Merge branch 'master' into T1110.001_II

This commit is contained in:
Jose Enrique Hernandez
2023-02-21 22:13:55 -05:00
committed by GitHub
13 changed files with 259 additions and 18 deletions
File diff suppressed because one or more lines are too long
File diff suppressed because one or more lines are too long
+4
View File
@@ -244,6 +244,8 @@ defense-evasion,T1548.001,Abuse Elevation Control Mechanism: Setuid and Setgid,2
defense-evasion,T1548.001,Abuse Elevation Control Mechanism: Setuid and Setgid,3,Set a SetGID flag on file,db55f666-7cba-46c6-9fe6-205a05c3242c,sh
defense-evasion,T1548.001,Abuse Elevation Control Mechanism: Setuid and Setgid,4,Make and modify capabilities of a binary,db53959c-207d-4000-9e7a-cd8eb417e072,sh
defense-evasion,T1548.001,Abuse Elevation Control Mechanism: Setuid and Setgid,5,Provide the SetUID capability to a file,1ac3272f-9bcf-443a-9888-4b1d3de785c1,sh
defense-evasion,T1548.001,Abuse Elevation Control Mechanism: Setuid and Setgid,6,Do reconnaissance for files that have the setuid bit set,8e36da01-cd29-45fd-be72-8a0fcaad4481,sh
defense-evasion,T1548.001,Abuse Elevation Control Mechanism: Setuid and Setgid,7,Do reconnaissance for files that have the setgid bit set,3fb46e17-f337-4c14-9f9a-a471946533e2,sh
defense-evasion,T1218.008,Signed Binary Proxy Execution: Odbcconf,1,Odbcconf.exe - Execute Arbitrary DLL,2430498b-06c0-4b92-a448-8ad263c388e2,command_prompt
defense-evasion,T1218.008,Signed Binary Proxy Execution: Odbcconf,2,Odbcconf.exe - Load Response File,331ce274-f9c9-440b-9f8c-a1006e1fce0b,command_prompt
defense-evasion,T1562.006,Impair Defenses: Indicator Blocking,1,Auditing Configuration Changes on Linux Host,212cfbcf-4770-4980-bc21-303e37abd0e3,bash
@@ -537,6 +539,8 @@ privilege-escalation,T1548.001,Abuse Elevation Control Mechanism: Setuid and Set
privilege-escalation,T1548.001,Abuse Elevation Control Mechanism: Setuid and Setgid,3,Set a SetGID flag on file,db55f666-7cba-46c6-9fe6-205a05c3242c,sh
privilege-escalation,T1548.001,Abuse Elevation Control Mechanism: Setuid and Setgid,4,Make and modify capabilities of a binary,db53959c-207d-4000-9e7a-cd8eb417e072,sh
privilege-escalation,T1548.001,Abuse Elevation Control Mechanism: Setuid and Setgid,5,Provide the SetUID capability to a file,1ac3272f-9bcf-443a-9888-4b1d3de785c1,sh
privilege-escalation,T1548.001,Abuse Elevation Control Mechanism: Setuid and Setgid,6,Do reconnaissance for files that have the setuid bit set,8e36da01-cd29-45fd-be72-8a0fcaad4481,sh
privilege-escalation,T1548.001,Abuse Elevation Control Mechanism: Setuid and Setgid,7,Do reconnaissance for files that have the setgid bit set,3fb46e17-f337-4c14-9f9a-a471946533e2,sh
privilege-escalation,T1547.004,Boot or Logon Autostart Execution: Winlogon Helper DLL,1,Winlogon Shell Key Persistence - PowerShell,bf9f9d65-ee4d-4c3e-a843-777d04f19c38,powershell
privilege-escalation,T1547.004,Boot or Logon Autostart Execution: Winlogon Helper DLL,2,Winlogon Userinit Key Persistence - PowerShell,fb32c935-ee2e-454b-8fa3-1c46b42e8dfb,powershell
privilege-escalation,T1547.004,Boot or Logon Autostart Execution: Winlogon Helper DLL,3,Winlogon Notify Key Logon Persistence - PowerShell,d40da266-e073-4e5a-bb8b-2b385023e5f9,powershell
1 Tactic Technique # Technique Name Test # Test Name Test GUID Executor Name
244 defense-evasion T1548.001 Abuse Elevation Control Mechanism: Setuid and Setgid 3 Set a SetGID flag on file db55f666-7cba-46c6-9fe6-205a05c3242c sh
245 defense-evasion T1548.001 Abuse Elevation Control Mechanism: Setuid and Setgid 4 Make and modify capabilities of a binary db53959c-207d-4000-9e7a-cd8eb417e072 sh
