Merge branch 'master' into pr-fix-upn-confusion
This commit is contained in:
File diff suppressed because one or more lines are too long
File diff suppressed because one or more lines are too long
File diff suppressed because one or more lines are too long
@@ -453,8 +453,11 @@ defense-evasion,T1216,Signed Script Proxy Execution,1,SyncAppvPublishingServer S
|
||||
defense-evasion,T1216,Signed Script Proxy Execution,2,manage-bde.wsf Signed Script Command Execution,2a8f2d3c-3dec-4262-99dd-150cb2a4d63a,command_prompt
|
||||
defense-evasion,T1078.003,Valid Accounts: Local Accounts,1,Create local account with admin privileges,a524ce99-86de-4db6-b4f9-e08f35a47a15,command_prompt
|
||||
defense-evasion,T1078.003,Valid Accounts: Local Accounts,2,Create local account with admin privileges - MacOS,f1275566-1c26-4b66-83e3-7f9f7f964daa,bash
|
||||
defense-evasion,T1078.003,Valid Accounts: Local Accounts,3,WinPwn - Loot local Credentials - powerhell kittie,9e9fd066-453d-442f-88c1-ad7911d32912,powershell
|
||||
defense-evasion,T1078.003,Valid Accounts: Local Accounts,4,WinPwn - Loot local Credentials - Safetykatz,e9fdb899-a980-4ba4-934b-486ad22e22f4,powershell
|
||||
defense-evasion,T1078.003,Valid Accounts: Local Accounts,3,Create local account with admin privileges using sysadminctl utility - MacOS,191db57d-091a-47d5-99f3-97fde53de505,bash
|
||||
defense-evasion,T1078.003,Valid Accounts: Local Accounts,4,Enable root account using dsenableroot utility - MacOS,20b40ea9-0e17-4155-b8e6-244911a678ac,bash
|
||||
defense-evasion,T1078.003,Valid Accounts: Local Accounts,5,Add a new/existing user to the admin group using dseditgroup utility - macOS,433842ba-e796-4fd5-a14f-95d3a1970875,bash
|
||||
defense-evasion,T1078.003,Valid Accounts: Local Accounts,6,WinPwn - Loot local Credentials - powerhell kittie,9e9fd066-453d-442f-88c1-ad7911d32912,powershell
|
||||
defense-evasion,T1078.003,Valid Accounts: Local Accounts,7,WinPwn - Loot local Credentials - Safetykatz,e9fdb899-a980-4ba4-934b-486ad22e22f4,powershell
|
||||
defense-evasion,T1127,Trusted Developer Utilities Proxy Execution,1,Lolbin Jsc.exe compile javascript to exe,1ec1c269-d6bd-49e7-b71b-a461f7fa7bc8,command_prompt
|
||||
defense-evasion,T1127,Trusted Developer Utilities Proxy Execution,2,Lolbin Jsc.exe compile javascript to dll,3fc9fea2-871d-414d-8ef6-02e85e322b80,command_prompt
|
||||
defense-evasion,T1574.012,Hijack Execution Flow: COR_PROFILER,1,User scope COR_PROFILER,9d5f89dc-c3a5-4f8a-a4fc-a6ed02e7cb5a,powershell
|
||||
@@ -643,8 +646,11 @@ privilege-escalation,T1055.001,Process Injection: Dynamic-link Library Injection
|
||||
privilege-escalation,T1546.007,Event Triggered Execution: Netsh Helper DLL,1,Netsh Helper DLL Registration,3244697d-5a3a-4dfc-941c-550f69f91a4d,command_prompt
|
||||
privilege-escalation,T1078.003,Valid Accounts: Local Accounts,1,Create local account with admin privileges,a524ce99-86de-4db6-b4f9-e08f35a47a15,command_prompt
|
||||
privilege-escalation,T1078.003,Valid Accounts: Local Accounts,2,Create local account with admin privileges - MacOS,f1275566-1c26-4b66-83e3-7f9f7f964daa,bash
|
||||
privilege-escalation,T1078.003,Valid Accounts: Local Accounts,3,WinPwn - Loot local Credentials - powerhell kittie,9e9fd066-453d-442f-88c1-ad7911d32912,powershell
|
||||
privilege-escalation,T1078.003,Valid Accounts: Local Accounts,4,WinPwn - Loot local Credentials - Safetykatz,e9fdb899-a980-4ba4-934b-486ad22e22f4,powershell
|
||||
privilege-escalation,T1078.003,Valid Accounts: Local Accounts,3,Create local account with admin privileges using sysadminctl utility - MacOS,191db57d-091a-47d5-99f3-97fde53de505,bash
|
||||
privilege-escalation,T1078.003,Valid Accounts: Local Accounts,4,Enable root account using dsenableroot utility - MacOS,20b40ea9-0e17-4155-b8e6-244911a678ac,bash
|
||||
privilege-escalation,T1078.003,Valid Accounts: Local Accounts,5,Add a new/existing user to the admin group using dseditgroup utility - macOS,433842ba-e796-4fd5-a14f-95d3a1970875,bash
|
||||
privilege-escalation,T1078.003,Valid Accounts: Local Accounts,6,WinPwn - Loot local Credentials - powerhell kittie,9e9fd066-453d-442f-88c1-ad7911d32912,powershell
|
||||
privilege-escalation,T1078.003,Valid Accounts: Local Accounts,7,WinPwn - Loot local Credentials - Safetykatz,e9fdb899-a980-4ba4-934b-486ad22e22f4,powershell
|
||||
privilege-escalation,T1574.012,Hijack Execution Flow: COR_PROFILER,1,User scope COR_PROFILER,9d5f89dc-c3a5-4f8a-a4fc-a6ed02e7cb5a,powershell
|
||||
privilege-escalation,T1574.012,Hijack Execution Flow: COR_PROFILER,2,System Scope COR_PROFILER,f373b482-48c8-4ce4-85ed-d40c8b3f7310,powershell
|
||||
privilege-escalation,T1574.012,Hijack Execution Flow: COR_PROFILER,3,Registry-free process scope COR_PROFILER,79d57242-bbef-41db-b301-9d01d9f6e817,powershell
|
||||
@@ -735,6 +741,11 @@ execution,T1059.004,Command and Scripting Interpreter: Bash,8,Command line scrip
|
||||
execution,T1059.004,Command and Scripting Interpreter: Bash,9,Obfuscated command line scripts,5bec4cc8-f41e-437b-b417-33ff60acf9af,sh
|
||||
execution,T1059.004,Command and Scripting Interpreter: Bash,10,Change login shell,c7ac59cb-13cc-4622-81dc-6d2fee9bfac7,bash
|
||||
execution,T1059.004,Command and Scripting Interpreter: Bash,11,Environment variable scripts,bdaebd56-368b-4970-a523-f905ff4a8a51,bash
|
||||
execution,T1559,Inter-Process Communication,1,Cobalt Strike Artifact Kit pipe,bd13b9fc-b758-496a-b81a-397462f82c72,command_prompt
|
||||
execution,T1559,Inter-Process Communication,2,Cobalt Strike Lateral Movement (psexec_psh) pipe,830c8b6c-7a70-4f40-b975-8bbe74558acd,command_prompt
|
||||
execution,T1559,Inter-Process Communication,3,Cobalt Strike SSH (postex_ssh) pipe,d1f72fa0-5bc2-4b4b-bd1e-43b6e8cfb2e6,command_prompt
|
||||
execution,T1559,Inter-Process Communication,4,Cobalt Strike post-exploitation pipe (4.2 and later),7a48f482-246f-4aeb-9837-21c271ebf244,command_prompt
|
||||
execution,T1559,Inter-Process Communication,5,Cobalt Strike post-exploitation pipe (before 4.2),8dbfc15c-527b-4ab0-a272-019f469d367f,command_prompt
|
||||
execution,T1059.006,Command and Scripting Interpreter: Python,1,Execute shell script via python's command mode arguement,3a95cdb2-c6ea-4761-b24e-02b71889b8bb,sh
|
||||
execution,T1059.006,Command and Scripting Interpreter: Python,2,Execute Python via scripts (Linux),6c4d1dcb-33c7-4c36-a8df-c6cfd0408be8,sh
|
||||
execution,T1059.006,Command and Scripting Interpreter: Python,3,Execute Python via Python executables (Linux),0b44d79b-570a-4b27-a31f-3bf2156e5eaa,sh
|
||||
@@ -926,8 +937,11 @@ persistence,T1053.002,Scheduled Task/Job: At,2,At - Schedule a job,7266d898-ac82
|
||||
persistence,T1546.007,Event Triggered Execution: Netsh Helper DLL,1,Netsh Helper DLL Registration,3244697d-5a3a-4dfc-941c-550f69f91a4d,command_prompt
|
||||
persistence,T1078.003,Valid Accounts: Local Accounts,1,Create local account with admin privileges,a524ce99-86de-4db6-b4f9-e08f35a47a15,command_prompt
|
||||
persistence,T1078.003,Valid Accounts: Local Accounts,2,Create local account with admin privileges - MacOS,f1275566-1c26-4b66-83e3-7f9f7f964daa,bash
|
||||
persistence,T1078.003,Valid Accounts: Local Accounts,3,WinPwn - Loot local Credentials - powerhell kittie,9e9fd066-453d-442f-88c1-ad7911d32912,powershell
|
||||
persistence,T1078.003,Valid Accounts: Local Accounts,4,WinPwn - Loot local Credentials - Safetykatz,e9fdb899-a980-4ba4-934b-486ad22e22f4,powershell
|
||||
persistence,T1078.003,Valid Accounts: Local Accounts,3,Create local account with admin privileges using sysadminctl utility - MacOS,191db57d-091a-47d5-99f3-97fde53de505,bash
|
||||
persistence,T1078.003,Valid Accounts: Local Accounts,4,Enable root account using dsenableroot utility - MacOS,20b40ea9-0e17-4155-b8e6-244911a678ac,bash
|
||||
persistence,T1078.003,Valid Accounts: Local Accounts,5,Add a new/existing user to the admin group using dseditgroup utility - macOS,433842ba-e796-4fd5-a14f-95d3a1970875,bash
|
||||
persistence,T1078.003,Valid Accounts: Local Accounts,6,WinPwn - Loot local Credentials - powerhell kittie,9e9fd066-453d-442f-88c1-ad7911d32912,powershell
|
||||
persistence,T1078.003,Valid Accounts: Local Accounts,7,WinPwn - Loot local Credentials - Safetykatz,e9fdb899-a980-4ba4-934b-486ad22e22f4,powershell
|
||||
persistence,T1574.012,Hijack Execution Flow: COR_PROFILER,1,User scope COR_PROFILER,9d5f89dc-c3a5-4f8a-a4fc-a6ed02e7cb5a,powershell
|
||||
persistence,T1574.012,Hijack Execution Flow: COR_PROFILER,2,System Scope COR_PROFILER,f373b482-48c8-4ce4-85ed-d40c8b3f7310,powershell
|
||||
persistence,T1574.012,Hijack Execution Flow: COR_PROFILER,3,Registry-free process scope COR_PROFILER,79d57242-bbef-41db-b301-9d01d9f6e817,powershell
|
||||
@@ -1177,6 +1191,7 @@ discovery,T1033,System Owner/User Discovery,2,System Owner/User Discovery,2a9b67
|
||||
discovery,T1033,System Owner/User Discovery,3,Find computers where user has session - Stealth mode (PowerView),29857f27-a36f-4f7e-8084-4557cd6207ca,powershell
|
||||
discovery,T1033,System Owner/User Discovery,4,User Discovery With Env Vars PowerShell Script,dcb6cdee-1fb0-4087-8bf8-88cfd136ba51,powershell
|
||||
discovery,T1033,System Owner/User Discovery,5,GetCurrent User with PowerShell Script,1392bd0f-5d5a-429e-81d9-eb9d4d4d5b3b,powershell
|
||||
discovery,T1033,System Owner/User Discovery,6,System Discovery - SocGholish whoami,3d257a03-eb80-41c5-b744-bb37ac7f65c7,powershell
|
||||
discovery,T1613,Container and Resource Discovery,1,Container and ResourceDiscovery,8a895923-f99f-4668-acf2-6cc59a44f05e,sh
|
||||
discovery,T1615,Group Policy Discovery,1,Display group policy information via gpresult,0976990f-53b1-4d3f-a185-6df5be429d3b,command_prompt
|
||||
discovery,T1615,Group Policy Discovery,2,Get-DomainGPO to display group policy information via PowerView,4e524c4e-0e02-49aa-8df5-93f3f7959b9f,powershell
|
||||
@@ -1504,8 +1519,11 @@ initial-access,T1078.004,Valid Accounts: Cloud Accounts,1,Creating GCP Service A
|
||||
initial-access,T1078.004,Valid Accounts: Cloud Accounts,2,Azure Persistence Automation Runbook Created or Modified,348f4d14-4bd3-4f6b-bd8a-61237f78b3ac,powershell
|
||||
initial-access,T1078.003,Valid Accounts: Local Accounts,1,Create local account with admin privileges,a524ce99-86de-4db6-b4f9-e08f35a47a15,command_prompt
|
||||
initial-access,T1078.003,Valid Accounts: Local Accounts,2,Create local account with admin privileges - MacOS,f1275566-1c26-4b66-83e3-7f9f7f964daa,bash
|
||||
initial-access,T1078.003,Valid Accounts: Local Accounts,3,WinPwn - Loot local Credentials - powerhell kittie,9e9fd066-453d-442f-88c1-ad7911d32912,powershell
|
||||
initial-access,T1078.003,Valid Accounts: Local Accounts,4,WinPwn - Loot local Credentials - Safetykatz,e9fdb899-a980-4ba4-934b-486ad22e22f4,powershell
|
||||
initial-access,T1078.003,Valid Accounts: Local Accounts,3,Create local account with admin privileges using sysadminctl utility - MacOS,191db57d-091a-47d5-99f3-97fde53de505,bash
|
||||
initial-access,T1078.003,Valid Accounts: Local Accounts,4,Enable root account using dsenableroot utility - MacOS,20b40ea9-0e17-4155-b8e6-244911a678ac,bash
|
||||
initial-access,T1078.003,Valid Accounts: Local Accounts,5,Add a new/existing user to the admin group using dseditgroup utility - macOS,433842ba-e796-4fd5-a14f-95d3a1970875,bash
|
||||
initial-access,T1078.003,Valid Accounts: Local Accounts,6,WinPwn - Loot local Credentials - powerhell kittie,9e9fd066-453d-442f-88c1-ad7911d32912,powershell
|
||||
initial-access,T1078.003,Valid Accounts: Local Accounts,7,WinPwn - Loot local Credentials - Safetykatz,e9fdb899-a980-4ba4-934b-486ad22e22f4,powershell
|
||||
exfiltration,T1020,Automated Exfiltration,1,IcedID Botnet HTTP PUT,9c780d3d-3a14-4278-8ee5-faaeb2ccfbe0,powershell
|
||||
exfiltration,T1048.002,Exfiltration Over Alternative Protocol - Exfiltration Over Asymmetric Encrypted Non-C2 Protocol,1,Exfiltrate data HTTPS using curl windows,1cdf2fb0-51b6-4fd8-96af-77020d5f1bf0,command_prompt
|
||||
exfiltration,T1048.002,Exfiltration Over Alternative Protocol - Exfiltration Over Asymmetric Encrypted Non-C2 Protocol,2,Exfiltrate data HTTPS using curl linux,4a4f31e2-46ea-4c26-ad89-f09ad1d5fe01,bash
|
||||
|
||||
|
@@ -64,6 +64,9 @@ defense-evasion,T1564.001,Hide Artifacts: Hidden Files and Directories,5,Hidden
|
||||
defense-evasion,T1564.001,Hide Artifacts: Hidden Files and Directories,6,Hide a Directory,b115ecaf-3b24-4ed2-aefe-2fcb9db913d3,sh
|
||||
defense-evasion,T1564.001,Hide Artifacts: Hidden Files and Directories,7,Show all hidden files,9a1ec7da-b892-449f-ad68-67066d04380c,sh
|
||||
defense-evasion,T1078.003,Valid Accounts: Local Accounts,2,Create local account with admin privileges - MacOS,f1275566-1c26-4b66-83e3-7f9f7f964daa,bash
|
||||
defense-evasion,T1078.003,Valid Accounts: Local Accounts,3,Create local account with admin privileges using sysadminctl utility - MacOS,191db57d-091a-47d5-99f3-97fde53de505,bash
|
||||
defense-evasion,T1078.003,Valid Accounts: Local Accounts,4,Enable root account using dsenableroot utility - MacOS,20b40ea9-0e17-4155-b8e6-244911a678ac,bash
|
||||
defense-evasion,T1078.003,Valid Accounts: Local Accounts,5,Add a new/existing user to the admin group using dseditgroup utility - macOS,433842ba-e796-4fd5-a14f-95d3a1970875,bash
|
||||
collection,T1560.001,Archive Collected Data: Archive via Utility,5,Data Compressed - nix - zip,c51cec55-28dd-4ad2-9461-1eacbc82c3a0,sh
|
||||
collection,T1560.001,Archive Collected Data: Archive via Utility,6,Data Compressed - nix - gzip Single File,cde3c2af-3485-49eb-9c1f-0ed60e9cc0af,sh
|
||||
collection,T1560.001,Archive Collected Data: Archive via Utility,7,Data Compressed - nix - tar Folder or File,7af2b51e-ad1c-498c-aca8-d3290c19535a,sh
|
||||
@@ -102,6 +105,9 @@ persistence,T1547.007,Boot or Logon Autostart Execution: Re-opened Applications,
|
||||
persistence,T1547.007,Boot or Logon Autostart Execution: Re-opened Applications,2,Re-Opened Applications using LoginHook,5f5b71da-e03f-42e7-ac98-d63f9e0465cb,sh
|
||||
persistence,T1547.007,Boot or Logon Autostart Execution: Re-opened Applications,3,Append to existing loginwindow for Re-Opened Applications,766b6c3c-9353-4033-8b7e-38b309fa3a93,sh
|
||||
persistence,T1078.003,Valid Accounts: Local Accounts,2,Create local account with admin privileges - MacOS,f1275566-1c26-4b66-83e3-7f9f7f964daa,bash
|
||||
persistence,T1078.003,Valid Accounts: Local Accounts,3,Create local account with admin privileges using sysadminctl utility - MacOS,191db57d-091a-47d5-99f3-97fde53de505,bash
|
||||
persistence,T1078.003,Valid Accounts: Local Accounts,4,Enable root account using dsenableroot utility - MacOS,20b40ea9-0e17-4155-b8e6-244911a678ac,bash
|
||||
persistence,T1078.003,Valid Accounts: Local Accounts,5,Add a new/existing user to the admin group using dseditgroup utility - macOS,433842ba-e796-4fd5-a14f-95d3a1970875,bash
|
||||
privilege-escalation,T1548.003,Abuse Elevation Control Mechanism: Sudo and Sudo Caching,1,Sudo usage,150c3a08-ee6e-48a6-aeaf-3659d24ceb4e,sh
|
||||
