22-4dc9-9fdf-3a8bdbc10dc4,command_prompt
|
||||
discovery,T1217,Browser Bookmark Discovery,5,List Google Chrome / Opera Bookmarks on Windows with powershell,faab755e-4299-48ec-8202-fc7885eb6545,powershell
|
||||
|
||||
|
@@ -2481,6 +2481,7 @@
|
||||
- Atomic Test #33: sysctl to gather macOS hardware info [macos]
|
||||
- Atomic Test #34: operating system discovery [windows]
|
||||
- Atomic Test #35: Check OS version via "ver" command [windows]
|
||||
- Atomic Test #36: Display volume shadow copies with "vssadmin" [windows]
|
||||
- [T1016.002 System Network Configuration Discovery: Wi-Fi Discovery](../../T1016.002/T1016.002.md)
|
||||
- Atomic Test #1: Enumerate Stored Wi-Fi Profiles And Passwords via netsh [windows]
|
||||
- [T1010 Application Window Discovery](../../T1010/T1010.md)
|
||||
|
||||
@@ -1738,6 +1738,7 @@
|
||||
- Atomic Test #32: ESXi - Darkside system information discovery [windows]
|
||||
- Atomic Test #34: operating system discovery [windows]
|
||||
- Atomic Test #35: Check OS version via "ver" command [windows]
|
||||
- Atomic Test #36: Display volume shadow copies with "vssadmin" [windows]
|
||||
- [T1016.002 System Network Configuration Discovery: Wi-Fi Discovery](../../T1016.002/T1016.002.md)
|
||||
- Atomic Test #1: Enumerate Stored Wi-Fi Profiles And Passwords via netsh [windows]
|
||||
- [T1010 Application Window Discovery](../../T1010/T1010.md)
|
||||
|
||||
@@ -102407,6 +102407,16 @@ discovery:
|
||||
executor:
|
||||
name: command_prompt
|
||||
command: ver
|
||||
- name: Display volume shadow copies with "vssadmin"
|
||||
auto_generated_guid: 7161b085-816a-491f-bab4-d68e974b7995
|
||||
description: The command shows all available volume shadow copies, along with
|
||||
their creation time and location.
|
||||
supported_platforms:
|
||||
- windows
|
||||
executor:
|
||||
name: command_prompt
|
||||
elevation_required: true
|
||||
command: vssadmin.exe list shadows
|
||||
T1016.002:
|
||||
technique:
|
||||
modified: '2023-10-05T11:35:30.887Z'
|
||||
|
||||
@@ -83862,6 +83862,16 @@ discovery:
|
||||
executor:
|
||||
name: command_prompt
|
||||
command: ver
|
||||
- name: Display volume shadow copies with "vssadmin"
|
||||
auto_generated_guid: 7161b085-816a-491f-bab4-d68e974b7995
|
||||
description: The command shows all available volume shadow copies, along with
|
||||
their creation time and location.
|
||||
supported_platforms:
|
||||
- windows
|
||||
executor:
|
||||
name: command_prompt
|
||||
elevation_required: true
|
||||
command: vssadmin.exe list shadows
|
||||
T1016.002:
|
||||
technique:
|
||||
modified: '2023-10-05T11:35:30.887Z'
|
||||
|
||||
@@ -78,6 +78,8 @@ Infrastructure as a Service (IaaS) cloud providers such as AWS, GCP, and Azure a
|
||||
|
||||
- [Atomic Test #35 - Check OS version via "ver" command](#atomic-test-35---check-os-version-via-ver-command)
|
||||
|
||||
- [Atomic Test #36 - Display volume shadow copies with "vssadmin"](#atomic-test-36---display-volume-shadow-copies-with-vssadmin)
|
||||
|
||||
|
||||
<br/>
|
||||
|
||||
@@ -1252,4 +1254,32 @@ ver
|
||||
|
||||
|
||||
|
||||
<br/>
|
||||
<br/>
|
||||
|
||||
## Atomic Test #36 - Display volume shadow copies with "vssadmin"
|
||||
The command shows all available volume shadow copies, along with their creation time and location.
|
||||
|
||||
**Supported Platforms:** Windows
|
||||
|
||||
|
||||
**auto_generated_guid:** 7161b085-816a-491f-bab4-d68e974b7995
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
#### Attack Commands: Run with `command_prompt`! Elevation Required (e.g. root or admin)
|
||||
|
||||
|
||||
```cmd
|
||||
vssadmin.exe list shadows
|
||||
```
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
<br/>
|
||||
|
||||
@@ -547,6 +547,7 @@ atomic_tests:
|
||||
name: command_prompt
|
||||
command: ver
|
||||
- name: Display volume shadow copies with "vssadmin"
|
||||
auto_generated_guid: 7161b085-816a-491f-bab4-d68e974b7995
|
||||
description: The command shows all available volume shadow copies, along with their creation time and location.
|
||||
supported_platforms:
|
||||
- windows
|
||||
|
||||
@@ -1682,3 +1682,4 @@ d9c32b3b-7916-45ad-aca5-6c902da80319
|
||||
8b87dd03-8204-478c-bac3-3959f6528de3
|
||||
ad4b73c2-d6e2-4d8b-9868-4c6f55906e01
|
||||
f6ecb109-df24-4303-8d85-1987dbae6160
|
||||
7161b085-816a-491f-bab4-d68e974b7995
|
||||
|
||||
Reference in New Issue
Block a user