246 defense-evasion T1548.001 Abuse Elevation Control Mechanism: Setuid and Setgid 5 Provide the SetUID capability to a file 1ac3272f-9bcf-443a-9888-4b1d3de785c1 sh
247 defense-evasion T1548.001 Abuse Elevation Control Mechanism: Setuid and Setgid 6 Do reconnaissance for files that have the setuid bit set 8e36da01-cd29-45fd-be72-8a0fcaad4481 sh
248 defense-evasion T1548.001 Abuse Elevation Control Mechanism: Setuid and Setgid 7 Do reconnaissance for files that have the setgid bit set 3fb46e17-f337-4c14-9f9a-a471946533e2 sh
249 defense-evasion T1218.008 Signed Binary Proxy Execution: Odbcconf 1 Odbcconf.exe - Execute Arbitrary DLL 2430498b-06c0-4b92-a448-8ad263c388e2 command_prompt
250 defense-evasion T1218.008 Signed Binary Proxy Execution: Odbcconf 2 Odbcconf.exe - Load Response File 331ce274-f9c9-440b-9f8c-a1006e1fce0b command_prompt
251 defense-evasion T1562.006 Impair Defenses: Indicator Blocking 1 Auditing Configuration Changes on Linux Host 212cfbcf-4770-4980-bc21-303e37abd0e3 bash
539 privilege-escalation T1548.001 Abuse Elevation Control Mechanism: Setuid and Setgid 3 Set a SetGID flag on file db55f666-7cba-46c6-9fe6-205a05c3242c sh
540 privilege-escalation T1548.001 Abuse Elevation Control Mechanism: Setuid and Setgid 4 Make and modify capabilities of a binary db53959c-207d-4000-9e7a-cd8eb417e072 sh
541 privilege-escalation T1548.001 Abuse Elevation Control Mechanism: Setuid and Setgid 5 Provide the SetUID capability to a file 1ac3272f-9bcf-443a-9888-4b1d3de785c1 sh
542 privilege-escalation T1548.001 Abuse Elevation Control Mechanism: Setuid and Setgid 6 Do reconnaissance for files that have the setuid bit set 8e36da01-cd29-45fd-be72-8a0fcaad4481 sh
543 privilege-escalation T1548.001 Abuse Elevation Control Mechanism: Setuid and Setgid 7 Do reconnaissance for files that have the setgid bit set 3fb46e17-f337-4c14-9f9a-a471946533e2 sh
544 privilege-escalation T1547.004 Boot or Logon Autostart Execution: Winlogon Helper DLL 1 Winlogon Shell Key Persistence - PowerShell bf9f9d65-ee4d-4c3e-a843-777d04f19c38 powershell
545 privilege-escalation T1547.004 Boot or Logon Autostart Execution: Winlogon Helper DLL 2 Winlogon Userinit Key Persistence - PowerShell fb32c935-ee2e-454b-8fa3-1c46b42e8dfb powershell
546 privilege-escalation T1547.004 Boot or Logon Autostart Execution: Winlogon Helper DLL 3 Winlogon Notify Key Logon Persistence - PowerShell d40da266-e073-4e5a-bb8b-2b385023e5f9 powershell
@@ -58,6 +58,8 @@ defense-evasion,T1548.001,Abuse Elevation Control Mechanism: Setuid and Setgid,2
defense-evasion,T1548.001,Abuse Elevation Control Mechanism: Setuid and Setgid,3,Set a SetGID flag on file,db55f666-7cba-46c6-9fe6-205a05c3242c,sh
defense-evasion,T1548.001,Abuse Elevation Control Mechanism: Setuid and Setgid,4,Make and modify capabilities of a binary,db53959c-207d-4000-9e7a-cd8eb417e072,sh
defense-evasion,T1548.001,Abuse Elevation Control Mechanism: Setuid and Setgid,5,Provide the SetUID capability to a file,1ac3272f-9bcf-443a-9888-4b1d3de785c1,sh
defense-evasion,T1548.001,Abuse Elevation Control Mechanism: Setuid and Setgid,6,Do reconnaissance for files that have the setuid bit set,8e36da01-cd29-45fd-be72-8a0fcaad4481,sh
defense-evasion,T1548.001,Abuse Elevation Control Mechanism: Setuid and Setgid,7,Do reconnaissance for files that have the setgid bit set,3fb46e17-f337-4c14-9f9a-a471946533e2,sh
defense-evasion,T1562.006,Impair Defenses: Indicator Blocking,1,Auditing Configuration Changes on Linux Host,212cfbcf-4770-4980-bc21-303e37abd0e3,bash
defense-evasion,T1562.006,Impair Defenses: Indicator Blocking,2,Logging Configuration Changes on Linux Host,7d40bc58-94c7-4fbb-88d9-ebce9fcdb60c,bash