privilege-escalation,T1548.003,Abuse Elevation Control Mechanism: Sudo and Sudo Caching,2,Unlimited sudo cache timeout,a7b17659-dd5e-46f7-b7d1-e6792c91d0bc,sh
|
||||
privilege-escalation,T1548.003,Abuse Elevation Control Mechanism: Sudo and Sudo Caching,3,Disable tty_tickets for sudo caching,91a60b03-fb75-4d24-a42e-2eb8956e8de1,sh
|
||||
@@ -129,6 +135,9 @@ privilege-escalation,T1547.007,Boot or Logon Autostart Execution: Re-opened Appl
|
||||
privilege-escalation,T1547.007,Boot or Logon Autostart Execution: Re-opened Applications,2,Re-Opened Applications using LoginHook,5f5b71da-e03f-42e7-ac98-d63f9e0465cb,sh
|
||||
privilege-escalation,T1547.007,Boot or Logon Autostart Execution: Re-opened Applications,3,Append to existing loginwindow for Re-Opened Applications,766b6c3c-9353-4033-8b7e-38b309fa3a93,sh
|
||||
privilege-escalation,T1078.003,Valid Accounts: Local Accounts,2,Create local account with admin privileges - MacOS,f1275566-1c26-4b66-83e3-7f9f7f964daa,bash
|
||||
privilege-escalation,T1078.003,Valid Accounts: Local Accounts,3,Create local account with admin privileges using sysadminctl utility - MacOS,191db57d-091a-47d5-99f3-97fde53de505,bash
|
||||
privilege-escalation,T1078.003,Valid Accounts: Local Accounts,4,Enable root account using dsenableroot utility - MacOS,20b40ea9-0e17-4155-b8e6-244911a678ac,bash
|
||||
privilege-escalation,T1078.003,Valid Accounts: Local Accounts,5,Add a new/existing user to the admin group using dseditgroup utility - macOS,433842ba-e796-4fd5-a14f-95d3a1970875,bash
|
||||
credential-access,T1056.001,Input Capture: Keylogging,7,MacOS Swift Keylogger,aee3a097-4c5c-4fff-bbd3-0a705867ae29,bash
|
||||
credential-access,T1555.001,Credentials from Password Stores: Keychain,1,Keychain,1864fdec-ff86-4452-8c30-f12507582a93,sh
|
||||
credential-access,T1040,Network Sniffing,2,Packet Capture macOS using tcpdump or tshark,9d04efee-eff5-4240-b8d2-07792b873608,bash
|
||||
@@ -204,6 +213,9 @@ execution,T1569.001,System Services: Launchctl,1,Launchctl,6fb61988-724e-4755-a5
|
||||
execution,T1059.004,Command and Scripting Interpreter: Bash,1,Create and Execute Bash Shell Script,7e7ac3ed-f795-4fa5-b711-09d6fbe9b873,sh
|
||||
execution,T1059.004,Command and Scripting Interpreter: Bash,2,Command-Line Interface,d0c88567-803d-4dca-99b4-7ce65e7b257c,sh
|
||||
initial-access,T1078.003,Valid Accounts: Local Accounts,2,Create local account with admin privileges - MacOS,f1275566-1c26-4b66-83e3-7f9f7f964daa,bash
|
||||
initial-access,T1078.003,Valid Accounts: Local Accounts,3,Create local account with admin privileges using sysadminctl utility - MacOS,191db57d-091a-47d5-99f3-97fde53de505,bash
|
||||
initial-access,T1078.003,Valid Accounts: Local Accounts,4,Enable root account using dsenableroot utility - MacOS,20b40ea9-0e17-4155-b8e6-244911a678ac,bash
|
||||
initial-access,T1078.003,Valid Accounts: Local Accounts,5,Add a new/existing user to the admin group using dseditgroup utility - macOS,433842ba-e796-4fd5-a14f-95d3a1970875,bash
|
||||
exfiltration,T1048.002,Exfiltration Over Alternative Protocol - Exfiltration Over Asymmetric Encrypted Non-C2 Protocol,2,Exfiltrate data HTTPS using curl linux,4a4f31e2-46ea-4c26-ad89-f09ad1d5fe01,bash
|
||||
exfiltration,T1048,Exfiltration Over Alternative Protocol,1,Exfiltration Over Alternative Protocol - SSH,f6786cc8-beda-4915-a4d6-ac2f193bb988,sh
|
||||
exfiltration,T1048,Exfiltration Over Alternative Protocol,2,Exfiltration Over Alternative Protocol - SSH,7c3cb337-35ae-4d06-bf03-3032ed2ec268,sh
|
||||
|
||||
|
@@ -330,8 +330,8 @@ defense-evasion,T1055.001,Process Injection: Dynamic-link Library Injection,2,Wi
|
||||
defense-evasion,T1216,Signed Script Proxy Execution,1,SyncAppvPublishingServer Signed Script PowerShell Command Execution,275d963d-3f36-476c-8bef-a2a3960ee6eb,command_prompt
|
||||
defense-evasion,T1216,Signed Script Proxy Execution,2,manage-bde.wsf Signed Script Command Execution,2a8f2d3c-3dec-4262-99dd-150cb2a4d63a,command_prompt
|
||||
defense-evasion,T1078.003,Valid Accounts: Local Accounts,1,Create local account with admin privileges,a524ce99-86de-4db6-b4f9-e08f35a47a15,command_prompt
|
||||
defense-evasion,T1078.003,Valid Accounts: Local Accounts,3,WinPwn - Loot local Credentials - powerhell kittie,9e9fd066-453d-442f-88c1-ad7911d32912,powershell
|
||||
defense-evasion,T1078.003,Valid Accounts: Local Accounts,4,WinPwn - Loot local Credentials - Safetykatz,e9fdb899-a980-4ba4-934b-486ad22e22f4,powershell
|
||||
defense-evasion,T1078.003,Valid Accounts: Local Accounts,6,WinPwn - Loot local Credentials - powerhell kittie,9e9fd066-453d-442f-88c1-ad7911d32912,powershell
|
||||
defense-evasion,T1078.003,Valid Accounts: Local Accounts,7,WinPwn - Loot local Credentials - Safetykatz,e9fdb899-a980-4ba4-934b-486ad22e22f4,powershell
|
||||
defense-evasion,T1127,Trusted Developer Utilities Proxy Execution,1,Lolbin Jsc.exe compile javascript to exe,1ec1c269-d6bd-49e7-b71b-a461f7fa7bc8,command_prompt
|
||||
defense-evasion,T1127,Trusted Developer Utilities Proxy Execution,2,Lolbin Jsc.exe compile javascript to dll,3fc9fea2-871d-414d-8ef6-02e85e322b80,command_prompt
|
||||
defense-evasion,T1574.012,Hijack Execution Flow: COR_PROFILER,1,User scope COR_PROFILER,9d5f89dc-c3a5-4f8a-a4fc-a6ed02e7cb5a,powershell
|
||||
@@ -466,8 +466,8 @@ privilege-escalation,T1055.001,Process Injection: Dynamic-link Library Injection
|
||||
privilege-escalation,T1055.001,Process Injection: Dynamic-link Library Injection,2,WinPwn - Get SYSTEM shell - Bind System Shell using UsoClient DLL load technique,8b56f787-73d9-4f1d-87e8-d07e89cbc7f5,powershell
|
||||
privilege-escalation,T1546.007,Event Triggered Execution: Netsh Helper DLL,1,Netsh Helper DLL Registration,3244697d-5a3a-4dfc-941c-550f69f91a4d,command_prompt
|
||||
privilege-escalation,T1078.003,Valid Accounts: Local Accounts,1,Create local account with admin privileges,a524ce99-86de-4db6-b4f9-e08f35a47a15,command_prompt
|
||||
privilege-escalation,T1078.003,Valid Accounts: Local Accounts,3,WinPwn - Loot local Credentials - powerhell kittie,9e9fd066-453d-442f-88c1-ad7911d32912,powershell
|
||||
privilege-escalation,T1078.003,Valid Accounts: Local Accounts,4,WinPwn - Loot local Credentials - Safetykatz,e9fdb899-a980-4ba4-934b-486ad22e22f4,powershell
|
||||
privilege-escalation,T1078.003,Valid Accounts: Local Accounts,6,WinPwn - Loot local Credentials - powerhell kittie,9e9fd066-453d-442f-88c1-ad7911d32912,powershell
|
||||
privilege-escalation,T1078.003,Valid Accounts: Local Accounts,7,WinPwn - Loot local Credentials - Safetykatz,e9fdb899-a980-4ba4-934b-486ad22e22f4,powershell
|
||||
privilege-escalation,T1574.012,Hijack Execution Flow: COR_PROFILER,1,User scope COR_PROFILER,9d5f89dc-c3a5-4f8a-a4fc-a6ed02e7cb5a,powershell
|
||||
privilege-escalation,T1574.012,Hijack Execution Flow: COR_PROFILER,2,System Scope COR_PROFILER,f373b482-48c8-4ce4-85ed-d40c8b3f7310,powershell
|
||||
privilege-escalation,T1574.012,Hijack Execution Flow: COR_PROFILER,3,Registry-free process scope COR_PROFILER,79d57242-bbef-41db-b301-9d01d9f6e817,powershell
|
||||
@@ -534,6 +534,11 @@ execution,T1059.001,Command and Scripting Interpreter: PowerShell,19,PowerShell
|
||||
execution,T1059.001,Command and Scripting Interpreter: PowerShell,20,PowerShell Invoke Known Malicious Cmdlets,49eb9404-5e0f-4031-a179-b40f7be385e3,powershell
|
||||
execution,T1059.001,Command and Scripting Interpreter: PowerShell,21,PowerUp Invoke-AllChecks,1289f78d-22d2-4590-ac76-166737e1811b,powershell
|
||||
execution,T1059.001,Command and Scripting Interpreter: PowerShell,22,Abuse Nslookup with DNS Records,999bff6d-dc15-44c9-9f5c-e1051bfc86e1,powershell
|
||||
execution,T1559,Inter-Process Communication,1,Cobalt Strike Artifact Kit pipe,bd13b9fc-b758-496a-b81a-397462f82c72,command_prompt
|
||||
execution,T1559,Inter-Process Communication,2,Cobalt Strike Lateral Movement (psexec_psh) pipe,830c8b6c-7a70-4f40-b975-8bbe74558acd,command_prompt
|
||||
execution,T1559,Inter-Process Communication,3,Cobalt Strike SSH (postex_ssh) pipe,d1f72fa0-5bc2-4b4b-bd1e-43b6e8cfb2e6,command_prompt
|
||||
execution,T1559,Inter-Process Communication,4,Cobalt Strike post-exploitation pipe (4.2 and later),7a48f482-246f-4aeb-9837-21c271ebf244,command_prompt
|
||||
execution,T1559,Inter-Process Communication,5,Cobalt Strike post-exploitation pipe (before 4.2),8dbfc15c-527b-4ab0-a272-019f469d367f,command_prompt
|
||||
execution,T1059.003,Command and Scripting Interpreter: Windows Command Shell,1,Create and Execute Batch Script,9e8894c0-50bd-4525-a96c-d4ac78ece388,powershell
|
||||
execution,T1059.003,Command and Scripting Interpreter: Windows Command Shell,2,Writes text to a file and displays it.,127b4afe-2346-4192-815c-69042bec570e,command_prompt
|
||||
execution,T1059.003,Command and Scripting Interpreter: Windows Command Shell,3,Suspicious Execution via Windows Command Shell,d0eb3597-a1b3-4d65-b33b-2cda8d397f20,command_prompt
|
||||
@@ -660,8 +665,8 @@ persistence,T1547.008,Boot or Logon Autostart Execution: LSASS Driver,1,Modify R
|
||||
persistence,T1053.002,Scheduled Task/Job: At,1,At.exe Scheduled task,4a6c0dc4-0f2a-4203-9298-a5a9bdc21ed8,command_prompt
|
||||
persistence,T1546.007,Event Triggered Execution: Netsh Helper DLL,1,Netsh Helper DLL Registration,3244697d-5a3a-4dfc-941c-550f69f91a4d,command_prompt
|
||||
persistence,T1078.003,Valid Accounts: Local Accounts,1,Create local account with admin privileges,a524ce99-86de-4db6-b4f9-e08f35a47a15,command_prompt
|
||||
persistence,T1078.003,Valid Accounts: Local Accounts,3,WinPwn - Loot local Credentials - powerhell kittie,9e9fd066-453d-442f-88c1-ad7911d32912,powershell
|
||||
persistence,T1078.003,Valid Accounts: Local Accounts,4,WinPwn - Loot local Credentials - Safetykatz,e9fdb899-a980-4ba4-934b-486ad22e22f4,powershell
|
||||
persistence,T1078.003,Valid Accounts: Local Accounts,6,WinPwn - Loot local Credentials - powerhell kittie,9e9fd066-453d-442f-88c1-ad7911d32912,powershell
|
||||
persistence,T1078.003,Valid Accounts: Local Accounts,7,WinPwn - Loot local Credentials - Safetykatz,e9fdb899-a980-4ba4-934b-486ad22e22f4,powershell
|
||||
persistence,T1574.012,Hijack Execution Flow: COR_PROFILER,1,User scope COR_PROFILER,9d5f89dc-c3a5-4f8a-a4fc-a6ed02e7cb5a,powershell
|
||||
persistence,T1574.012,Hijack Execution Flow: COR_PROFILER,2,System Scope COR_PROFILER,f373b482-48c8-4ce4-85ed-d40c8b3f7310,powershell
|
||||
persistence,T1574.012,Hijack Execution Flow: COR_PROFILER,3,Registry-free process scope COR_PROFILER,79d57242-bbef-41db-b301-9d01d9f6e817,powershell
|
||||
@@ -831,6 +836,7 @@ discovery,T1033,System Owner/User Discovery,1,System Owner/User Discovery,4c4959
|
||||
discovery,T1033,System Owner/User Discovery,3,Find computers where user has session - Stealth mode (PowerView),29857f27-a36f-4f7e-8084-4557cd6207ca,powershell
|
||||
discovery,T1033,System Owner/User Discovery,4,User Discovery With Env Vars PowerShell Script,dcb6cdee-1fb0-4087-8bf8-88cfd136ba51,powershell
|
||||
discovery,T1033,System Owner/User Discovery,5,GetCurrent User with PowerShell Script,1392bd0f-5d5a-429e-81d9-eb9d4d4d5b3b,powershell
|
||||
discovery,T1033,System Owner/User Discovery,6,System Discovery - SocGholish whoami,3d257a03-eb80-41c5-b744-bb37ac7f65c7,powershell
|
||||
discovery,T1615,Group Policy Discovery,1,Display group policy information via gpresult,0976990f-53b1-4d3f-a185-6df5be429d3b,command_prompt
|
||||
discovery,T1615,Group Policy Discovery,2,Get-DomainGPO to display group policy information via PowerView,4e524c4e-0e02-49aa-8df5-93f3f7959b9f,powershell
|
||||
discovery,T1615,Group Policy Discovery,3,WinPwn - GPOAudit,bc25c04b-841e-4965-855f-d1f645d7ab73,powershell
|
||||
@@ -1061,8 +1067,8 @@ initial-access,T1195,Supply Chain Compromise,1,Octopus Scanner Malware Open Sour
|
||||
initial-access,T1078.001,Valid Accounts: Default Accounts,1,Enable Guest account with RDP capability and admin privileges,99747561-ed8d-47f2-9c91-1e5fde1ed6e0,command_prompt
|
||||
initial-access,T1078.001,Valid Accounts: Default Accounts,2,Activate Guest Account,aa6cb8c4-b582-4f8e-b677-37733914abda,command_prompt
|
||||
initial-access,T1078.003,Valid Accounts: Local Accounts,1,Create local account with admin privileges,a524ce99-86de-4db6-b4f9-e08f35a47a15,command_prompt
|
||||
initial-access,T1078.003,Valid Accounts: Local Accounts,3,WinPwn - Loot local Credentials - powerhell kittie,9e9fd066-453d-442f-88c1-ad7911d32912,powershell
|
||||
initial-access,T1078.003,Valid Accounts: Local Accounts,4,WinPwn - Loot local Credentials - Safetykatz,e9fdb899-a980-4ba4-934b-486ad22e22f4,powershell
|
||||
initial-access,T1078.003,Valid Accounts: Local Accounts,6,WinPwn - Loot local Credentials - powerhell kittie,9e9fd066-453d-442f-88c1-ad7911d32912,powershell
|
||||
initial-access,T1078.003,Valid Accounts: Local Accounts,7,WinPwn - Loot local Credentials - Safetykatz,e9fdb899-a980-4ba4-934b-486ad22e22f4,powershell
|
||||
exfiltration,T1020,Automated Exfiltration,1,IcedID Botnet HTTP PUT,9c780d3d-3a14-4278-8ee5-faaeb2ccfbe0,powershell
|
||||
exfiltration,T1048.002,Exfiltration Over Alternative Protocol - Exfiltration Over Asymmetric Encrypted Non-C2 Protocol,1,Exfiltrate data HTTPS using curl windows,1cdf2fb0-51b6-4fd8-96af-77020d5f1bf0,command_prompt
|
||||
exfiltration,T1041,Exfiltration Over C2 Channel,1,C2 Data Exfiltration,d1253f6e-c29b-49dc-b466-2147a6191932,powershell
|
||||
|
||||
|
@@ -665,8 +665,11 @@
|
||||
- [T1078.003 Valid Accounts: Local Accounts](../../T1078.003/T1078.003.md)
|
||||
- Atomic Test #1: Create local account with admin privileges [windows]
|
||||
- Atomic Test #2: Create local account with admin privileges - MacOS [macos]
|
||||
- Atomic Test #3: WinPwn - Loot local Credentials - powerhell kittie [windows]
|
||||
- Atomic Test #4: WinPwn - Loot local Credentials - Safetykatz [windows]
|
||||
- Atomic Test #3: Create local account with admin privileges using sysadminctl utility - MacOS [macos]
|
||||
- Atomic Test #4: Enable root account using dsenableroot utility - MacOS [macos]
|
||||
- Atomic Test #5: Add a new/existing user to the admin group using dseditgroup utility - macOS [macos]
|
||||
- Atomic Test #6: WinPwn - Loot local Credentials - powerhell kittie [windows]
|
||||
- Atomic Test #7: WinPwn - Loot local Credentials - Safetykatz [windows]
|
||||
- T1211 Exploitation for Defense Evasion [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
|
||||
- [T1127 Trusted Developer Utilities Proxy Execution](../../T1127/T1127.md)
|
||||
- Atomic Test #1: Lolbin Jsc.exe compile javascript to exe [windows]
|
||||
@@ -986,8 +989,11 @@
|
||||
- [T1078.003 Valid Accounts: Local Accounts](../../T1078.003/T1078.003.md)
|
||||
- Atomic Test #1: Create local account with admin privileges [windows]
|
||||
- Atomic Test #2: Create local account with admin privileges - MacOS [macos]
|
||||
- Atomic Test #3: WinPwn - Loot local Credentials - powerhell kittie [windows]
|
||||
- Atomic Test #4: WinPwn - Loot local Credentials - Safetykatz [windows]
|
||||
- Atomic Test #3: Create local account with admin privileges using sysadminctl utility - MacOS [macos]
|
||||
- Atomic Test #4: Enable root account using dsenableroot utility - MacOS [macos]
