Generated docs from job=generate-docs branch=master [ci skip]

This commit is contained in:
Atomic Red Team doc generator
2023-04-15 01:05:54 +00:00
parent dc272220f7
commit c152e26ac9
9 changed files with 132 additions and 2 deletions
File diff suppressed because one or more lines are too long
File diff suppressed because one or more lines are too long
+2
View File
@@ -640,6 +640,7 @@ privilege-escalation,T1546.004,Event Triggered Execution: .bash_profile and .bas
privilege-escalation,T1546.004,Event Triggered Execution: .bash_profile and .bashrc,3,Append to the system shell profile,694b3cc8-6a78-4d35-9e74-0123d009e94b,sh
privilege-escalation,T1546.004,Event Triggered Execution: .bash_profile and .bashrc,4,Append commands user shell profile,bbdb06bc-bab6-4f5b-8232-ba3fbed51d77,sh
privilege-escalation,T1546.004,Event Triggered Execution: .bash_profile and .bashrc,5,System shell profile scripts,8fe2ccfd-f079-4c03-b1a9-bd9b362b67d4,sh
privilege-escalation,T1546.004,Event Triggered Execution: .bash_profile and .bashrc,6,Create/Append to .bash_logout,37ad2f24-7c53-4a50-92da-427a4ad13f58,bash
privilege-escalation,T1134.005,Access Token Manipulation: SID-History Injection,1,Injection SID-History with mimikatz,6bef32e5-9456-4072-8f14-35566fb85401,command_prompt
privilege-escalation,T1547.002,Authentication Package,1,Authentication Package,be2590e8-4ac3-47ac-b4b5-945820f2fbe9,powershell
privilege-escalation,T1546.015,Event Triggered Execution: Component Object Model Hijacking,1,COM Hijacking - InprocServer32,48117158-d7be-441b-bc6a-d9e36e47b52b,powershell
@@ -933,6 +934,7 @@ persistence,T1546.004,Event Triggered Execution: .bash_profile and .bashrc,2,Add
persistence,T1546.004,Event Triggered Execution: .bash_profile and .bashrc,3,Append to the system shell profile,694b3cc8-6a78-4d35-9e74-0123d009e94b,sh
persistence,T1546.004,Event Triggered Execution: .bash_profile and .bashrc,4,Append commands user shell profile,bbdb06bc-bab6-4f5b-8232-ba3fbed51d77,sh
persistence,T1546.004,Event Triggered Execution: .bash_profile and .bashrc,5,System shell profile scripts,8fe2ccfd-f079-4c03-b1a9-bd9b362b67d4,sh
persistence,T1546.004,Event Triggered Execution: .bash_profile and .bashrc,6,Create/Append to .bash_logout,37ad2f24-7c53-4a50-92da-427a4ad13f58,bash
persistence,T1547.002,Authentication Package,1,Authentication Package,be2590e8-4ac3-47ac-b4b5-945820f2fbe9,powershell
persistence,T1546.015,Event Triggered Execution: Component Object Model Hijacking,1,COM Hijacking - InprocServer32,48117158-d7be-441b-bc6a-d9e36e47b52b,powershell
persistence,T1546.015,Event Triggered Execution: Component Object Model Hijacking,2,Powershell Execute COM Object,752191b1-7c71-445c-9dbe-21bb031b18eb,powershell
1 Tactic Technique # Technique Name Test # Test Name Test GUID Executor Name
640 privilege-escalation T1546.004 Event Triggered Execution: .bash_profile and .bashrc 3 Append to the system shell profile 694b3cc8-6a78-4d35-9e74-0123d009e94b sh
641 privilege-escalation T1546.004 Event Triggered Execution: .bash_profile and .bashrc 4 Append commands user shell profile bbdb06bc-bab6-4f5b-8232-ba3fbed51d77 sh
642 privilege-escalation T1546.004 Event Triggered Execution: .bash_profile and .bashrc 5 System shell profile scripts 8fe2ccfd-f079-4c03-b1a9-bd9b362b67d4 sh
643 privilege-escalation T1546.004 Event Triggered Execution: .bash_profile and .bashrc 6 Create/Append to .bash_logout 37ad2f24-7c53-4a50-92da-427a4ad13f58 bash