defense-evasion,T1562.003,Impair Defenses: HISTCONTROL,1,Disable history collection,4eafdb45-0f79-4d66-aa86-a3e2c08791f5,sh
@@ -142,6 +144,8 @@ privilege-escalation,T1548.001,Abuse Elevation Control Mechanism: Setuid and Set
privilege-escalation,T1548.001,Abuse Elevation Control Mechanism: Setuid and Setgid,3,Set a SetGID flag on file,db55f666-7cba-46c6-9fe6-205a05c3242c,sh
privilege-escalation,T1548.001,Abuse Elevation Control Mechanism: Setuid and Setgid,4,Make and modify capabilities of a binary,db53959c-207d-4000-9e7a-cd8eb417e072,sh
privilege-escalation,T1548.001,Abuse Elevation Control Mechanism: Setuid and Setgid,5,Provide the SetUID capability to a file,1ac3272f-9bcf-443a-9888-4b1d3de785c1,sh
privilege-escalation,T1548.001,Abuse Elevation Control Mechanism: Setuid and Setgid,6,Do reconnaissance for files that have the setuid bit set,8e36da01-cd29-45fd-be72-8a0fcaad4481,sh
privilege-escalation,T1548.001,Abuse Elevation Control Mechanism: Setuid and Setgid,7,Do reconnaissance for files that have the setgid bit set,3fb46e17-f337-4c14-9f9a-a471946533e2,sh
privilege-escalation,T1547.006,Boot or Logon Autostart Execution: Kernel Modules and Extensions,1,Linux - Load Kernel Module via insmod,687dcb93-9656-4853-9c36-9977315e9d23,bash
privilege-escalation,T1053.006,Scheduled Task/Job: Systemd Timers,1,Create Systemd Service and Timer,f4983098-bb13-44fb-9b2c-46149961807b,bash
privilege-escalation,T1053.006,Scheduled Task/Job: Systemd Timers,2,Create a user level transient systemd service and timer,3de33f5b-62e5-4e63-a2a0-6fd8808c80ec,sh
1 Tactic Technique # Technique Name Test # Test Name Test GUID Executor Name
58 defense-evasion T1548.001 Abuse Elevation Control Mechanism: Setuid and Setgid 3 Set a SetGID flag on file db55f666-7cba-46c6-9fe6-205a05c3242c sh
59 defense-evasion T1548.001 Abuse Elevation Control Mechanism: Setuid and Setgid 4 Make and modify capabilities of a binary db53959c-207d-4000-9e7a-cd8eb417e072 sh
60 defense-evasion T1548.001 Abuse Elevation Control Mechanism: Setuid and Setgid 5 Provide the SetUID capability to a file 1ac3272f-9bcf-443a-9888-4b1d3de785c1 sh
61 defense-evasion T1548.001 Abuse Elevation Control Mechanism: Setuid and Setgid 6 Do reconnaissance for files that have the setuid bit set 8e36da01-cd29-45fd-be72-8a0fcaad4481 sh
62 defense-evasion T1548.001 Abuse Elevation Control Mechanism: Setuid and Setgid 7 Do reconnaissance for files that have the setgid bit set 3fb46e17-f337-4c14-9f9a-a471946533e2 sh
63 defense-evasion T1562.006 Impair Defenses: Indicator Blocking 1 Auditing Configuration Changes on Linux Host 212cfbcf-4770-4980-bc21-303e37abd0e3 bash
64 defense-evasion T1562.006 Impair Defenses: Indicator Blocking 2 Logging Configuration Changes on Linux Host 7d40bc58-94c7-4fbb-88d9-ebce9fcdb60c bash
65 defense-evasion T1562.003 Impair Defenses: HISTCONTROL 1 Disable history collection 4eafdb45-0f79-4d66-aa86-a3e2c08791f5 sh
144 privilege-escalation T1548.001 Abuse Elevation Control Mechanism: Setuid and Setgid 3 Set a SetGID flag on file db55f666-7cba-46c6-9fe6-205a05c3242c sh
145 privilege-escalation T1548.001 Abuse Elevation Control Mechanism: Setuid and Setgid 4 Make and modify capabilities of a binary db53959c-207d-4000-9e7a-cd8eb417e072 sh
146 privilege-escalation T1548.001 Abuse Elevation Control Mechanism: Setuid and Setgid 5 Provide the SetUID capability to a file 1ac3272f-9bcf-443a-9888-4b1d3de785c1 sh
147 privilege-escalation T1548.001 Abuse Elevation Control Mechanism: Setuid and Setgid 6 Do reconnaissance for files that have the setuid bit set 8e36da01-cd29-45fd-be72-8a0fcaad4481 sh
148 privilege-escalation T1548.001 Abuse Elevation Control Mechanism: Setuid and Setgid 7 Do reconnaissance for files that have the setgid bit set 3fb46e17-f337-4c14-9f9a-a471946533e2 sh