|
||||
- Atomic Test #5: Add a new/existing user to the admin group using dseditgroup utility - macOS [macos]
|
||||
- Atomic Test #6: WinPwn - Loot local Credentials - powerhell kittie [windows]
|
||||
- Atomic Test #7: WinPwn - Loot local Credentials - Safetykatz [windows]
|
||||
- [T1574.012 Hijack Execution Flow: COR_PROFILER](../../T1574.012/T1574.012.md)
|
||||
- Atomic Test #1: User scope COR_PROFILER [windows]
|
||||
- Atomic Test #2: System Scope COR_PROFILER [windows]
|
||||
@@ -1119,7 +1125,12 @@
|
||||
- Atomic Test #9: Obfuscated command line scripts [linux]
|
||||
- Atomic Test #10: Change login shell [linux]
|
||||
- Atomic Test #11: Environment variable scripts [linux]
|
||||
- T1559 Inter-Process Communication [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
|
||||
- [T1559 Inter-Process Communication](../../T1559/T1559.md)
|
||||
- Atomic Test #1: Cobalt Strike Artifact Kit pipe [windows]
|
||||
- Atomic Test #2: Cobalt Strike Lateral Movement (psexec_psh) pipe [windows]
|
||||
- Atomic Test #3: Cobalt Strike SSH (postex_ssh) pipe [windows]
|
||||
- Atomic Test #4: Cobalt Strike post-exploitation pipe (4.2 and later) [windows]
|
||||
- Atomic Test #5: Cobalt Strike post-exploitation pipe (before 4.2) [windows]
|
||||
- T1204.003 Malicious Image [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
|
||||
- T1154 Trap [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
|
||||
- T1203 Exploitation for Client Execution [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
|
||||
@@ -1492,8 +1503,11 @@
|
||||
- [T1078.003 Valid Accounts: Local Accounts](../../T1078.003/T1078.003.md)
|
||||
- Atomic Test #1: Create local account with admin privileges [windows]
|
||||
- Atomic Test #2: Create local account with admin privileges - MacOS [macos]
|
||||
- Atomic Test #3: WinPwn - Loot local Credentials - powerhell kittie [windows]
|
||||
- Atomic Test #4: WinPwn - Loot local Credentials - Safetykatz [windows]
|
||||
- Atomic Test #3: Create local account with admin privileges using sysadminctl utility - MacOS [macos]
|
||||
- Atomic Test #4: Enable root account using dsenableroot utility - MacOS [macos]
|
||||
- Atomic Test #5: Add a new/existing user to the admin group using dseditgroup utility - macOS [macos]
|
||||
- Atomic Test #6: WinPwn - Loot local Credentials - powerhell kittie [windows]
|
||||
- Atomic Test #7: WinPwn - Loot local Credentials - Safetykatz [windows]
|
||||
- [T1574.012 Hijack Execution Flow: COR_PROFILER](../../T1574.012/T1574.012.md)
|
||||
- Atomic Test #1: User scope COR_PROFILER [windows]
|
||||
- Atomic Test #2: System Scope COR_PROFILER [windows]
|
||||
@@ -1893,6 +1907,7 @@
|
||||
- Atomic Test #3: Find computers where user has session - Stealth mode (PowerView) [windows]
|
||||
- Atomic Test #4: User Discovery With Env Vars PowerShell Script [windows]
|
||||
- Atomic Test #5: GetCurrent User with PowerShell Script [windows]
|
||||
- Atomic Test #6: System Discovery - SocGholish whoami [windows]
|
||||
- [T1613 Container and Resource Discovery](../../T1613/T1613.md)
|
||||
- Atomic Test #1: Container and ResourceDiscovery [containers]
|
||||
- T1016.001 Internet Connection Discovery [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
|
||||
@@ -2454,8 +2469,11 @@
|
||||
- [T1078.003 Valid Accounts: Local Accounts](../../T1078.003/T1078.003.md)
|
||||
- Atomic Test #1: Create local account with admin privileges [windows]
|
||||
- Atomic Test #2: Create local account with admin privileges - MacOS [macos]
|
||||
- Atomic Test #3: WinPwn - Loot local Credentials - powerhell kittie [windows]
|
||||
- Atomic Test #4: WinPwn - Loot local Credentials - Safetykatz [windows]
|
||||
- Atomic Test #3: Create local account with admin privileges using sysadminctl utility - MacOS [macos]
|
||||
- Atomic Test #4: Enable root account using dsenableroot utility - MacOS [macos]
|
||||
- Atomic Test #5: Add a new/existing user to the admin group using dseditgroup utility - macOS [macos]
|
||||
- Atomic Test #6: WinPwn - Loot local Credentials - powerhell kittie [windows]
|
||||
- Atomic Test #7: WinPwn - Loot local Credentials - Safetykatz [windows]
|
||||
|
||||
# exfiltration
|
||||
- T1567 Exfiltration Over Web Service [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
|
||||
|
||||
@@ -157,6 +157,9 @@
|
||||
- T1574.004 Dylib Hijacking [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
|
||||
- [T1078.003 Valid Accounts: Local Accounts](../../T1078.003/T1078.003.md)
|
||||
- Atomic Test #2: Create local account with admin privileges - MacOS [macos]
|
||||
- Atomic Test #3: Create local account with admin privileges using sysadminctl utility - MacOS [macos]
|
||||
- Atomic Test #4: Enable root account using dsenableroot utility - MacOS [macos]
|
||||
- Atomic Test #5: Add a new/existing user to the admin group using dseditgroup utility - macOS [macos]
|
||||
- T1211 Exploitation for Defense Evasion [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
|
||||
|
||||
# collection
|
||||
@@ -303,6 +306,9 @@
|
||||
- T1574.004 Dylib Hijacking [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
|
||||
- [T1078.003 Valid Accounts: Local Accounts](../../T1078.003/T1078.003.md)
|
||||
- Atomic Test #2: Create local account with admin privileges - MacOS [macos]
|
||||
- Atomic Test #3: Create local account with admin privileges using sysadminctl utility - MacOS [macos]
|
||||
- Atomic Test #4: Enable root account using dsenableroot utility - MacOS [macos]
|
||||
- Atomic Test #5: Add a new/existing user to the admin group using dseditgroup utility - macOS [macos]
|
||||
|
||||
# privilege-escalation
|
||||
- T1037 Boot or Logon Initialization Scripts [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
|
||||
@@ -377,6 +383,9 @@
|
||||
- T1574.004 Dylib Hijacking [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
|
||||
- [T1078.003 Valid Accounts: Local Accounts](../../T1078.003/T1078.003.md)
|
||||
- Atomic Test #2: Create local account with admin privileges - MacOS [macos]
|
||||
- Atomic Test #3: Create local account with admin privileges using sysadminctl utility - MacOS [macos]
|
||||
- Atomic Test #4: Enable root account using dsenableroot utility - MacOS [macos]
|
||||
- Atomic Test #5: Add a new/existing user to the admin group using dseditgroup utility - macOS [macos]
|
||||
|
||||
# credential-access
|
||||
- T1557 Adversary-in-the-Middle [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
|
||||
@@ -662,6 +671,9 @@
|
||||
- T1566.003 Spearphishing via Service [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
|
||||
- [T1078.003 Valid Accounts: Local Accounts](../../T1078.003/T1078.003.md)
|
||||
- Atomic Test #2: Create local account with admin privileges - MacOS [macos]
|
||||
- Atomic Test #3: Create local account with admin privileges using sysadminctl utility - MacOS [macos]
|
||||
- Atomic Test #4: Enable root account using dsenableroot utility - MacOS [macos]
|
||||
- Atomic Test #5: Add a new/existing user to the admin group using dseditgroup utility - macOS [macos]
|
||||
|
||||
# exfiltration
|
||||
- T1567 Exfiltration Over Web Service [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
|
||||
|
||||
@@ -492,8 +492,8 @@
|
||||
- T1118 InstallUtil [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
|
||||
- [T1078.003 Valid Accounts: Local Accounts](../../T1078.003/T1078.003.md)
|
||||
- Atomic Test #1: Create local account with admin privileges [windows]
|
||||
- Atomic Test #3: WinPwn - Loot local Credentials - powerhell kittie [windows]
|
||||
- Atomic Test #4: WinPwn - Loot local Credentials - Safetykatz [windows]
|
||||
- Atomic Test #6: WinPwn - Loot local Credentials - powerhell kittie [windows]
|
||||
- Atomic Test #7: WinPwn - Loot local Credentials - Safetykatz [windows]
|
||||
- T1211 Exploitation for Defense Evasion [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
|
||||
- [T1127 Trusted Developer Utilities Proxy Execution](../../T1127/T1127.md)
|
||||
- Atomic Test #1: Lolbin Jsc.exe compile javascript to exe [windows]
|
||||
@@ -721,8 +721,8 @@
|
||||
- Atomic Test #1: Netsh Helper DLL Registration [windows]
|
||||
- [T1078.003 Valid Accounts: Local Accounts](../../T1078.003/T1078.003.md)
|
||||
- Atomic Test #1: Create local account with admin privileges [windows]
|
||||
- Atomic Test #3: WinPwn - Loot local Credentials - powerhell kittie [windows]
|
||||
- Atomic Test #4: WinPwn - Loot local Credentials - Safetykatz [windows]
|
||||
- Atomic Test #6: WinPwn - Loot local Credentials - powerhell kittie [windows]
|
||||
- Atomic Test #7: WinPwn - Loot local Credentials - Safetykatz [windows]
|
||||
- [T1574.012 Hijack Execution Flow: COR_PROFILER](../../T1574.012/T1574.012.md)
|
||||
- Atomic Test #1: User scope COR_PROFILER [windows]
|
||||
- Atomic Test #2: System Scope COR_PROFILER [windows]
|
||||
@@ -815,7 +815,12 @@
|
||||
- Atomic Test #22: Abuse Nslookup with DNS Records [windows]
|
||||
- T1170 Mshta [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
|
||||
- T1061 Graphical User Interface [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
|
||||
- T1559 Inter-Process Communication [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
|
||||
- [T1559 Inter-Process Communication](../../T1559/T1559.md)
|
||||
- Atomic Test #1: Cobalt Strike Artifact Kit pipe [windows]
|
||||
- Atomic Test #2: Cobalt Strike Lateral Movement (psexec_psh) pipe [windows]
|
||||
- Atomic Test #3: Cobalt Strike SSH (postex_ssh) pipe [windows]
|
||||
- Atomic Test #4: Cobalt Strike post-exploitation pipe (4.2 and later) [windows]
|
||||
- Atomic Test #5: Cobalt Strike post-exploitation pipe (before 4.2) [windows]
|
||||
- T1203 Exploitation for Client Execution [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
|
||||
- T1028 Windows Remote Management [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
|
||||
- T1059.006 Command and Scripting Interpreter: Python [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
|
||||
@@ -1070,8 +1075,8 @@
|
||||
- T1505.001 SQL Stored Procedures [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
|
||||
- [T1078.003 Valid Accounts: Local Accounts](../../T1078.003/T1078.003.md)
|
||||
- Atomic Test #1: Create local account with admin privileges [windows]
|
||||
- Atomic Test #3: WinPwn - Loot local Credentials - powerhell kittie [windows]
|
||||
- Atomic Test #4: WinPwn - Loot local Credentials - Safetykatz [windows]
|
||||
- Atomic Test #6: WinPwn - Loot local Credentials - powerhell kittie [windows]
|
||||
- Atomic Test #7: WinPwn - Loot local Credentials - Safetykatz [windows]
|
||||
- [T1574.012 Hijack Execution Flow: COR_PROFILER](../../T1574.012/T1574.012.md)
|
||||
- Atomic Test #1: User scope COR_PROFILER [windows]
|
||||
- Atomic Test #2: System Scope COR_PROFILER [windows]
|
||||
@@ -1364,6 +1369,7 @@
|
||||
- Atomic Test #3: Find computers where user has session - Stealth mode (PowerView) [windows]
|
||||
- Atomic Test #4: User Discovery With Env Vars PowerShell Script [windows]
|
||||
- Atomic Test #5: GetCurrent User with PowerShell Script [windows]
|
||||
- Atomic Test #6: System Discovery - SocGholish whoami [windows]
|
||||
- T1016.001 Internet Connection Discovery [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
|
||||
- T1069 Permission Groups Discovery [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
|
||||
- [T1615 Group Policy Discovery](../../T1615/T1615.md)
|
||||
@@ -1736,8 +1742,8 @@
|
||||
- T1566.003 Spearphishing via Service [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
|
||||
- [T1078.003 Valid Accounts: Local Accounts](../../T1078.003/T1078.003.md)
|
||||
- Atomic Test #1: Create local account with admin privileges [windows]
|
||||
- Atomic Test #3: WinPwn - Loot local Credentials - powerhell kittie [windows]
|
||||
- Atomic Test #4: WinPwn - Loot local Credentials - Safetykatz [windows]
|
||||
- Atomic Test #6: WinPwn - Loot local Credentials - powerhell kittie [windows]
|
||||
- Atomic Test #7: WinPwn - Loot local Credentials - Safetykatz [windows]
|
||||
|
||||
# exfiltration
|
||||
- T1567 Exfiltration Over Web Service [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
|
||||
|
||||
@@ -39,7 +39,7 @@
|
||||
| | [Scheduled Task/Job: Systemd Timers](../../T1053.006/T1053.006.md) | Scheduled Task/Job [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing) | [Escape to Host](../../T1611/T1611.md) | [Indicator Removal on Host: Clear Linux or Mac System Logs](../../T1070.002/T1070.002.md) | [Brute Force: Password Spraying](../../T1110.003/T1110.003.md) | System Location Discovery [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing) | | SNMP (MIB Dump) [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing) | | Uncommonly Used Port [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing) | |
|
||||
| | Graphical User Interface [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing) | Login Item [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing) | [Boot or Logon Autostart Execution: Shortcut Modification](../../T1547.009/T1547.009.md) | [Signed Binary Proxy Execution: InstallUtil](../../T1218.004/T1218.004.md) | Web Portal Capture [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing) | [Software Discovery: Security Software Discovery](../../T1518.001/T1518.001.md) | | [Input Capture: Credential API Hooking](../../T1056.004/T1056.004.md) | | Domain Fronting [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing) | |
|
||||
| | [Command and Scripting Interpreter: Bash](../../T1059.004/T1059.004.md) | [Modify Authentication Process: Password Filter DLL](../../T1556.002/T1556.002.md) | AppCert DLLs [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing) | Disabling Security Tools [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing) | [OS Credential Dumping: Cached Domain Credentials](../../T1003.005/T1003.005.md) | [Cloud Service Discovery](../../T1526/T1526.md) | | | | Data Encoding [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing) | |
|
||||
| | Inter-Process Communication [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing) | Terminal Services DLL [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing) | [Boot or Logon Autostart Execution: Security Support Provider](../../T1547.005/T1547.005.md) | [Hijack Execution Flow: DLL Search Order Hijacking](../../T1574.001/T1574.001.md) | [Steal or Forge Kerberos Tickets: Golden Ticket](../../T1558.001/T1558.001.md) | [Remote System Discovery](../../T1018/T1018.md) | | | | Non-Standard Encoding [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing) | |
|
||||
| | [Inter-Process Communication](../../T1559/T1559.md) | Terminal Services DLL [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing) | [Boot or Logon Autostart Execution: Security Support Provider](../../T1547.005/T1547.005.md) | [Hijack Execution Flow: DLL Search Order Hijacking](../../T1574.001/T1574.001.md) | [Steal or Forge Kerberos Tickets: Golden Ticket](../../T1558.001/T1558.001.md) | [Remote System Discovery](../../T1018/T1018.md) | | | | Non-Standard Encoding [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing) | |