644 privilege-escalation T1134.005 Access Token Manipulation: SID-History Injection 1 Injection SID-History with mimikatz 6bef32e5-9456-4072-8f14-35566fb85401 command_prompt
645 privilege-escalation T1547.002 Authentication Package 1 Authentication Package be2590e8-4ac3-47ac-b4b5-945820f2fbe9 powershell
646 privilege-escalation T1546.015 Event Triggered Execution: Component Object Model Hijacking 1 COM Hijacking - InprocServer32 48117158-d7be-441b-bc6a-d9e36e47b52b powershell
934 persistence T1546.004 Event Triggered Execution: .bash_profile and .bashrc 3 Append to the system shell profile 694b3cc8-6a78-4d35-9e74-0123d009e94b sh
935 persistence T1546.004 Event Triggered Execution: .bash_profile and .bashrc 4 Append commands user shell profile bbdb06bc-bab6-4f5b-8232-ba3fbed51d77 sh
936 persistence T1546.004 Event Triggered Execution: .bash_profile and .bashrc 5 System shell profile scripts 8fe2ccfd-f079-4c03-b1a9-bd9b362b67d4 sh
937 persistence T1546.004 Event Triggered Execution: .bash_profile and .bashrc 6 Create/Append to .bash_logout 37ad2f24-7c53-4a50-92da-427a4ad13f58 bash
938 persistence T1547.002 Authentication Package 1 Authentication Package be2590e8-4ac3-47ac-b4b5-945820f2fbe9 powershell
939 persistence T1546.015 Event Triggered Execution: Component Object Model Hijacking 1 COM Hijacking - InprocServer32 48117158-d7be-441b-bc6a-d9e36e47b52b powershell
940 persistence T1546.015 Event Triggered Execution: Component Object Model Hijacking 2 Powershell Execute COM Object 752191b1-7c71-445c-9dbe-21bb031b18eb powershell
@@ -139,6 +139,7 @@ persistence,T1546.004,Event Triggered Execution: .bash_profile and .bashrc,2,Add
persistence,T1546.004,Event Triggered Execution: .bash_profile and .bashrc,3,Append to the system shell profile,694b3cc8-6a78-4d35-9e74-0123d009e94b,sh
persistence,T1546.004,Event Triggered Execution: .bash_profile and .bashrc,4,Append commands user shell profile,bbdb06bc-bab6-4f5b-8232-ba3fbed51d77,sh
persistence,T1546.004,Event Triggered Execution: .bash_profile and .bashrc,5,System shell profile scripts,8fe2ccfd-f079-4c03-b1a9-bd9b362b67d4,sh
persistence,T1546.004,Event Triggered Execution: .bash_profile and .bashrc,6,Create/Append to .bash_logout,37ad2f24-7c53-4a50-92da-427a4ad13f58,bash
persistence,T1037.004,Boot or Logon Initialization Scripts: Rc.common,2,rc.common,c33f3d80-5f04-419b-a13a-854d1cbdbf3a,bash
persistence,T1037.004,Boot or Logon Initialization Scripts: Rc.common,3,rc.local,126f71af-e1c9-405c-94ef-26a47b16c102,bash
persistence,T1543.002,Create or Modify System Process: Systemd Service,1,Create Systemd Service,d9e4f24f-aa67-4c6e-bcbf-85622b697a7c,bash
@@ -170,6 +171,7 @@ privilege-escalation,T1546.004,Event Triggered Execution: .bash_profile and .bas
privilege-escalation,T1546.004,Event Triggered Execution: .bash_profile and .bashrc,3,Append to the system shell profile,694b3cc8-6a78-4d35-9e74-0123d009e94b,sh
privilege-escalation,T1546.004,Event Triggered Execution: .bash_profile and .bashrc,4,Append commands user shell profile,bbdb06bc-bab6-4f5b-8232-ba3fbed51d77,sh
privilege-escalation,T1546.004,Event Triggered Execution: .bash_profile and .bashrc,5,System shell profile scripts,8fe2ccfd-f079-4c03-b1a9-bd9b362b67d4,sh
privilege-escalation,T1546.004,Event Triggered Execution: .bash_profile and .bashrc,6,Create/Append to .bash_logout,37ad2f24-7c53-4a50-92da-427a4ad13f58,bash