149 privilege-escalation T1547.006 Boot or Logon Autostart Execution: Kernel Modules and Extensions 1 Linux - Load Kernel Module via insmod 687dcb93-9656-4853-9c36-9977315e9d23 bash
150 privilege-escalation T1053.006 Scheduled Task/Job: Systemd Timers 1 Create Systemd Service and Timer f4983098-bb13-44fb-9b2c-46149961807b bash
151 privilege-escalation T1053.006 Scheduled Task/Job: Systemd Timers 2 Create a user level transient systemd service and timer 3de33f5b-62e5-4e63-a2a0-6fd8808c80ec sh
@@ -332,6 +332,8 @@
- Atomic Test #3: Set a SetGID flag on file [macos, linux]
- Atomic Test #4: Make and modify capabilities of a binary [linux]
- Atomic Test #5: Provide the SetUID capability to a file [linux]
- Atomic Test #6: Do reconnaissance for files that have the setuid bit set [linux]
- Atomic Test #7: Do reconnaissance for files that have the setgid bit set [linux]
- T1117 Regsvr32 [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- T1054 Indicator Blocking [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- T1108 Redundant Access [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
@@ -810,6 +812,8 @@
- Atomic Test #3: Set a SetGID flag on file [macos, linux]
- Atomic Test #4: Make and modify capabilities of a binary [linux]
- Atomic Test #5: Provide the SetUID capability to a file [linux]
- Atomic Test #6: Do reconnaissance for files that have the setuid bit set [linux]
- Atomic Test #7: Do reconnaissance for files that have the setgid bit set [linux]
- [T1547.004 Boot or Logon Autostart Execution: Winlogon Helper DLL](../../T1547.004/T1547.004.md)
- Atomic Test #1: Winlogon Shell Key Persistence - PowerShell [windows]
- Atomic Test #2: Winlogon Userinit Key Persistence - PowerShell [windows]
@@ -92,6 +92,8 @@
- Atomic Test #3: Set a SetGID flag on file [macos, linux]
- Atomic Test #4: Make and modify capabilities of a binary [linux]
- Atomic Test #5: Provide the SetUID capability to a file [linux]
- Atomic Test #6: Do reconnaissance for files that have the setuid bit set [linux]
- Atomic Test #7: Do reconnaissance for files that have the setgid bit set [linux]
- T1108 Redundant Access [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- [T1562.006 Impair Defenses: Indicator Blocking](../../T1562.006/T1562.006.md)
- Atomic Test #1: Auditing Configuration Changes on Linux Host [linux]
@@ -336,6 +338,8 @@
- Atomic Test #3: Set a SetGID flag on file [macos, linux]
- Atomic Test #4: Make and modify capabilities of a binary [linux]
- Atomic Test #5: Provide the SetUID capability to a file [linux]
- Atomic Test #6: Do reconnaissance for files that have the setuid bit set [linux]
- Atomic Test #7: Do reconnaissance for files that have the setgid bit set [linux]
- T1055.014 VDSO Hijacking [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- T1169 Sudo [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- [T1547.006 Boot or Logon Autostart Execution: Kernel Modules and Extensions](../../T1547.006/T1547.006.md)
+56 -4
View File
@@ -12510,7 +12510,7 @@ defense-evasion:
command: |
sudo touch #{file_to_setuid}
sudo chown root #{file_to_setuid}
sudo chmod u+s #{file_to_setuid}
sudo chmod u+xs #{file_to_setuid}
cleanup_command: 'sudo rm #{file_to_setuid}
'
@@ -12533,7 +12533,7 @@ defense-evasion:
command: |
sudo touch #{file_to_setuid}
sudo chown root #{file_to_setuid}
sudo chmod g+s #{file_to_setuid}
sudo chmod g+xs #{file_to_setuid}
cleanup_command: 'sudo rm #{file_to_setuid}
'
@@ -12585,6 +12585,32 @@ defense-evasion:
'
name: sh
elevation_required: true
- name: Do reconnaissance for files that have the setuid bit set