|
||||
| | Malicious Image [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing) | [Browser Extensions](../../T1176/T1176.md) | Extra Window Memory Injection [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing) | [Subvert Trust Controls: Gatekeeper Bypass](../../T1553.001/T1553.001.md) | [Unsecured Credentials: Bash History](../../T1552.003/T1552.003.md) | [Network Service Scanning](../../T1046/T1046.md) | | | | [Application Layer Protocol: Web Protocols](../../T1071.001/T1071.001.md) | |
|
||||
| | Trap [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing) | Service Registry Permissions Weakness [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing) | [Create or Modify System Process: Launch Daemon](../../T1543.004/T1543.004.md) | Code Signing [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing) | [Unsecured Credentials: Credentials In Files](../../T1552.001/T1552.001.md) | [Software Discovery](../../T1518/T1518.md) | | | | [Ingress Tool Transfer](../../T1105/T1105.md) | |
|
||||
| | Exploitation for Client Execution [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing) | Outlook Rules [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing) | [Hijack Execution Flow: Path Interception by Search Order Hijacking](../../T1574.008/T1574.008.md) | [File and Directory Permissions Modification: Windows File and Directory Permissions Modification](../../T1222.001/T1222.001.md) | Web Cookies [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing) | Cloud Service Dashboard [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing) | | | | Steganography [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing) | |
|
||||
|
||||
@@ -24,7 +24,7 @@
|
||||
| [Valid Accounts: Local Accounts](../../T1078.003/T1078.003.md) | [Command and Scripting Interpreter: PowerShell](../../T1059.001/T1059.001.md) | AppInit DLLs [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing) | [Thread Execution Hijacking](../../T1055.003/T1055.003.md) | Regsvcs/Regasm [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing) | Private Keys [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing) | [Domain Trust Discovery](../../T1482/T1482.md) | Windows Remote Management [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing) | Web Portal Capture [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing) | | Web Service [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing) | Endpoint Denial of Service [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing) |
|
||||
| | Mshta [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing) | [Office Application Startup: Add-ins](../../T1137.006/T1137.006.md) | [Event Triggered Execution: Application Shimming](../../T1546.011/T1546.011.md) | [Hide Artifacts](../../T1564/T1564.md) | [Credentials from Password Stores: Credentials from Web Browsers](../../T1555.003/T1555.003.md) | [File and Directory Discovery](../../T1083/T1083.md) | [Remote Service Session Hijacking: RDP Hijacking](../../T1563.002/T1563.002.md) | [Video Capture](../../T1125/T1125.md) | | DNS Calculation [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing) | Runtime Data Manipulation [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing) |
|
||||
| | Graphical User Interface [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing) | [Server Software Component: Transport Agent](../../T1505.002/T1505.002.md) | [Boot or Logon Autostart Execution: Port Monitors](../../T1547.010/T1547.010.md) | Domain Trust Modification [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing) | DHCP Spoofing [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing) | [System Network Connections Discovery](../../T1049/T1049.md) | [Use Alternate Authentication Material: Pass the Hash](../../T1550.002/T1550.002.md) | Email Collection: Email Forwarding Rule [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing) | | Multi-Stage Channels [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing) | Transmitted Data Manipulation [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing) |
|
||||
| | Inter-Process Communication [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing) | Scheduled Task/Job [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing) | [Process Injection](../../T1055/T1055.md) | Safe Mode Boot [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing) | [Unsecured Credentials: Private Keys](../../T1552.004/T1552.004.md) | Virtualization/Sandbox Evasion [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing) | [Remote Services: Remote Desktop Protocol](../../T1021.001/T1021.001.md) | Data Staged [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing) | | Port Knocking [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing) | Resource Hijacking [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing) |
|
||||
| | [Inter-Process Communication](../../T1559/T1559.md) | Scheduled Task/Job [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing) | [Process Injection](../../T1055/T1055.md) | Safe Mode Boot [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing) | [Unsecured Credentials: Private Keys](../../T1552.004/T1552.004.md) | Virtualization/Sandbox Evasion [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing) | [Remote Services: Remote Desktop Protocol](../../T1021.001/T1021.001.md) | Data Staged [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing) | | Port Knocking [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing) | Resource Hijacking [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing) |
|
||||
| | Exploitation for Client Execution [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing) | [Modify Authentication Process: Password Filter DLL](../../T1556.002/T1556.002.md) | DLL Search Order Hijacking [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing) | [Virtualization/Sandbox Evasion: System Checks](../../T1497.001/T1497.001.md) | [Adversary-in-the-Middle: LLMNR/NBT-NS Poisoning and SMB Relay](../../T1557.001/T1557.001.md) | [Process Discovery](../../T1057/T1057.md) | Windows Admin Shares [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing) | [Input Capture: GUI Input Capture](../../T1056.002/T1056.002.md) | | Multiband Communication [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing) | Transmitted Data Manipulation [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing) |
|
||||
| | Windows Remote Management [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing) | Terminal Services DLL [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing) | New Service [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing) | [Signed Binary Proxy Execution: InstallUtil](../../T1218.004/T1218.004.md) | [OS Credential Dumping: LSASS Memory](../../T1003.001/T1003.001.md) | User Activity Based Checks [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing) | | [Data from Network Shared Drive](../../T1039/T1039.md) | | File Transfer Protocols [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing) | [Data Destruction](../../T1485/T1485.md) |
|
||||
| | Command and Scripting Interpreter: Python [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing) | [Browser Extensions](../../T1176/T1176.md) | Escape to Host [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing) | Disabling Security Tools [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing) | Hooking [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing) | [Permission Groups Discovery: Local Groups](../../T1069.001/T1069.001.md) | | Remote Email Collection [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing) | | One-Way Communication [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing) | Network Denial of Service [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing) |
|
||||
|
||||
@@ -27610,6 +27610,7 @@ execution:
|
||||
- User
|
||||
- SYSTEM
|
||||
x_mitre_remote_support: true
|
||||
identifier: T1559
|
||||
atomic_tests: []
|
||||
T1204.003:
|
||||
technique:
|
||||
|
||||
@@ -26845,11 +26845,6 @@ execution:
|
||||
'
|
||||
supported_platforms:
|
||||
- containers
|
||||
input_arguments:
|
||||
command:
|
||||
description: Command to run
|
||||
type: string
|
||||
default: cat
|
||||
dependencies:
|
||||
- description: 'docker must be installed
|
||||
|
||||
@@ -27865,6 +27860,7 @@ execution:
|
||||
- User
|
||||
- SYSTEM
|
||||
x_mitre_remote_support: true
|
||||
identifier: T1559
|
||||
atomic_tests: []
|
||||
T1204.003:
|
||||
technique:
|
||||
|
||||
@@ -27522,6 +27522,7 @@ execution:
|
||||
- User
|
||||
- SYSTEM
|
||||
x_mitre_remote_support: true
|
||||
identifier: T1559
|
||||
atomic_tests: []
|
||||
T1204.003:
|
||||
technique:
|
||||
|
||||
@@ -27418,6 +27418,7 @@ execution:
|
||||
- User
|
||||
- SYSTEM
|
||||
x_mitre_remote_support: true
|
||||
identifier: T1559
|
||||
atomic_tests: []
|
||||
T1204.003:
|
||||
technique:
|
||||
|
||||
@@ -27561,6 +27561,7 @@ execution:
|
||||
- User
|
||||
- SYSTEM
|
||||
x_mitre_remote_support: true
|
||||
identifier: T1559
|
||||
atomic_tests: []
|
||||
T1204.003:
|
||||
technique:
|
||||
|
||||
@@ -27596,6 +27596,7 @@ execution:
|
||||
- User
|
||||
- SYSTEM
|
||||
x_mitre_remote_support: true
|
||||
identifier: T1559
|
||||
atomic_tests: []
|
||||
T1204.003:
|
||||
technique:
|
||||
|
||||
@@ -27522,6 +27522,7 @@ execution:
|
||||
- User
|
||||
- SYSTEM
|
||||
x_mitre_remote_support: true
|
||||
identifier: T1559
|
||||
atomic_tests: []
|
||||
T1204.003:
|
||||
technique:
|
||||
|
||||
+338
-19
@@ -6819,10 +6819,6 @@ defense-evasion:
|
||||
description: Encoded
|
||||
type: string
|
||||
default: IyEvYmluL2Rhc2gKZWNobyAiaHR0cHM6Ly93d3cueW91dHViZS5jb20vQGF0b21pY3NvbmFmcmlkYXkgRlRXIgo=
|
||||
zsh_encoded:
|
||||
description: Encoded
|
||||
type: string
|
||||
default: IyEvYmluL3pzaAplY2hvICJodHRwczovL3d3dy55b3V0dWJlLmNvbS9AYXRvbWljc29uYWZyaWRheSBGVFciCg==
|
||||
fish_encoded:
|
||||
description: Encoded
|
||||
type: string
|
||||
@@ -27196,6 +27192,45 @@ defense-evasion:
|
||||
cleanup_command: sudo dscl . -delete /Users/AtomicUser
|
||||
name: bash
|
||||
elevation_required: true
|
||||
- name: Create local account with admin privileges using sysadminctl utility -
|
||||
MacOS
|
||||
auto_generated_guid: 191db57d-091a-47d5-99f3-97fde53de505
|
||||
description: After execution the new account will be active and added to the
|
||||
Administrators group
|
||||
supported_platforms:
|
||||
- macos
|
||||
executor:
|
||||
command: sysadminctl interactive -addUser art-tester -fullName ARTUser -password
|
||||
!pass123! -admin
|
||||
cleanup_command: sysadminctl interactive -deleteUser art-tester
|
||||
name: bash
|
||||
elevation_required: true
|
||||
- name: Enable root account using dsenableroot utility - MacOS
|
||||
auto_generated_guid: 20b40ea9-0e17-4155-b8e6-244911a678ac
|
||||
description: After execution the current/new user will have root access
|
||||
supported_platforms:
|
||||
- macos
|
||||
executor:
|
||||
command: |-
|
||||
dsenableroot #current user
|
||||
dsenableroot -u art-tester -p art-tester -r art-root #new user
|
||||
cleanup_command: |-
|
||||
dsenableroot -d #current user
|
||||
dsenableroot -d -u art-tester -p art-tester #new user
|
||||
name: bash
|
||||
elevation_required: true
|
||||
- name: Add a new/existing user to the admin group using dseditgroup utility -
|
||||
macOS
|
||||
auto_generated_guid: 433842ba-e796-4fd5-a14f-95d3a1970875
|
||||
description: After execution the current/new user will be added to the Admin
|
||||
group
|
||||
supported_platforms:
|
||||
- macos
|
||||
executor:
|
||||
command: dseditgroup -o edit -a art-user -t user admin
|
||||
cleanup_command: dseditgroup -o edit -d art-user -t user admin
|
||||
name: bash
|
||||
elevation_required: true
|
||||
- name: WinPwn - Loot local Credentials - powerhell kittie
|
||||
auto_generated_guid: 9e9fd066-453d-442f-88c1-ad7911d32912
|
||||
description: Loot local Credentials - powerhell kittie technique via function
|
||||
@@ -42623,6 +42658,45 @@ privilege-escalation:
|
||||
cleanup_command: sudo dscl . -delete /Users/AtomicUser
|
||||
name: bash
|
||||
elevation_required: true
|
||||
- name: Create local account with admin privileges using sysadminctl utility -
|
||||
MacOS
|
||||
auto_generated_guid: 191db57d-091a-47d5-99f3-97fde53de505
|
||||
description: After execution the new account will be active and added to the
|
||||
Administrators group
|
||||
supported_platforms:
|
||||
- macos
|
||||
executor:
|
||||
command: sysadminctl interactive -addUser art-tester -fullName ARTUser -password
|
||||
!pass123! -admin
|
||||
cleanup_command: sysadminctl interactive -deleteUser art-tester
|
||||
name: bash
|
||||
elevation_required: true
|
||||
- name: Enable root account using dsenableroot utility - MacOS
|
||||
auto_generated_guid: 20b40ea9-0e17-4155-b8e6-244911a678ac
|
||||
description: After execution the current/new user will have root access
|
||||
supported_platforms:
|
||||
- macos
|
||||
executor:
|
||||
command: |-
|
||||
dsenableroot #current user
|
||||
dsenableroot -u art-tester -p art-tester -r art-root #new user
|
||||
cleanup_command: |-
|
||||
dsenableroot -d #current user
|
||||
dsenableroot -d -u art-tester -p art-tester #new user
|
||||
name: bash
|
||||
elevation_required: true
|
||||
- name: Add a new/existing user to the admin group using dseditgroup utility -
|
||||
macOS
|
||||
auto_generated_guid: 433842ba-e796-4fd5-a14f-95d3a1970875
|
||||
description: After execution the current/new user will be added to the Admin
|
||||
group
|
||||
supported_platforms:
|
||||
- macos
|
||||
executor:
|
||||
command: dseditgroup -o edit -a art-user -t user admin
|
||||
cleanup_command: dseditgroup -o edit -d art-user -t user admin
|
||||
name: bash
|
||||
elevation_required: true
|
||||
- name: WinPwn - Loot local Credentials - powerhell kittie
|
||||
auto_generated_guid: 9e9fd066-453d-442f-88c1-ad7911d32912
|
||||
description: Loot local Credentials - powerhell kittie technique via function
|
||||
@@ -45926,11 +46000,6 @@ execution:
|
||||
'
|
||||
supported_platforms:
|
||||
- containers
|
||||
input_arguments:
|
||||
command:
|
||||
description: Command to run
|
||||
type: string
|
||||
default: cat
|
||||
dependencies:
|
||||
- description: 'docker must be installed
|
||||
|
||||
@@ -47914,7 +47983,158 @@ execution:
|
||||
- User
|
||||
- SYSTEM
|
||||
x_mitre_remote_support: true
|
||||
atomic_tests: []
|
||||
identifier: T1559
|
||||
atomic_tests:
|
||||
- name: Cobalt Strike Artifact Kit pipe
|
||||
auto_generated_guid: bd13b9fc-b758-496a-b81a-397462f82c72
|
||||
description: |
|
||||
Uses the [Named Pipes Micro Emulation](https://github.com/center-for-threat-informed-defense/adversary_emulation_library/tree/master/micro_emulation_plans/src/named_pipes) executable from the Center for Threat Informed Defense to create a named pipe for inter-process communication.