privilege-escalation,T1037.004,Boot or Logon Initialization Scripts: Rc.common,2,rc.common,c33f3d80-5f04-419b-a13a-854d1cbdbf3a,bash
privilege-escalation,T1037.004,Boot or Logon Initialization Scripts: Rc.common,3,rc.local,126f71af-e1c9-405c-94ef-26a47b16c102,bash
privilege-escalation,T1543.002,Create or Modify System Process: Systemd Service,1,Create Systemd Service,d9e4f24f-aa67-4c6e-bcbf-85622b697a7c,bash
1 Tactic Technique # Technique Name Test # Test Name Test GUID Executor Name
139 persistence T1546.004 Event Triggered Execution: .bash_profile and .bashrc 3 Append to the system shell profile 694b3cc8-6a78-4d35-9e74-0123d009e94b sh
140 persistence T1546.004 Event Triggered Execution: .bash_profile and .bashrc 4 Append commands user shell profile bbdb06bc-bab6-4f5b-8232-ba3fbed51d77 sh
141 persistence T1546.004 Event Triggered Execution: .bash_profile and .bashrc 5 System shell profile scripts 8fe2ccfd-f079-4c03-b1a9-bd9b362b67d4 sh
142 persistence T1546.004 Event Triggered Execution: .bash_profile and .bashrc 6 Create/Append to .bash_logout 37ad2f24-7c53-4a50-92da-427a4ad13f58 bash
143 persistence T1037.004 Boot or Logon Initialization Scripts: Rc.common 2 rc.common c33f3d80-5f04-419b-a13a-854d1cbdbf3a bash
144 persistence T1037.004 Boot or Logon Initialization Scripts: Rc.common 3 rc.local 126f71af-e1c9-405c-94ef-26a47b16c102 bash
145 persistence T1543.002 Create or Modify System Process: Systemd Service 1 Create Systemd Service d9e4f24f-aa67-4c6e-bcbf-85622b697a7c bash
171 privilege-escalation T1546.004 Event Triggered Execution: .bash_profile and .bashrc 3 Append to the system shell profile 694b3cc8-6a78-4d35-9e74-0123d009e94b sh
172 privilege-escalation T1546.004 Event Triggered Execution: .bash_profile and .bashrc 4 Append commands user shell profile bbdb06bc-bab6-4f5b-8232-ba3fbed51d77 sh
173 privilege-escalation T1546.004 Event Triggered Execution: .bash_profile and .bashrc 5 System shell profile scripts 8fe2ccfd-f079-4c03-b1a9-bd9b362b67d4 sh
174 privilege-escalation T1546.004 Event Triggered Execution: .bash_profile and .bashrc 6 Create/Append to .bash_logout 37ad2f24-7c53-4a50-92da-427a4ad13f58 bash
175 privilege-escalation T1037.004 Boot or Logon Initialization Scripts: Rc.common 2 rc.common c33f3d80-5f04-419b-a13a-854d1cbdbf3a bash
176 privilege-escalation T1037.004 Boot or Logon Initialization Scripts: Rc.common 3 rc.local 126f71af-e1c9-405c-94ef-26a47b16c102 bash
177 privilege-escalation T1543.002 Create or Modify System Process: Systemd Service 1 Create Systemd Service d9e4f24f-aa67-4c6e-bcbf-85622b697a7c bash
@@ -947,6 +947,7 @@
- Atomic Test #3: Append to the system shell profile [linux]
- Atomic Test #4: Append commands user shell profile [linux]
- Atomic Test #5: System shell profile scripts [linux]
- Atomic Test #6: Create/Append to .bash_logout [linux]
- [T1134.005 Access Token Manipulation: SID-History Injection](../../T1134.005/T1134.005.md)
- Atomic Test #1: Injection SID-History with mimikatz [windows]
- T1548.004 Elevated Execution with Prompt [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
@@ -1456,6 +1457,7 @@
- Atomic Test #3: Append to the system shell profile [linux]
- Atomic Test #4: Append commands user shell profile [linux]
- Atomic Test #5: System shell profile scripts [linux]
- Atomic Test #6: Create/Append to .bash_logout [linux]
- [T1547.002 Authentication Package](../../T1547.002/T1547.002.md)