auto_generated_guid: 8e36da01-cd29-45fd-be72-8a0fcaad4481
description: 'This test simulates a command that can be run to enumerate files
that have the setuid bit set
'
supported_platforms:
- linux
executor:
command: 'find /usr/bin -perm -4000
'
name: sh
- name: Do reconnaissance for files that have the setgid bit set
auto_generated_guid: 3fb46e17-f337-4c14-9f9a-a471946533e2
description: 'This test simulates a command that can be run to enumerate files
that have the setgid bit set
'
supported_platforms:
- linux
executor:
command: 'find /usr/bin -perm -2000
'
name: sh
T1117:
technique:
x_mitre_platforms:
@@ -34058,7 +34084,7 @@ privilege-escalation:
command: |
sudo touch #{file_to_setuid}
sudo chown root #{file_to_setuid}
sudo chmod u+s #{file_to_setuid}
sudo chmod u+xs #{file_to_setuid}
cleanup_command: 'sudo rm #{file_to_setuid}
'
@@ -34081,7 +34107,7 @@ privilege-escalation:
command: |
sudo touch #{file_to_setuid}
sudo chown root #{file_to_setuid}
sudo chmod g+s #{file_to_setuid}
sudo chmod g+xs #{file_to_setuid}
cleanup_command: 'sudo rm #{file_to_setuid}
'
@@ -34133,6 +34159,32 @@ privilege-escalation:
'
name: sh
elevation_required: true
- name: Do reconnaissance for files that have the setuid bit set
auto_generated_guid: 8e36da01-cd29-45fd-be72-8a0fcaad4481
description: 'This test simulates a command that can be run to enumerate files
that have the setuid bit set
'
supported_platforms:
- linux
executor:
command: 'find /usr/bin -perm -4000
'
name: sh
- name: Do reconnaissance for files that have the setgid bit set
auto_generated_guid: 3fb46e17-f337-4c14-9f9a-a471946533e2
description: 'This test simulates a command that can be run to enumerate files
that have the setgid bit set
'
supported_platforms:
- linux
executor:
command: 'find /usr/bin -perm -2000
'
name: sh
T1547.004:
technique:
x_mitre_platforms:
+56 -4
View File
@@ -7525,7 +7525,7 @@ defense-evasion:
command: |
sudo touch #{file_to_setuid}
sudo chown root #{file_to_setuid}
sudo chmod u+s #{file_to_setuid}
sudo chmod u+xs #{file_to_setuid}
cleanup_command: 'sudo rm #{file_to_setuid}
'
@@ -7548,7 +7548,7 @@ defense-evasion:
command: |
sudo touch #{file_to_setuid}
sudo chown root #{file_to_setuid}
sudo chmod g+s #{file_to_setuid}
sudo chmod g+xs #{file_to_setuid}
cleanup_command: 'sudo rm #{file_to_setuid}
'
@@ -7600,6 +7600,32 @@ defense-evasion:
'
name: sh
elevation_required: true
- name: Do reconnaissance for files that have the setuid bit set
auto_generated_guid: 8e36da01-cd29-45fd-be72-8a0fcaad4481
description: 'This test simulates a command that can be run to enumerate files
that have the setuid bit set
'
supported_platforms:
- linux
executor:
command: 'find /usr/bin -perm -4000
'
name: sh
- name: Do reconnaissance for files that have the setgid bit set
auto_generated_guid: 3fb46e17-f337-4c14-9f9a-a471946533e2
description: 'This test simulates a command that can be run to enumerate files
that have the setgid bit set
'
supported_platforms:
- linux
executor:
command: 'find /usr/bin -perm -2000
'
name: sh
T1117:
technique:
x_mitre_platforms:
@@ -21826,7 +21852,7 @@ privilege-escalation:
command: |
sudo touch #{file_to_setuid}
sudo chown root #{file_to_setuid}
sudo chmod u+s #{file_to_setuid}
sudo chmod u+xs #{file_to_setuid}
cleanup_command: 'sudo rm #{file_to_setuid}
'
@@ -21849,7 +21875,7 @@ privilege-escalation:
command: |
sudo touch #{file_to_setuid}
sudo chown root #{file_to_setuid}
sudo chmod g+s #{file_to_setuid}
sudo chmod g+xs #{file_to_setuid}
cleanup_command: 'sudo rm #{file_to_setuid}
'
@@ -21901,6 +21927,32 @@ privilege-escalation:
'
name: sh
elevation_required: true
- name: Do reconnaissance for files that have the setuid bit set