|
||||
|
||||
The named pipe executable will pause for 30 seconds to allow the client and server to exchange a message through the pipe.
|
||||
supported_platforms:
|
||||
- windows
|
||||
dependency_executor_name: powershell
|
||||
dependencies:
|
||||
- description: 'Named pipe executors must exist on disk
|
||||
|
||||
'
|
||||
prereq_command: 'if ((Test-Path PathToAtomicsFolder\T1559\bin\build\namedpipes_executor.exe)
|
||||
-and (Test-Path PathToAtomicsFolder\T1559\bin\build\namedpipes_client.exe)
|
||||
-and (Test-Path PathToAtomicsFolder\T1559\bin\build\namedpipes_server.exe))
|
||||
{exit 0} else {exit 1}
|
||||
|
||||
'
|
||||
get_prereq_command: |
|
||||
[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12
|
||||
IEX (iwr "https://raw.githubusercontent.com/redcanaryco/invoke-atomicredteam/master/Public/Invoke-FetchFromZip.ps1" -UseBasicParsing)
|
||||
$zipUrl = "https://github.com/center-for-threat-informed-defense/adversary_emulation_library/raw/master/micro_emulation_plans/src/named_pipes/named_pipes.zip"
|
||||
Invoke-FetchFromZip $zipUrl "*.exe" "PathToAtomicsFolder\T1559\bin"
|
||||
executor:
|
||||
command: '"PathToAtomicsFolder\T1559\bin\build\namedpipes_executor.exe" --pipe
|
||||
1
|
||||
|
||||
'
|
||||
name: command_prompt
|
||||
- name: Cobalt Strike Lateral Movement (psexec_psh) pipe
|
||||
auto_generated_guid: 830c8b6c-7a70-4f40-b975-8bbe74558acd
|
||||
description: |
|
||||
Uses the [Named Pipes Micro Emulation](https://github.com/center-for-threat-informed-defense/adversary_emulation_library/tree/master/micro_emulation_plans/src/named_pipes) executable from the Center for Threat Informed Defense to create a named pipe for inter-process communication.
|
||||
|
||||
The named pipe executable will pause for 30 seconds to allow the client and server to exchange a message through the pipe.
|
||||
supported_platforms:
|
||||
- windows
|
||||
dependency_executor_name: powershell
|
||||
dependencies:
|
||||
- description: 'Named pipe executors must exist on disk
|
||||
|
||||
'
|
||||
prereq_command: 'if ((Test-Path PathToAtomicsFolder\T1559\bin\build\namedpipes_executor.exe)
|
||||
-and (Test-Path PathToAtomicsFolder\T1559\bin\build\namedpipes_client.exe)
|
||||
-and (Test-Path PathToAtomicsFolder\T1559\bin\build\namedpipes_server.exe))
|
||||
{exit 0} else {exit 1}
|
||||
|
||||
'
|
||||
get_prereq_command: |
|
||||
[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12
|
||||
IEX (iwr "https://raw.githubusercontent.com/redcanaryco/invoke-atomicredteam/master/Public/Invoke-FetchFromZip.ps1" -UseBasicParsing)
|
||||
$zipUrl = "https://github.com/center-for-threat-informed-defense/adversary_emulation_library/raw/master/micro_emulation_plans/src/named_pipes/named_pipes.zip"
|
||||
Invoke-FetchFromZip $zipUrl "*.exe" "PathToAtomicsFolder\T1559\bin"
|
||||
executor:
|
||||
command: '"PathToAtomicsFolder\T1559\bin\build\namedpipes_executor.exe" --pipe
|
||||
2
|
||||
|
||||
'
|
||||
name: command_prompt
|
||||
- name: Cobalt Strike SSH (postex_ssh) pipe
|
||||
auto_generated_guid: d1f72fa0-5bc2-4b4b-bd1e-43b6e8cfb2e6
|
||||
description: |
|
||||
Uses the [Named Pipes Micro Emulation](https://github.com/center-for-threat-informed-defense/adversary_emulation_library/tree/master/micro_emulation_plans/src/named_pipes) executable from the Center for Threat Informed Defense to create a named pipe for inter-process communication.
|
||||
|
||||
The named pipe executable will pause for 30 seconds to allow the client and server to exchange a message through the pipe.
|
||||
supported_platforms:
|
||||
- windows
|
||||
dependency_executor_name: powershell
|
||||
dependencies:
|
||||
- description: 'Named pipe executors must exist on disk
|
||||
|
||||
'
|
||||
prereq_command: 'if ((Test-Path PathToAtomicsFolder\T1559\bin\build\namedpipes_executor.exe)
|
||||
-and (Test-Path PathToAtomicsFolder\T1559\bin\build\namedpipes_client.exe)
|
||||
-and (Test-Path PathToAtomicsFolder\T1559\bin\build\namedpipes_server.exe))
|
||||
{exit 0} else {exit 1}
|
||||
|
||||
'
|
||||
get_prereq_command: |
|
||||
[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12
|
||||
IEX (iwr "https://raw.githubusercontent.com/redcanaryco/invoke-atomicredteam/master/Public/Invoke-FetchFromZip.ps1" -UseBasicParsing)
|
||||
$zipUrl = "https://github.com/center-for-threat-informed-defense/adversary_emulation_library/raw/master/micro_emulation_plans/src/named_pipes/named_pipes.zip"
|
||||
Invoke-FetchFromZip $zipUrl "*.exe" "PathToAtomicsFolder\T1559\bin"
|
||||
executor:
|
||||
command: '"PathToAtomicsFolder\T1559\bin\build\namedpipes_executor.exe" --pipe
|
||||
3
|
||||
|
||||
'
|
||||
name: command_prompt
|
||||
- name: Cobalt Strike post-exploitation pipe (4.2 and later)
|
||||
auto_generated_guid: 7a48f482-246f-4aeb-9837-21c271ebf244
|
||||
description: |
|
||||
Uses the [Named Pipes Micro Emulation](https://github.com/center-for-threat-informed-defense/adversary_emulation_library/tree/master/micro_emulation_plans/src/named_pipes) executable from the Center for Threat Informed Defense to create a named pipe for inter-process communication.
|
||||
|
||||
The named pipe executable will pause for 30 seconds to allow the client and server to exchange a message through the pipe.
|
||||
supported_platforms:
|
||||
- windows
|
||||
dependency_executor_name: powershell
|
||||
dependencies:
|
||||
- description: 'Named pipe executors must exist on disk
|
||||
|
||||
'
|
||||
prereq_command: 'if ((Test-Path PathToAtomicsFolder\T1559\bin\build\namedpipes_executor.exe)
|
||||
-and (Test-Path PathToAtomicsFolder\T1559\bin\build\namedpipes_client.exe)
|
||||
-and (Test-Path PathToAtomicsFolder\T1559\bin\build\namedpipes_server.exe))
|
||||
{exit 0} else {exit 1}
|
||||
|
||||
'
|
||||
get_prereq_command: |
|
||||
[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12
|
||||
IEX (iwr "https://raw.githubusercontent.com/redcanaryco/invoke-atomicredteam/master/Public/Invoke-FetchFromZip.ps1" -UseBasicParsing)
|
||||
$zipUrl = "https://github.com/center-for-threat-informed-defense/adversary_emulation_library/raw/master/micro_emulation_plans/src/named_pipes/named_pipes.zip"
|
||||
Invoke-FetchFromZip $zipUrl "*.exe" "PathToAtomicsFolder\T1559\bin"
|
||||
executor:
|
||||
command: '"PathToAtomicsFolder\T1559\bin\build\namedpipes_executor.exe" --pipe
|
||||
4
|
||||
|
||||
'
|
||||
name: command_prompt
|
||||
- name: Cobalt Strike post-exploitation pipe (before 4.2)
|
||||
auto_generated_guid: 8dbfc15c-527b-4ab0-a272-019f469d367f
|
||||
description: |
|
||||
Uses the [Named Pipes Micro Emulation](https://github.com/center-for-threat-informed-defense/adversary_emulation_library/tree/master/micro_emulation_plans/src/named_pipes) executable from the Center for Threat Informed Defense to create a named pipe for inter-process communication.
|
||||
|
||||
The named pipe executable will pause for 30 seconds to allow the client and server to exchange a message through the pipe.