- Atomic Test #1: Authentication Package [windows]
- T1128 Netsh Helper DLL [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
@@ -301,6 +301,7 @@
- Atomic Test #3: Append to the system shell profile [linux]
- Atomic Test #4: Append commands user shell profile [linux]
- Atomic Test #5: System shell profile scripts [linux]
- Atomic Test #6: Create/Append to .bash_logout [linux]
- T1168 Local Job Scheduling [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- T1166 Setuid and Setgid [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- T1100 Web Shell [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
@@ -373,6 +374,7 @@
- Atomic Test #3: Append to the system shell profile [linux]
- Atomic Test #4: Append commands user shell profile [linux]
- Atomic Test #5: System shell profile scripts [linux]
- Atomic Test #6: Create/Append to .bash_logout [linux]
- T1166 Setuid and Setgid [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- T1100 Web Shell [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- T1078.002 Domain Accounts [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
+42
View File
@@ -39532,6 +39532,27 @@ privilege-escalation:
'
cleanup_command: 'sed -i "s/# Atomic Red Team was here... T1546.004//" /etc/profile.d/bash_completion.sh
'
- name: Create/Append to .bash_logout
auto_generated_guid: 37ad2f24-7c53-4a50-92da-427a4ad13f58
description: "The Bash shell runs ~/.bash_logout \"if it exists\" to run commands
on user logout. An adversary may create or append to a .bash_logout to clear
history, start processes etc. Note the ~/.bash_logout is only run if you explicitly
exit or log out of an \"interactive login shell session\" i.e. via the console,
SSH, /bin/bash -l or su -l <username>. \n\nThis test creates the art user,
logs in, creates a .bash_logout which will echo some text into the art.txt
file on logout and logs out and the /home/art/art.txt is created.\n"
supported_platforms:
- linux
executor:
name: bash
elevation_required: true
command: |
useradd --create-home --shell /bin/bash art
su --login art
echo 'echo "Atomic Red Team was here... T1546.004" >> $HOME/art.txt' >> $HOME/.bash_logout
cleanup_command: 'userdel -fr art
'
T1134.005:
technique:
@@ -63808,6 +63829,27 @@ persistence:
'
cleanup_command: 'sed -i "s/# Atomic Red Team was here... T1546.004//" /etc/profile.d/bash_completion.sh
'
- name: Create/Append to .bash_logout
auto_generated_guid: 37ad2f24-7c53-4a50-92da-427a4ad13f58
description: "The Bash shell runs ~/.bash_logout \"if it exists\" to run commands
on user logout. An adversary may create or append to a .bash_logout to clear
history, start processes etc. Note the ~/.bash_logout is only run if you explicitly
exit or log out of an \"interactive login shell session\" i.e. via the console,
SSH, /bin/bash -l or su -l <username>. \n\nThis test creates the art user,
logs in, creates a .bash_logout which will echo some text into the art.txt
file on logout and logs out and the /home/art/art.txt is created.\n"
supported_platforms:
- linux
executor:
name: bash
elevation_required: true
command: |
useradd --create-home --shell /bin/bash art
su --login art
echo 'echo "Atomic Red Team was here... T1546.004" >> $HOME/art.txt' >> $HOME/.bash_logout
cleanup_command: 'userdel -fr art
'
T1547.002:
technique:
+42
View File
@@ -25294,6 +25294,27 @@ privilege-escalation:
'
cleanup_command: 'sed -i "s/# Atomic Red Team was here... T1546.004//" /etc/profile.d/bash_completion.sh