auto_generated_guid: 8e36da01-cd29-45fd-be72-8a0fcaad4481
description: 'This test simulates a command that can be run to enumerate files
that have the setuid bit set
'
supported_platforms:
- linux
executor:
command: 'find /usr/bin -perm -4000
'
name: sh
- name: Do reconnaissance for files that have the setgid bit set
auto_generated_guid: 3fb46e17-f337-4c14-9f9a-a471946533e2
description: 'This test simulates a command that can be run to enumerate files
that have the setgid bit set
'
supported_platforms:
- linux
executor:
command: 'find /usr/bin -perm -2000
'
name: sh
T1547.004:
technique:
x_mitre_platforms:
+4 -4
View File
@@ -6901,7 +6901,7 @@ defense-evasion:
command: |
sudo touch #{file_to_setuid}
sudo chown root #{file_to_setuid}
sudo chmod u+s #{file_to_setuid}
sudo chmod u+xs #{file_to_setuid}
cleanup_command: 'sudo rm #{file_to_setuid}
'
@@ -6924,7 +6924,7 @@ defense-evasion:
command: |
sudo touch #{file_to_setuid}
sudo chown root #{file_to_setuid}
sudo chmod g+s #{file_to_setuid}
sudo chmod g+xs #{file_to_setuid}
cleanup_command: 'sudo rm #{file_to_setuid}
'
@@ -21148,7 +21148,7 @@ privilege-escalation:
command: |
sudo touch #{file_to_setuid}
sudo chown root #{file_to_setuid}
sudo chmod u+s #{file_to_setuid}
sudo chmod u+xs #{file_to_setuid}
cleanup_command: 'sudo rm #{file_to_setuid}
'
@@ -21171,7 +21171,7 @@ privilege-escalation:
command: |
sudo touch #{file_to_setuid}
sudo chown root #{file_to_setuid}
sudo chmod g+s #{file_to_setuid}
sudo chmod g+xs #{file_to_setuid}
cleanup_command: 'sudo rm #{file_to_setuid}
'
+37
View File
@@ -162,3 +162,40 @@ atomic_tests:
echo "\$ART=$ART"
echo -n "$ART" |base64 -d |/bin/bash
unset ART
- name: Change login shell
auto_generated_guid: c7ac59cb-13cc-4622-81dc-6d2fee9bfac7
description: |
An adversary may want to use a different login shell. The chsh command changes the user login shell. The following test, creates an art user with a /bin/bash shell, changes the users shell to sh, then deletes the art user.
supported_platforms:
- linux
dependencies:
- description: |
chsh - change login shell, must be installed
prereq_command: |
if [ -f /usr/bin/chsh ]; then echo "exit 0"; else echo "exit 1"; exit 1; fi
get_prereq_command: |
echo "Automated installer not implemented yet, please install chsh manually"
executor:
name: bash
elevation_required: true
command: |
useradd -s /bin/bash art
cat /etc/passwd |grep ^art
chsh -s /bin/sh art
cat /etc/passwd |grep ^art
cleanup_command: |
userdel art
- name: Environment variable scripts
auto_generated_guid: bdaebd56-368b-4970-a523-f905ff4a8a51
description: |
An adversary may place scripts in an environment variable because they can't or don't wish to create script files on the host. The following test, in a bash shell, exports the ART variable containing an echo command, then pipes the variable to /bin/bash
supported_platforms:
- linux
executor:
name: bash
elevation_required: false
command: |
export ART='echo "Atomic Red Team was here... T1059.004"'
echo $ART |/bin/bash
cleanup_command: |
unset ART
+62 -2
View File
@@ -20,6 +20,10 @@ Alternatively, adversaries may choose to find and target vulnerable binaries wit
- [Atomic Test #5 - Provide the SetUID capability to a file](#atomic-test-5---provide-the-setuid-capability-to-a-file)
- [Atomic Test #6 - Do reconnaissance for files that have the setuid bit set](#atomic-test-6---do-reconnaissance-for-files-that-have-the-setuid-bit-set)
- [Atomic Test #7 - Do reconnaissance for files that have the setgid bit set](#atomic-test-7---do-reconnaissance-for-files-that-have-the-setgid-bit-set)
<br/>
@@ -90,7 +94,7 @@ This test sets the SetUID flag on a file in Linux and macOS.