|
||||
supported_platforms:
|
||||
- windows
|
||||
dependency_executor_name: powershell
|
||||
dependencies:
|
||||
- description: 'Named pipe executors must exist on disk
|
||||
|
||||
'
|
||||
prereq_command: 'if ((Test-Path PathToAtomicsFolder\T1559\bin\build\namedpipes_executor.exe)
|
||||
-and (Test-Path PathToAtomicsFolder\T1559\bin\build\namedpipes_client.exe)
|
||||
-and (Test-Path PathToAtomicsFolder\T1559\bin\build\namedpipes_server.exe))
|
||||
{exit 0} else {exit 1}
|
||||
|
||||
'
|
||||
get_prereq_command: |
|
||||
[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12
|
||||
IEX (iwr "https://raw.githubusercontent.com/redcanaryco/invoke-atomicredteam/master/Public/Invoke-FetchFromZip.ps1" -UseBasicParsing)
|
||||
$zipUrl = "https://github.com/center-for-threat-informed-defense/adversary_emulation_library/raw/master/micro_emulation_plans/src/named_pipes/named_pipes.zip"
|
||||
Invoke-FetchFromZip $zipUrl "*.exe" "PathToAtomicsFolder\T1559\bin"
|
||||
executor:
|
||||
command: '"PathToAtomicsFolder\T1559\bin\build\namedpipes_executor.exe" --pipe
|
||||
5
|
||||
|
||||
'
|
||||
name: command_prompt
|
||||
T1204.003:
|
||||
technique:
|
||||
x_mitre_platforms:
|
||||
@@ -66992,6 +67212,45 @@ persistence:
|
||||
cleanup_command: sudo dscl . -delete /Users/AtomicUser
|
||||
name: bash
|
||||
elevation_required: true
|
||||
- name: Create local account with admin privileges using sysadminctl utility -
|
||||
MacOS
|
||||
auto_generated_guid: 191db57d-091a-47d5-99f3-97fde53de505
|
||||
description: After execution the new account will be active and added to the
|
||||
Administrators group
|
||||
supported_platforms:
|
||||
- macos
|
||||
executor:
|
||||
command: sysadminctl interactive -addUser art-tester -fullName ARTUser -password
|
||||
!pass123! -admin
|
||||
cleanup_command: sysadminctl interactive -deleteUser art-tester
|
||||
name: bash
|
||||
elevation_required: true
|
||||
- name: Enable root account using dsenableroot utility - MacOS
|
||||
auto_generated_guid: 20b40ea9-0e17-4155-b8e6-244911a678ac
|
||||
description: After execution the current/new user will have root access
|
||||
supported_platforms:
|
||||
- macos
|
||||
executor:
|
||||
command: |-
|
||||
dsenableroot #current user
|
||||
dsenableroot -u art-tester -p art-tester -r art-root #new user
|
||||
cleanup_command: |-
|
||||
dsenableroot -d #current user
|
||||
dsenableroot -d -u art-tester -p art-tester #new user
|
||||
name: bash
|
||||
elevation_required: true
|
||||
- name: Add a new/existing user to the admin group using dseditgroup utility -
|
||||
macOS
|
||||
auto_generated_guid: 433842ba-e796-4fd5-a14f-95d3a1970875
|
||||
description: After execution the current/new user will be added to the Admin
|
||||
group
|
||||
supported_platforms:
|
||||
- macos
|
||||
executor:
|
||||
command: dseditgroup -o edit -a art-user -t user admin
|
||||
cleanup_command: dseditgroup -o edit -d art-user -t user admin
|
||||
name: bash
|
||||
elevation_required: true
|
||||
- name: WinPwn - Loot local Credentials - powerhell kittie
|
||||
auto_generated_guid: 9e9fd066-453d-442f-88c1-ad7911d32912
|
||||
description: Loot local Credentials - powerhell kittie technique via function
|
||||
@@ -84430,6 +84689,36 @@ discovery:
|
||||
-FilePath .\\CurrentUserObject.txt\n"
|
||||
cleanup_command: 'Remove-Item -Path .\CurrentUserObject.txt -Force
|
||||
|
||||
'
|
||||
name: powershell
|
||||
- name: System Discovery - SocGholish whoami
|
||||
auto_generated_guid: 3d257a03-eb80-41c5-b744-bb37ac7f65c7
|
||||
description: "SocGholish performs whoami discovery commands and outputs the
|
||||
results to a tmp file. \nThe test will generate a filename similar to the
|
||||
random one generated during execution and write the file to AppData\\Temp.\n\nReference:
|
||||
https://redcanary.com/threat-detection-report/threats/socgholish/\n"
|
||||
supported_platforms:
|
||||
- windows
|
||||
input_arguments:
|
||||
output_path:
|
||||
description: Location of output file
|
||||
type: string
|
||||
default: "$env:temp"
|
||||
executor:
|
||||
command: |
|
||||
$TokenSet = @{
|
||||
U = [Char[]]'ABCDEFGHIJKLMNOPQRSTUVWXYZ'
|
||||
N = [Char[]]'0123456789'
|
||||
}
|
||||
$Upper = Get-Random -Count 5 -InputObject $TokenSet.U
|
||||
$Number = Get-Random -Count 5 -InputObject $TokenSet.N
|
||||
$StringSet = $Upper + $Number
|
||||
$rad = (Get-Random -Count 5 -InputObject $StringSet) -join ''
|
||||
$file = "rad" + $rad + ".tmp"
|
||||
|
||||
whoami.exe /all >> #{output_path}\$file
|
||||
cleanup_command: 'Remove-Item -Path $env:temp\rad*.tmp -Force
|
||||
|
||||
'
|
||||
name: powershell
|
||||
T1613:
|
||||
@@ -85266,15 +85555,6 @@ discovery:
|
||||
code 4776 from the domain controller and stores the ouput in C:\\temp. [Reference](https://www.reliaquest.com/blog/socgholish-fakeupdates/)\n"
|
||||
supported_platforms:
|
||||
- windows
|
||||
input_arguments:
|
||||
Domain:
|
||||
description: Domain that is being tested against
|
||||
type: string
|
||||
default: "$env:USERDOMAIN"
|
||||
DomainController:
|
||||
description: Domain Controller that is being tested against
|
||||
type: string
|
||||
default: "$env:UserDnsDomain"
|
||||
executor:
|
||||
command: wmic /node:$env:UserDnsDomain process call create 'wevtutil epl Security
|
||||
C:\Temp\ntlmusers.evtx /q:Event[System[(EventID=4776)]]'
|
||||
@@ -104816,6 +105096,45 @@ initial-access:
|
||||
cleanup_command: sudo dscl . -delete /Users/AtomicUser
|
||||
name: bash
|
||||
elevation_required: true
|
||||
- name: Create local account with admin privileges using sysadminctl utility -
|
||||
MacOS
|
||||
auto_generated_guid: 191db57d-091a-47d5-99f3-97fde53de505
|
||||
description: After execution the new account will be active and added to the
|
||||
Administrators group
|
||||
supported_platforms:
|
||||
- macos
|
||||
executor:
|
||||
command: sysadminctl interactive -addUser art-tester -fullName ARTUser -password
|
||||
!pass123! -admin
|
||||
cleanup_command: sysadminctl interactive -deleteUser art-tester
|
||||
name: bash
|
||||
elevation_required: true
|
||||
- name: Enable root account using dsenableroot utility - MacOS
|
||||
auto_generated_guid: 20b40ea9-0e17-4155-b8e6-244911a678ac
|
||||
description: After execution the current/new user will have root access
|
||||
supported_platforms:
|
||||
- macos
|
||||
executor:
|
||||
command: |-
|
||||
dsenableroot #current user
|
||||
dsenableroot -u art-tester -p art-tester -r art-root #new user
|
||||
cleanup_command: |-
|
||||
dsenableroot -d #current user
|
||||
dsenableroot -d -u art-tester -p art-tester #new user
|
||||
name: bash
|
||||
elevation_required: true
|
||||
- name: Add a new/existing user to the admin group using dseditgroup utility -
|
||||
macOS
|
||||
auto_generated_guid: 433842ba-e796-4fd5-a14f-95d3a1970875
|
||||
description: After execution the current/new user will be added to the Admin
|
||||
group
|
||||
supported_platforms:
|
||||
- macos
|
||||
executor:
|
||||
command: dseditgroup -o edit -a art-user -t user admin
|
||||
cleanup_command: dseditgroup -o edit -d art-user -t user admin
|
||||
name: bash
|
||||
elevation_required: true
|
||||
- name: WinPwn - Loot local Credentials - powerhell kittie
|
||||
auto_generated_guid: 9e9fd066-453d-442f-88c1-ad7911d32912
|
||||
description: Loot local Credentials - powerhell kittie technique via function
|
||||
|
||||
@@ -4212,10 +4212,6 @@ defense-evasion:
|
||||
description: Encoded
|
||||
type: string
|
||||
default: IyEvYmluL2Rhc2gKZWNobyAiaHR0cHM6Ly93d3cueW91dHViZS5jb20vQGF0b21pY3NvbmFmcmlkYXkgRlRXIgo=
|
||||
zsh_encoded:
|
||||
description: Encoded
|
||||
type: string
|
||||
default: IyEvYmluL3pzaAplY2hvICJodHRwczovL3d3dy55b3V0dWJlLmNvbS9AYXRvbWljc29uYWZyaWRheSBGVFciCg==
|
||||
fish_encoded:
|
||||
description: Encoded
|
||||
type: string
|
||||
@@ -31109,6 +31105,7 @@ execution:
|
||||
- User
|
||||
- SYSTEM
|
||||
x_mitre_remote_support: true
|
||||
identifier: T1559
|
||||
atomic_tests: []
|
||||
T1204.003:
|
||||
technique:
|
||||
|
||||
@@ -3865,10 +3865,6 @@ defense-evasion:
|
||||
description: Encoded
|
||||
type: string
|
||||
default: IyEvYmluL2Rhc2gKZWNobyAiaHR0cHM6Ly93d3cueW91dHViZS5jb20vQGF0b21pY3NvbmFmcmlkYXkgRlRXIgo=
|
||||
zsh_encoded:
|
||||
description: Encoded
|
||||
type: string
|
||||
default: IyEvYmluL3pzaAplY2hvICJodHRwczovL3d3dy55b3V0dWJlLmNvbS9AYXRvbWljc29uYWZyaWRheSBGVFciCg==
|
||||
fish_encoded:
|
||||
description: Encoded
|
||||
type: string
|
||||
@@ -16433,6 +16429,45 @@ defense-evasion:
|
||||
cleanup_command: sudo dscl . -delete /Users/AtomicUser
|
||||
name: bash
|
||||
elevation_required: true
|
||||
- name: Create local account with admin privileges using sysadminctl utility -
|
||||
MacOS
|
||||
auto_generated_guid: 191db57d-091a-47d5-99f3-97fde53de505
|
||||
description: After execution the new account will be active and added to the
|
||||
Administrators group
|
||||
supported_platforms:
|
||||
- macos
|
||||
executor:
|
||||
command: sysadminctl interactive -addUser art-tester -fullName ARTUser -password
|
||||
!pass123! -admin
|
||||
cleanup_command: sysadminctl interactive -deleteUser art-tester
|
||||
name: bash
|
||||
elevation_required: true
|
||||
- name: Enable root account using dsenableroot utility - MacOS
|
||||
auto_generated_guid: 20b40ea9-0e17-4155-b8e6-244911a678ac
|
||||
description: After execution the current/new user will have root access
|
||||
supported_platforms:
|
||||
- macos
|
||||
executor:
|
||||
command: |-
|
||||
dsenableroot #current user
|
||||
dsenableroot -u art-tester -p art-tester -r art-root #new user
|
||||
cleanup_command: |-
|
||||
dsenableroot -d #current user
|
||||
dsenableroot -d -u art-tester -p art-tester #new user
|
||||
name: bash
|
||||
elevation_required: true
|
||||
- name: Add a new/existing user to the admin group using dseditgroup utility -
|
||||
macOS
|
||||
auto_generated_guid: 433842ba-e796-4fd5-a14f-95d3a1970875
|
||||
description: After execution the current/new user will be added to the Admin
|
||||
group
|
||||
supported_platforms:
|
||||
- macos
|
||||
executor:
|
||||
command: dseditgroup -o edit -a art-user -t user admin
|
||||
cleanup_command: dseditgroup -o edit -d art-user -t user admin
|
||||
name: bash
|
||||
elevation_required: true
|
||||
T1211:
|
||||
technique:
|
||||
x_mitre_platforms:
|
||||
@@ -26973,6 +27008,45 @@ privilege-escalation:
|
||||
cleanup_command: sudo dscl . -delete /Users/AtomicUser
|
||||
name: bash
|
||||
elevation_required: true
|
||||
- name: Create local account with admin privileges using sysadminctl utility -
|
||||
MacOS
|
||||
auto_generated_guid: 191db57d-091a-47d5-99f3-97fde53de505
|
||||
description: After execution the new account will be active and added to the
|
||||
Administrators group
|
||||
supported_platforms:
|
||||
- macos
|
||||
executor:
|
||||
command: sysadminctl interactive -addUser art-tester -fullName ARTUser -password
|
||||
!pass123! -admin
|
||||
cleanup_command: sysadminctl interactive -deleteUser art-tester
|
||||
name: bash
|
||||
elevation_required: true
|
||||
- name: Enable root account using dsenableroot utility - MacOS
|
||||
auto_generated_guid: 20b40ea9-0e17-4155-b8e6-244911a678ac
|
||||
description: After execution the current/new user will have root access
|
||||
supported_platforms:
|
||||
- macos
|
||||
executor:
|
||||
command: |-
|
||||
dsenableroot #current user
|
||||
dsenableroot -u art-tester -p art-tester -r art-root #new user
|
||||
cleanup_command: |-
|
||||
dsenableroot -d #current user
|
||||
dsenableroot -d -u art-tester -p art-tester #new user
|
||||
name: bash
|
||||
elevation_required: true
|
||||
- name: Add a new/existing user to the admin group using dseditgroup utility -
|
||||
macOS
|
||||
auto_generated_guid: 433842ba-e796-4fd5-a14f-95d3a1970875
|
||||
description: After execution the current/new user will be added to the Admin
|
||||
group
|
||||
supported_platforms:
|
||||
- macos
|
||||
executor:
|
||||
command: dseditgroup -o edit -a art-user -t user admin
|
||||
cleanup_command: dseditgroup -o edit -d art-user -t user admin
|
||||
name: bash
|
||||
elevation_required: true
|
||||
T1574.012:
|
||||
technique:
|
||||
x_mitre_platforms:
|
||||
@@ -29877,6 +29951,7 @@ execution:
|
||||
- User
|
||||
- SYSTEM
|
||||
x_mitre_remote_support: true
|
||||
identifier: T1559
|
||||
atomic_tests: []
|
||||
T1204.003:
|
||||
technique:
|
||||
@@ -43389,6 +43464,45 @@ persistence:
|
||||
cleanup_command: sudo dscl . -delete /Users/AtomicUser
|
||||
name: bash
|
||||
elevation_required: true
|
||||
- name: Create local account with admin privileges using sysadminctl utility -
|
||||
MacOS
|
||||
auto_generated_guid: 191db57d-091a-47d5-99f3-97fde53de505
|
||||
description: After execution the new account will be active and added to the
|
||||
Administrators group
|
||||
supported_platforms:
|
||||
- macos
|
||||
executor:
|
||||
command: sysadminctl interactive -addUser art-tester -fullName ARTUser -password
|
||||
!pass123! -admin
|
||||
cleanup_command: sysadminctl interactive -deleteUser art-tester
|
||||
name: bash
|
||||
elevation_required: true
|
||||
- name: Enable root account using dsenableroot utility - MacOS
|
||||
auto_generated_guid: 20b40ea9-0e17-4155-b8e6-244911a678ac
|
||||
description: After execution the current/new user will have root access
|
||||
supported_platforms:
|
||||
- macos
|
||||
executor:
|
||||
command: |-
|
||||
dsenableroot #current user
|
||||
dsenableroot -u art-tester -p art-tester -r art-root #new user
|
||||
cleanup_command: |-
|
||||
dsenableroot -d #current user
|
||||
dsenableroot -d -u art-tester -p art-tester #new user
|
||||
name: bash
|
||||
elevation_required: true
|
||||
- name: Add a new/existing user to the admin group using dseditgroup utility -
|
||||
macOS
|
||||
auto_generated_guid: 433842ba-e796-4fd5-a14f-95d3a1970875
|
||||
description: After execution the current/new user will be added to the Admin
|
||||
group
|
||||
supported_platforms:
|
||||
- macos
|
||||
executor:
|
||||
command: dseditgroup -o edit -a art-user -t user admin
|
||||
cleanup_command: dseditgroup -o edit -d art-user -t user admin
|
||||
name: bash
|
||||
elevation_required: true
|
||||
T1574.012:
|
||||
technique:
|
||||
x_mitre_platforms:
|
||||
@@ -68052,6 +68166,45 @@ initial-access:
|
||||
cleanup_command: sudo dscl . -delete /Users/AtomicUser
|
||||
name: bash
|
||||
elevation_required: true
|
||||
- name: Create local account with admin privileges using sysadminctl utility -
|
||||
MacOS
|
||||
auto_generated_guid: 191db57d-091a-47d5-99f3-97fde53de505
|
||||
description: After execution the new account will be active and added to the
|
||||
Administrators group
|
||||
supported_platforms:
|
||||
- macos
|
||||
executor:
|
||||
command: sysadminctl interactive -addUser art-tester -fullName ARTUser -password
|
||||
!pass123! -admin
|
||||
cleanup_command: sysadminctl interactive -deleteUser art-tester
|
||||
name: bash
|
||||
elevation_required: true
|
||||
- name: Enable root account using dsenableroot utility - MacOS
|
||||
auto_generated_guid: 20b40ea9-0e17-4155-b8e6-244911a678ac
|
||||
description: After execution the current/new user will have root access
|
||||
supported_platforms:
|
||||
- macos
|
||||
executor:
|
||||
command: |-
|
||||
dsenableroot #current user
|
||||
dsenableroot -u art-tester -p art-tester -r art-root #new user
|
||||
cleanup_command: |-
|
||||
dsenableroot -d #current user
|
||||
dsenableroot -d -u art-tester -p art-tester #new user
|
||||
name: bash
|
||||
elevation_required: true
|
||||
- name: Add a new/existing user to the admin group using dseditgroup utility -
|
||||
macOS
|
||||
auto_generated_guid: 433842ba-e796-4fd5-a14f-95d3a1970875
|
||||
description: After execution the current/new user will be added to the Admin
|
||||
group
|
||||
supported_platforms:
|
||||
- macos
|
||||
executor:
|
||||
command: dseditgroup -o edit -a art-user -t user admin
|
||||
cleanup_command: dseditgroup -o edit -d art-user -t user admin
|
||||
name: bash
|
||||
elevation_required: true
|
||||
exfiltration:
|
||||
T1567:
|
||||
technique:
|
||||
|
||||
@@ -27503,6 +27503,7 @@ execution:
|
||||
- User
|
||||
- SYSTEM
|
||||
x_mitre_remote_support: true
|
||||
identifier: T1559
|
||||
atomic_tests: []
|
||||
T1204.003:
|
||||
technique:
|
||||
|
||||
@@ -27418,6 +27418,7 @@ execution:
|
||||
- User
|
||||
- SYSTEM
|
||||
x_mitre_remote_support: true
|
||||
identifier: T1559
|
||||
atomic_tests: []
|
||||
T1204.003:
|
||||
technique:
|
||||
|
||||
@@ -42211,7 +42211,158 @@ execution:
|
||||
- User
|
||||
- SYSTEM
|
||||
x_mitre_remote_support: true
|
||||
atomic_tests: []
|
||||
identifier: T1559
|
||||
atomic_tests:
|
||||
- name: Cobalt Strike Artifact Kit pipe
|
||||
auto_generated_guid: bd13b9fc-b758-496a-b81a-397462f82c72
|
||||
description: |
|
||||
Uses the [Named Pipes Micro Emulation](https://github.com/center-for-threat-informed-defense/adversary_emulation_library/tree/master/micro_emulation_plans/src/named_pipes) executable from the Center for Threat Informed Defense to create a named pipe for inter-process communication.