'
- name: Create/Append to .bash_logout
auto_generated_guid: 37ad2f24-7c53-4a50-92da-427a4ad13f58
description: "The Bash shell runs ~/.bash_logout \"if it exists\" to run commands
on user logout. An adversary may create or append to a .bash_logout to clear
history, start processes etc. Note the ~/.bash_logout is only run if you explicitly
exit or log out of an \"interactive login shell session\" i.e. via the console,
SSH, /bin/bash -l or su -l <username>. \n\nThis test creates the art user,
logs in, creates a .bash_logout which will echo some text into the art.txt
file on logout and logs out and the /home/art/art.txt is created.\n"
supported_platforms:
- linux
executor:
name: bash
elevation_required: true
command: |
useradd --create-home --shell /bin/bash art
su --login art
echo 'echo "Atomic Red Team was here... T1546.004" >> $HOME/art.txt' >> $HOME/.bash_logout
cleanup_command: 'userdel -fr art
'
T1134.005:
technique:
@@ -42150,6 +42171,27 @@ persistence:
'
cleanup_command: 'sed -i "s/# Atomic Red Team was here... T1546.004//" /etc/profile.d/bash_completion.sh
'
- name: Create/Append to .bash_logout
auto_generated_guid: 37ad2f24-7c53-4a50-92da-427a4ad13f58
description: "The Bash shell runs ~/.bash_logout \"if it exists\" to run commands
on user logout. An adversary may create or append to a .bash_logout to clear
history, start processes etc. Note the ~/.bash_logout is only run if you explicitly
exit or log out of an \"interactive login shell session\" i.e. via the console,
SSH, /bin/bash -l or su -l <username>. \n\nThis test creates the art user,
logs in, creates a .bash_logout which will echo some text into the art.txt
file on logout and logs out and the /home/art/art.txt is created.\n"
supported_platforms:
- linux
executor:
name: bash
elevation_required: true
command: |
useradd --create-home --shell /bin/bash art
su --login art
echo 'echo "Atomic Red Team was here... T1546.004" >> $HOME/art.txt' >> $HOME/.bash_logout
cleanup_command: 'userdel -fr art
'
T1547.002:
technique:
+38
View File
@@ -18,6 +18,8 @@ For macOS, the functionality of this technique is similar but may leverage zsh,
- [Atomic Test #5 - System shell profile scripts](#atomic-test-5---system-shell-profile-scripts)
- [Atomic Test #6 - Create/Append to .bash_logout](#atomic-test-6---createappend-to-bash_logout)
<br/>
@@ -205,4 +207,40 @@ sed -i "s/# Atomic Red Team was here... T1546.004//" /etc/profile.d/bash_complet
<br/>
<br/>
## Atomic Test #6 - Create/Append to .bash_logout
The Bash shell runs ~/.bash_logout "if it exists" to run commands on user logout. An adversary may create or append to a .bash_logout to clear history, start processes etc. Note the ~/.bash_logout is only run if you explicitly exit or log out of an "interactive login shell session" i.e. via the console, SSH, /bin/bash -l or su -l <username>.
This test creates the art user, logs in, creates a .bash_logout which will echo some text into the art.txt file on logout and logs out and the /home/art/art.txt is created.
**Supported Platforms:** Linux
**auto_generated_guid:** 37ad2f24-7c53-4a50-92da-427a4ad13f58
#### Attack Commands: Run with `bash`! Elevation Required (e.g. root or admin)
```bash
useradd --create-home --shell /bin/bash art
su --login art
echo 'echo "Atomic Red Team was here... T1546.004" >> $HOME/art.txt' >> $HOME/.bash_logout
```
#### Cleanup Commands:
```bash
userdel -fr art
```
<br/>