```sh
sudo touch #{file_to_setuid}
sudo chown root #{file_to_setuid}
sudo chmod u+s #{file_to_setuid}
sudo chmod u+xs #{file_to_setuid}
```
#### Cleanup Commands:
@@ -129,7 +133,7 @@ This test sets the SetGID flag on a file in Linux and macOS.
```sh
sudo touch #{file_to_setuid}
sudo chown root #{file_to_setuid}
sudo chmod g+s #{file_to_setuid}
sudo chmod g+xs #{file_to_setuid}
```
#### Cleanup Commands:
@@ -222,4 +226,60 @@ rm #{file_to_setcap}
<br/>
<br/>
## Atomic Test #6 - Do reconnaissance for files that have the setuid bit set
This test simulates a command that can be run to enumerate files that have the setuid bit set
**Supported Platforms:** Linux
**auto_generated_guid:** 8e36da01-cd29-45fd-be72-8a0fcaad4481
#### Attack Commands: Run with `sh`!
```sh
find /usr/bin -perm -4000
```
<br/>
<br/>
## Atomic Test #7 - Do reconnaissance for files that have the setgid bit set
This test simulates a command that can be run to enumerate files that have the setgid bit set
**Supported Platforms:** Linux
**auto_generated_guid:** 3fb46e17-f337-4c14-9f9a-a471946533e2
#### Attack Commands: Run with `sh`!
```sh
find /usr/bin -perm -2000
```
<br/>
+22 -2
View File
@@ -42,7 +42,7 @@ atomic_tests:
command: |
sudo touch #{file_to_setuid}
sudo chown root #{file_to_setuid}
sudo chmod u+s #{file_to_setuid}
sudo chmod u+xs #{file_to_setuid}
cleanup_command: |
sudo rm #{file_to_setuid}
name: sh
@@ -63,7 +63,7 @@ atomic_tests:
command: |
sudo touch #{file_to_setuid}
sudo chown root #{file_to_setuid}
sudo chmod g+s #{file_to_setuid}
sudo chmod g+xs #{file_to_setuid}
cleanup_command: |
sudo rm #{file_to_setuid}
name: sh
@@ -111,3 +111,23 @@ atomic_tests:
rm #{file_to_setcap}
name: sh
elevation_required: true
- name: Do reconnaissance for files that have the setuid bit set
auto_generated_guid: 8e36da01-cd29-45fd-be72-8a0fcaad4481
description: |
This test simulates a command that can be run to enumerate files that have the setuid bit set
supported_platforms:
- linux
executor:
command: |
find /usr/bin -perm -4000
name: sh
- name: Do reconnaissance for files that have the setgid bit set
auto_generated_guid: 3fb46e17-f337-4c14-9f9a-a471946533e2
description: |
This test simulates a command that can be run to enumerate files that have the setgid bit set
supported_platforms:
- linux
executor:
command: |
find /usr/bin -perm -2000
name: sh
+4
View File
@@ -1239,3 +1239,7 @@ bbdb06bc-bab6-4f5b-8232-ba3fbed51d77
5d7057c9-2c8a-4026-91dd-13b5584daa69
cb8f7cdc-36c4-4ed0-befc-7ad7d24dfd7a
53ead5db-7098-4111-bb3f-563be390e72e
8e36da01-cd29-45fd-be72-8a0fcaad4481
3fb46e17-f337-4c14-9f9a-a471946533e2
c7ac59cb-13cc-4622-81dc-6d2fee9bfac7
bdaebd56-368b-4970-a523-f905ff4a8a51