|
||||
|
||||
The named pipe executable will pause for 30 seconds to allow the client and server to exchange a message through the pipe.
|
||||
supported_platforms:
|
||||
- windows
|
||||
dependency_executor_name: powershell
|
||||
dependencies:
|
||||
- description: 'Named pipe executors must exist on disk
|
||||
|
||||
'
|
||||
prereq_command: 'if ((Test-Path PathToAtomicsFolder\T1559\bin\build\namedpipes_executor.exe)
|
||||
-and (Test-Path PathToAtomicsFolder\T1559\bin\build\namedpipes_client.exe)
|
||||
-and (Test-Path PathToAtomicsFolder\T1559\bin\build\namedpipes_server.exe))
|
||||
{exit 0} else {exit 1}
|
||||
|
||||
'
|
||||
get_prereq_command: |
|
||||
[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12
|
||||
IEX (iwr "https://raw.githubusercontent.com/redcanaryco/invoke-atomicredteam/master/Public/Invoke-FetchFromZip.ps1" -UseBasicParsing)
|
||||
$zipUrl = "https://github.com/center-for-threat-informed-defense/adversary_emulation_library/raw/master/micro_emulation_plans/src/named_pipes/named_pipes.zip"
|
||||
Invoke-FetchFromZip $zipUrl "*.exe" "PathToAtomicsFolder\T1559\bin"
|
||||
executor:
|
||||
command: '"PathToAtomicsFolder\T1559\bin\build\namedpipes_executor.exe" --pipe
|
||||
1
|
||||
|
||||
'
|
||||
name: command_prompt
|
||||
- name: Cobalt Strike Lateral Movement (psexec_psh) pipe
|
||||
auto_generated_guid: 830c8b6c-7a70-4f40-b975-8bbe74558acd
|
||||
description: |
|
||||
Uses the [Named Pipes Micro Emulation](https://github.com/center-for-threat-informed-defense/adversary_emulation_library/tree/master/micro_emulation_plans/src/named_pipes) executable from the Center for Threat Informed Defense to create a named pipe for inter-process communication.
|
||||
|
||||
The named pipe executable will pause for 30 seconds to allow the client and server to exchange a message through the pipe.
|
||||
supported_platforms:
|
||||
- windows
|
||||
dependency_executor_name: powershell
|
||||
dependencies:
|
||||
- description: 'Named pipe executors must exist on disk
|
||||
|
||||
'
|
||||
prereq_command: 'if ((Test-Path PathToAtomicsFolder\T1559\bin\build\namedpipes_executor.exe)
|
||||
-and (Test-Path PathToAtomicsFolder\T1559\bin\build\namedpipes_client.exe)
|
||||
-and (Test-Path PathToAtomicsFolder\T1559\bin\build\namedpipes_server.exe))
|
||||
{exit 0} else {exit 1}
|
||||
|
||||
'
|
||||
get_prereq_command: |
|
||||
[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12
|
||||
IEX (iwr "https://raw.githubusercontent.com/redcanaryco/invoke-atomicredteam/master/Public/Invoke-FetchFromZip.ps1" -UseBasicParsing)
|
||||
$zipUrl = "https://github.com/center-for-threat-informed-defense/adversary_emulation_library/raw/master/micro_emulation_plans/src/named_pipes/named_pipes.zip"
|
||||
Invoke-FetchFromZip $zipUrl "*.exe" "PathToAtomicsFolder\T1559\bin"
|
||||
executor:
|
||||
command: '"PathToAtomicsFolder\T1559\bin\build\namedpipes_executor.exe" --pipe
|
||||
2
|
||||
|
||||
'
|
||||
name: command_prompt
|
||||
- name: Cobalt Strike SSH (postex_ssh) pipe
|
||||
auto_generated_guid: d1f72fa0-5bc2-4b4b-bd1e-43b6e8cfb2e6
|
||||
description: |
|
||||
Uses the [Named Pipes Micro Emulation](https://github.com/center-for-threat-informed-defense/adversary_emulation_library/tree/master/micro_emulation_plans/src/named_pipes) executable from the Center for Threat Informed Defense to create a named pipe for inter-process communication.
|
||||
|
||||
The named pipe executable will pause for 30 seconds to allow the client and server to exchange a message through the pipe.
|
||||
supported_platforms:
|
||||
- windows
|
||||
dependency_executor_name: powershell
|
||||
dependencies:
|
||||
- description: 'Named pipe executors must exist on disk
|
||||
|
||||
'
|
||||
prereq_command: 'if ((Test-Path PathToAtomicsFolder\T1559\bin\build\namedpipes_executor.exe)
|
||||
-and (Test-Path PathToAtomicsFolder\T1559\bin\build\namedpipes_client.exe)
|
||||
-and (Test-Path PathToAtomicsFolder\T1559\bin\build\namedpipes_server.exe))
|
||||
{exit 0} else {exit 1}
|
||||
|
||||
'
|
||||
get_prereq_command: |
|
||||
[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12
|
||||
IEX (iwr "https://raw.githubusercontent.com/redcanaryco/invoke-atomicredteam/master/Public/Invoke-FetchFromZip.ps1" -UseBasicParsing)
|
||||
$zipUrl = "https://github.com/center-for-threat-informed-defense/adversary_emulation_library/raw/master/micro_emulation_plans/src/named_pipes/named_pipes.zip"
|
||||
Invoke-FetchFromZip $zipUrl "*.exe" "PathToAtomicsFolder\T1559\bin"
|
||||
executor:
|
||||
command: '"PathToAtomicsFolder\T1559\bin\build\namedpipes_executor.exe" --pipe
|
||||
3
|
||||
|
||||
'
|
||||
name: command_prompt
|
||||
- name: Cobalt Strike post-exploitation pipe (4.2 and later)
|
||||
auto_generated_guid: 7a48f482-246f-4aeb-9837-21c271ebf244
|
||||
description: |
|
||||
Uses the [Named Pipes Micro Emulation](https://github.com/center-for-threat-informed-defense/adversary_emulation_library/tree/master/micro_emulation_plans/src/named_pipes) executable from the Center for Threat Informed Defense to create a named pipe for inter-process communication.
|
||||
|
||||
The named pipe executable will pause for 30 seconds to allow the client and server to exchange a message through the pipe.
|
||||
supported_platforms:
|
||||
- windows
|
||||
dependency_executor_name: powershell
|
||||
dependencies:
|
||||
- description: 'Named pipe executors must exist on disk
|
||||
|
||||
'
|
||||
prereq_command: 'if ((Test-Path PathToAtomicsFolder\T1559\bin\build\namedpipes_executor.exe)
|
||||
-and (Test-Path PathToAtomicsFolder\T1559\bin\build\namedpipes_client.exe)
|
||||
-and (Test-Path PathToAtomicsFolder\T1559\bin\build\namedpipes_server.exe))
|
||||
{exit 0} else {exit 1}
|
||||
|
||||
'
|
||||
get_prereq_command: |
|
||||
[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12
|
||||
IEX (iwr "https://raw.githubusercontent.com/redcanaryco/invoke-atomicredteam/master/Public/Invoke-FetchFromZip.ps1" -UseBasicParsing)
|
||||
$zipUrl = "https://github.com/center-for-threat-informed-defense/adversary_emulation_library/raw/master/micro_emulation_plans/src/named_pipes/named_pipes.zip"
|
||||
Invoke-FetchFromZip $zipUrl "*.exe" "PathToAtomicsFolder\T1559\bin"
|
||||
executor:
|
||||
command: '"PathToAtomicsFolder\T1559\bin\build\namedpipes_executor.exe" --pipe
|
||||
4
|
||||
|
||||
'
|
||||
name: command_prompt
|
||||
- name: Cobalt Strike post-exploitation pipe (before 4.2)
|
||||
auto_generated_guid: 8dbfc15c-527b-4ab0-a272-019f469d367f
|
||||
description: |
|
||||
Uses the [Named Pipes Micro Emulation](https://github.com/center-for-threat-informed-defense/adversary_emulation_library/tree/master/micro_emulation_plans/src/named_pipes) executable from the Center for Threat Informed Defense to create a named pipe for inter-process communication.
|
||||
|
||||
The named pipe executable will pause for 30 seconds to allow the client and server to exchange a message through the pipe.
|
||||
supported_platforms:
|
||||
- windows
|
||||
dependency_executor_name: powershell
|
||||
dependencies:
|
||||
- description: 'Named pipe executors must exist on disk
|
||||
|
||||
'
|
||||
prereq_command: 'if ((Test-Path PathToAtomicsFolder\T1559\bin\build\namedpipes_executor.exe)
|
||||
-and (Test-Path PathToAtomicsFolder\T1559\bin\build\namedpipes_client.exe)
|
||||
-and (Test-Path PathToAtomicsFolder\T1559\bin\build\namedpipes_server.exe))
|
||||
{exit 0} else {exit 1}
|
||||
|
||||
'
|
||||
get_prereq_command: |
|
||||
[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12
|
||||
IEX (iwr "https://raw.githubusercontent.com/redcanaryco/invoke-atomicredteam/master/Public/Invoke-FetchFromZip.ps1" -UseBasicParsing)
|
||||
$zipUrl = "https://github.com/center-for-threat-informed-defense/adversary_emulation_library/raw/master/micro_emulation_plans/src/named_pipes/named_pipes.zip"
|
||||
Invoke-FetchFromZip $zipUrl "*.exe" "PathToAtomicsFolder\T1559\bin"
|
||||
executor:
|
||||
command: '"PathToAtomicsFolder\T1559\bin\build\namedpipes_executor.exe" --pipe
|
||||
5
|
||||
|
||||
'
|
||||
name: command_prompt
|
||||
T1204.003:
|
||||
technique:
|
||||
x_mitre_platforms:
|
||||
@@ -73560,6 +73711,36 @@ discovery:
|
||||
-FilePath .\\CurrentUserObject.txt\n"
|
||||
cleanup_command: 'Remove-Item -Path .\CurrentUserObject.txt -Force
|
||||
|
||||
'
|
||||
name: powershell
|
||||
- name: System Discovery - SocGholish whoami
|
||||
auto_generated_guid: 3d257a03-eb80-41c5-b744-bb37ac7f65c7
|
||||
description: "SocGholish performs whoami discovery commands and outputs the
|
||||
results to a tmp file. \nThe test will generate a filename similar to the
|
||||
random one generated during execution and write the file to AppData\\Temp.\n\nReference:
|
||||
https://redcanary.com/threat-detection-report/threats/socgholish/\n"
|
||||
supported_platforms:
|
||||
- windows
|
||||
input_arguments:
|
||||
output_path:
|
||||
description: Location of output file
|
||||
type: string
|
||||
default: "$env:temp"
|
||||
executor:
|
||||
command: |
|
||||
$TokenSet = @{
|
||||
U = [Char[]]'ABCDEFGHIJKLMNOPQRSTUVWXYZ'
|
||||
N = [Char[]]'0123456789'
|
||||
}
|
||||
$Upper = Get-Random -Count 5 -InputObject $TokenSet.U
|
||||
$Number = Get-Random -Count 5 -InputObject $TokenSet.N
|
||||
$StringSet = $Upper + $Number
|
||||
$rad = (Get-Random -Count 5 -InputObject $StringSet) -join ''
|
||||
$file = "rad" + $rad + ".tmp"
|
||||
|
||||
whoami.exe /all >> #{output_path}\$file
|
||||
cleanup_command: 'Remove-Item -Path $env:temp\rad*.tmp -Force
|
||||
|
||||
'
|
||||
name: powershell
|
||||
T1613:
|
||||
@@ -74360,15 +74541,6 @@ discovery:
|
||||
code 4776 from the domain controller and stores the ouput in C:\\temp. [Reference](https://www.reliaquest.com/blog/socgholish-fakeupdates/)\n"
|
||||
supported_platforms:
|
||||
- windows
|
||||
input_arguments:
|
||||
Domain:
|
||||
description: Domain that is being tested against
|
||||
type: string
|
||||
default: "$env:USERDOMAIN"
|
||||
DomainController:
|
||||
description: Domain Controller that is being tested against
|
||||
type: string
|
||||
default: "$env:UserDnsDomain"
|
||||
executor:
|
||||
command: wmic /node:$env:UserDnsDomain process call create 'wevtutil epl Security
|
||||
C:\Temp\ntlmusers.evtx /q:Event[System[(EventID=4776)]]'
|
||||
|
||||
@@ -16,6 +16,8 @@ Various utilities and commands may acquire this information, including <code>who
|
||||
|
||||
- [Atomic Test #5 - GetCurrent User with PowerShell Script](#atomic-test-5---getcurrent-user-with-powershell-script)
|
||||
|
||||
- [Atomic Test #6 - System Discovery - SocGholish whoami](#atomic-test-6---system-discovery---socgholish-whoami)
|
||||
|
||||
|
||||
<br/>
|
||||
|
||||
@@ -185,4 +187,54 @@ Remove-Item -Path .\CurrentUserObject.txt -Force
|
||||
|
||||
|
||||
|
||||
<br/>
|
||||
<br/>
|
||||
|
||||
## Atomic Test #6 - System Discovery - SocGholish whoami
|
||||
SocGholish performs whoami discovery commands and outputs the results to a tmp file.
|
||||
The test will generate a filename similar to the random one generated during execution and write the file to AppData\Temp.
|
||||
|
||||
Reference: https://redcanary.com/threat-detection-report/threats/socgholish/
|
||||
|
||||
**Supported Platforms:** Windows
|
||||
|
||||
|
||||
**auto_generated_guid:** 3d257a03-eb80-41c5-b744-bb37ac7f65c7
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
#### Inputs:
|
||||
| Name | Description | Type | Default Value |
|
||||
|------|-------------|------|---------------|
|
||||
| output_path | Location of output file | string | $env:temp|
|
||||
|
||||
|
||||
#### Attack Commands: Run with `powershell`!
|
||||
|
||||
|
||||
```powershell
|
||||
$TokenSet = @{
|
||||
U = [Char[]]'ABCDEFGHIJKLMNOPQRSTUVWXYZ'
|
||||
N = [Char[]]'0123456789'
|
||||
}
|
||||
$Upper = Get-Random -Count 5 -InputObject $TokenSet.U
|
||||
$Number = Get-Random -Count 5 -InputObject $TokenSet.N
|
||||
$StringSet = $Upper + $Number
|
||||
$rad = (Get-Random -Count 5 -InputObject $StringSet) -join ''
|
||||
$file = "rad" + $rad + ".tmp"
|
||||
|
||||
whoami.exe /all >> #{output_path}\$file
|
||||
```
|
||||
|
||||
#### Cleanup Commands:
|
||||
```powershell
|
||||
Remove-Item -Path $env:temp\rad*.tmp -Force
|
||||
```
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
<br/>
|
||||
|
||||
@@ -74,3 +74,34 @@ atomic_tests:
|
||||
cleanup_command: |
|
||||
Remove-Item -Path .\CurrentUserObject.txt -Force
|
||||
name: powershell
|
||||
- name: System Discovery - SocGholish whoami
|
||||
auto_generated_guid: 3d257a03-eb80-41c5-b744-bb37ac7f65c7
|
||||
description: |
|
||||
SocGholish performs whoami discovery commands and outputs the results to a tmp file.
|
||||
The test will generate a filename similar to the random one generated during execution and write the file to AppData\Temp.
|
||||
|
||||
Reference: https://redcanary.com/threat-detection-report/threats/socgholish/
|
||||
supported_platforms:
|
||||
- windows
|
||||
input_arguments:
|
||||
output_path:
|
||||
description: Location of output file
|
||||
type: string
|
||||
default: $env:temp
|
||||
executor:
|
||||
command: |
|
||||
$TokenSet = @{
|
||||
U = [Char[]]'ABCDEFGHIJKLMNOPQRSTUVWXYZ'
|
||||
N = [Char[]]'0123456789'
|
||||
}
|
||||
$Upper = Get-Random -Count 5 -InputObject $TokenSet.U
|
||||
$Number = Get-Random -Count 5 -InputObject $TokenSet.N
|
||||
$StringSet = $Upper + $Number
|
||||
$rad = (Get-Random -Count 5 -InputObject $StringSet) -join ''
|
||||
$file = "rad" + $rad + ".tmp"
|
||||
|
||||
whoami.exe /all >> #{output_path}\$file
|
||||
|
||||
cleanup_command: |
|
||||
Remove-Item -Path $env:temp\rad*.tmp -Force
|
||||
name: powershell
|
||||
@@ -10,9 +10,15 @@ Local Accounts may also be abused to elevate privileges and harvest credentials
|
||||
|
||||
- [Atomic Test #2 - Create local account with admin privileges - MacOS](#atomic-test-2---create-local-account-with-admin-privileges---macos)
|
||||
|
||||
- [Atomic Test #3 - WinPwn - Loot local Credentials - powerhell kittie](#atomic-test-3---winpwn---loot-local-credentials---powerhell-kittie)
|
||||
- [Atomic Test #3 - Create local account with admin privileges using sysadminctl utility - MacOS](#atomic-test-3---create-local-account-with-admin-privileges-using-sysadminctl-utility---macos)
|
||||
|
||||
- [Atomic Test #4 - WinPwn - Loot local Credentials - Safetykatz](#atomic-test-4---winpwn---loot-local-credentials---safetykatz)
|
||||
- [Atomic Test #4 - Enable root account using dsenableroot utility - MacOS](#atomic-test-4---enable-root-account-using-dsenableroot-utility---macos)
|
||||
|
||||
- [Atomic Test #5 - Add a new/existing user to the admin group using dseditgroup utility - macOS](#atomic-test-5---add-a-newexisting-user-to-the-admin-group-using-dseditgroup-utility---macos)
|
||||
|
||||
- [Atomic Test #6 - WinPwn - Loot local Credentials - powerhell kittie](#atomic-test-6---winpwn---loot-local-credentials---powerhell-kittie)
|
||||
|
||||
- [Atomic Test #7 - WinPwn - Loot local Credentials - Safetykatz](#atomic-test-7---winpwn---loot-local-credentials---safetykatz)
|
||||
|
||||
|
||||
<br/>
|
||||
@@ -96,7 +102,105 @@ sudo dscl . -delete /Users/AtomicUser
|
||||
<br/>
|
||||
<br/>
|
||||
|
||||
## Atomic Test #3 - WinPwn - Loot local Credentials - powerhell kittie
|
||||
## Atomic Test #3 - Create local account with admin privileges using sysadminctl utility - MacOS
|
||||
After execution the new account will be active and added to the Administrators group
|
||||
|
||||
**Supported Platforms:** macOS
|
||||
|
||||
|
||||
**auto_generated_guid:** 191db57d-091a-47d5-99f3-97fde53de505
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
#### Attack Commands: Run with `bash`! Elevation Required (e.g. root or admin)
|
||||
|
||||
|
||||
```bash
|
||||
sysadminctl interactive -addUser art-tester -fullName ARTUser -password !pass123! -admin
|
||||
```
|
||||
|
||||
#### Cleanup Commands:
|
||||
```bash
|
||||
sysadminctl interactive -deleteUser art-tester
|
||||
```
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
<br/>
|
||||
<br/>
|
||||
|
||||
## Atomic Test #4 - Enable root account using dsenableroot utility - MacOS
|
||||
After execution the current/new user will have root access
|
||||
|
||||
**Supported Platforms:** macOS
|
||||
|
||||
|
||||
**auto_generated_guid:** 20b40ea9-0e17-4155-b8e6-244911a678ac
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
#### Attack Commands: Run with `bash`! Elevation Required (e.g. root or admin)
|
||||
|
||||
|
||||
```bash
|
||||
dsenableroot #current user
|
||||
dsenableroot -u art-tester -p art-tester -r art-root #new user
|
||||
```
|
||||
|
||||
#### Cleanup Commands:
|
||||
```bash
|
||||
dsenableroot -d #current user
|
||||
dsenableroot -d -u art-tester -p art-tester #new user
|
||||
```
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
<br/>
|
||||
<br/>
|
||||
|
||||
## Atomic Test #5 - Add a new/existing user to the admin group using dseditgroup utility - macOS
|
||||
After execution the current/new user will be added to the Admin group
|
||||
|
||||
**Supported Platforms:** macOS
|
||||
|
||||
|
||||
**auto_generated_guid:** 433842ba-e796-4fd5-a14f-95d3a1970875
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
#### Attack Commands: Run with `bash`! Elevation Required (e.g. root or admin)
|
||||
|
||||
|
||||
```bash
|
||||
dseditgroup -o edit -a art-user -t user admin
|
||||
```
|
||||
|
||||
#### Cleanup Commands:
|
||||
```bash
|
||||
dseditgroup -o edit -d art-user -t user admin
|
||||
```
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
<br/>
|
||||
<br/>
|
||||
|
||||
## Atomic Test #6 - WinPwn - Loot local Credentials - powerhell kittie
|
||||
Loot local Credentials - powerhell kittie technique via function of WinPwn
|
||||
|
||||
**Supported Platforms:** Windows
|
||||
@@ -126,7 +230,7 @@ obfuskittiedump -consoleoutput -noninteractive
|
||||
<br/>
|
||||
<br/>
|
||||
|
||||
## Atomic Test #4 - WinPwn - Loot local Credentials - Safetykatz
|
||||
## Atomic Test #7 - WinPwn - Loot local Credentials - Safetykatz
|
||||
Loot local Credentials - Safetykatz technique via function of WinPwn
|
||||
|
||||
**Supported Platforms:** Windows
|
||||
|
||||
@@ -3,7 +3,6 @@ display_name: 'Valid Accounts: Local Accounts'
|
||||
atomic_tests:
|
||||
- name: Create local account with admin privileges
|
||||
auto_generated_guid: a524ce99-86de-4db6-b4f9-e08f35a47a15
|
||||
|
||||
description: After execution the new account will be active and added to the Administrators group
|
||||
supported_platforms:
|
||||
- windows
|
||||
@@ -22,7 +21,6 @@ atomic_tests:
|
||||
net user art-test /delete >nul 2>&1
|
||||
name: command_prompt
|
||||
elevation_required: true
|
||||
|
||||
- name: Create local account with admin privileges - MacOS
|
||||
auto_generated_guid: f1275566-1c26-4b66-83e3-7f9f7f964daa
|
||||
description: After execution the new account will be active and added to the Administrators group
|
||||
@@ -42,7 +40,45 @@ atomic_tests:
|
||||
sudo dscl . -delete /Users/AtomicUser
|
||||
name: bash
|
||||
elevation_required: true
|
||||
- name: WinPwn - Loot local Credentials - powerhell kittie
|
||||
- name: Create local account with admin privileges using sysadminctl utility - MacOS
|
||||
auto_generated_guid: 191db57d-091a-47d5-99f3-97fde53de505
|
||||
description: After execution the new account will be active and added to the Administrators group
|
||||
supported_platforms:
|
||||
- macos
|
||||
executor:
|
||||
command: |-
|
||||
sysadminctl interactive -addUser art-tester -fullName ARTUser -password !pass123! -admin
|
||||
cleanup_command: |-
|
||||
sysadminctl interactive -deleteUser art-tester
|
||||
name: bash
|
||||
elevation_required: true
|
||||
- name: Enable root account using dsenableroot utility - MacOS
|
||||
auto_generated_guid: 20b40ea9-0e17-4155-b8e6-244911a678ac
|
||||
description: After execution the current/new user will have root access
|
||||
supported_platforms:
|
||||
- macos
|
||||
executor:
|
||||
command: |-
|
||||
dsenableroot #current user
|
||||
dsenableroot -u art-tester -p art-tester -r art-root #new user
|
||||
cleanup_command: |-
|
||||
dsenableroot -d #current user
|
||||
dsenableroot -d -u art-tester -p art-tester #new user
|
||||
name: bash
|
||||
elevation_required: true
|
||||
- name: Add a new/existing user to the admin group using dseditgroup utility - macOS
|
||||
auto_generated_guid: 433842ba-e796-4fd5-a14f-95d3a1970875
|
||||
description: After execution the current/new user will be added to the Admin group
|
||||
supported_platforms:
|
||||
- macos
|
||||
executor:
|
||||
command: |-
|
||||
dseditgroup -o edit -a art-user -t user admin
|
||||
cleanup_command: |-
|
||||
dseditgroup -o edit -d art-user -t user admin
|
||||
name: bash
|
||||
elevation_required: true
|
||||
- name: WinPwn - Loot local Credentials - powerhell kittie
|
||||
auto_generated_guid: 9e9fd066-453d-442f-88c1-ad7911d32912
|
||||
description: Loot local Credentials - powerhell kittie technique via function of WinPwn
|
||||
supported_platforms:
|
||||
|
||||
@@ -680,12 +680,6 @@ This is done remotely via wmic and captures the event code 4776 from the domain
|
||||
|
||||
|
||||
|
||||
#### Inputs:
|
||||
| Name | Description | Type | Default Value |
|
||||
|------|-------------|------|---------------|
|
||||
| Domain | Domain that is being tested against | string | $env:USERDOMAIN|
|
||||
| DomainController | Domain Controller that is being tested against | string | $env:UserDnsDomain|
|
||||
|
||||
|
||||
#### Attack Commands: Run with `powershell`!
|
||||
|
||||
|
||||
@@ -320,15 +320,6 @@ atomic_tests:
|
||||
This is done remotely via wmic and captures the event code 4776 from the domain controller and stores the ouput in C:\temp. [Reference](https://www.reliaquest.com/blog/socgholish-fakeupdates/)
|
||||
supported_platforms:
|
||||
- windows
|
||||
input_arguments:
|
||||
Domain:
|
||||
description: Domain that is being tested against
|
||||
type: string
|
||||
default: $env:USERDOMAIN
|
||||
DomainController:
|
||||
description: Domain Controller that is being tested against
|
||||
type: string
|
||||
default: $env:UserDnsDomain
|
||||
executor:
|
||||
command: |-
|
||||
wmic /node:$env:UserDnsDomain process call create 'wevtutil epl Security C:\Temp\ntlmusers.evtx /q:Event[System[(EventID=4776)]]'
|
||||
|
||||
@@ -319,7 +319,6 @@ Using Linux Base64 Encoded shell scripts that have Shebang in them. This is comm
|
||||
|------|-------------|------|---------------|
|
||||
| bash_encoded | Encoded | string | IyEvYmluL2Jhc2gKZWNobyAiaHR0cHM6Ly93d3cueW91dHViZS5jb20vQGF0b21pY3NvbmFmcmlkYXkgRlRXIgo=|
|
||||
| dash_encoded | Encoded | string | IyEvYmluL2Rhc2gKZWNobyAiaHR0cHM6Ly93d3cueW91dHViZS5jb20vQGF0b21pY3NvbmFmcmlkYXkgRlRXIgo=|
|
||||
| zsh_encoded | Encoded | string | IyEvYmluL3pzaAplY2hvICJodHRwczovL3d3dy55b3V0dWJlLmNvbS9AYXRvbWljc29uYWZyaWRheSBGVFciCg==|
|
||||
| fish_encoded | Encoded | string | IyEvYmluL2Rhc2gKZWNobyAiaHR0cHM6Ly93d3cueW91dHViZS5jb20vQGF0b21pY3NvbmFmcmlkYXkgRlRXIgo=|
|
||||
| sh_encoded | Encoded | string | IyEvYmluL3NoCmVjaG8gImh0dHBzOi8vd3d3LnlvdXR1YmUuY29tL0BhdG9taWNzb25hZnJpZGF5IEZUVyIK|
|
||||
|
||||
|
||||
@@ -187,10 +187,6 @@ atomic_tests:
|
||||
description: Encoded #!/bin/dash script
|
||||
type: string
|
||||
default: IyEvYmluL2Rhc2gKZWNobyAiaHR0cHM6Ly93d3cueW91dHViZS5jb20vQGF0b21pY3NvbmFmcmlkYXkgRlRXIgo=
|
||||
zsh_encoded:
|
||||
description: Encoded #!/bin/zsh script
|
||||
type: string
|
||||
default: IyEvYmluL3pzaAplY2hvICJodHRwczovL3d3dy55b3V0dWJlLmNvbS9AYXRvbWljc29uYWZyaWRheSBGVFciCg==
|
||||
fish_encoded:
|
||||
description: Encoded #!/bin/fish script
|
||||
type: string
|
||||
@@ -214,4 +210,4 @@ atomic_tests:
|
||||
echo #{dash_encoded} | base64 -d | bash
|
||||
echo #{fish_encoded} | base64 -d | bash
|
||||
echo #{sh_encoded} | base64 -d | bash
|
||||
|
||||
|
||||
|
||||
@@ -0,0 +1,244 @@
|
||||
# T1559 - Inter-Process Communication
|
||||
## [Description from ATT&CK](https://attack.mitre.org/techniques/T1559)
|
||||
<blockquote>Adversaries may abuse inter-process communication (IPC) mechanisms for local code or command execution. IPC is typically used by processes to share data, communicate with each other, or synchronize execution. IPC is also commonly used to avoid situations such as deadlocks, which occurs when processes are stuck in a cyclic waiting pattern.
|
||||
|
||||
Adversaries may abuse IPC to execute arbitrary code or commands. IPC mechanisms may differ depending on OS, but typically exists in a form accessible through programming languages/libraries or native interfaces such as Windows [Dynamic Data Exchange](https://attack.mitre.org/techniques/T1559/002) or [Component Object Model](https://attack.mitre.org/techniques/T1559/001). Linux environments support several different IPC mechanisms, two of which being sockets and pipes.(Citation: Linux IPC) Higher level execution mediums, such as those of [Command and Scripting Interpreter](https://attack.mitre.org/techniques/T1059)s, may also leverage underlying IPC mechanisms. Adversaries may also use [Remote Services](https://attack.mitre.org/techniques/T1021) such as [Distributed Component Object Model](https://attack.mitre.org/techniques/T1021/003) to facilitate remote IPC execution.(Citation: Fireeye Hunting COM June 2019)</blockquote>
|
||||
|
||||
## Atomic Tests
|
||||
|
||||
- [Atomic Test #1 - Cobalt Strike Artifact Kit pipe](#atomic-test-1---cobalt-strike-artifact-kit-pipe)
|
||||
|
||||
- [Atomic Test #2 - Cobalt Strike Lateral Movement (psexec_psh) pipe](#atomic-test-2---cobalt-strike-lateral-movement-psexec_psh-pipe)
|
||||
|
||||
- [Atomic Test #3 - Cobalt Strike SSH (postex_ssh) pipe](#atomic-test-3---cobalt-strike-ssh-postex_ssh-pipe)
|
||||
|
||||
- [Atomic Test #4 - Cobalt Strike post-exploitation pipe (4.2 and later)](#atomic-test-4---cobalt-strike-post-exploitation-pipe-42-and-later)
|
||||
|
||||
- [Atomic Test #5 - Cobalt Strike post-exploitation pipe (before 4.2)](#atomic-test-5---cobalt-strike-post-exploitation-pipe-before-42)
|
||||
|
||||
|
||||
<br/>
|
||||
|
||||
## Atomic Test #1 - Cobalt Strike Artifact Kit pipe
|
||||
Uses the [Named Pipes Micro Emulation](https://github.com/center-for-threat-informed-defense/adversary_emulation_library/tree/master/micro_emulation_plans/src/named_pipes) executable from the Center for Threat Informed Defense to create a named pipe for inter-process communication.
|
||||
|
||||
The named pipe executable will pause for 30 seconds to allow the client and server to exchange a message through the pipe.
|
||||
|
||||
**Supported Platforms:** Windows
|
||||
|
||||
|
||||
**auto_generated_guid:** bd13b9fc-b758-496a-b81a-397462f82c72
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
#### Attack Commands: Run with `command_prompt`!
|
||||
|
||||
|
||||
```cmd
|
||||
"PathToAtomicsFolder\T1559\bin\build\namedpipes_executor.exe" --pipe 1
|
||||
```
|
||||
|
||||
|
||||
|
||||
|
||||
#### Dependencies: Run with `powershell`!
|
||||
##### Description: Named pipe executors must exist on disk
|
||||
##### Check Prereq Commands:
|
||||
```powershell
|
||||
if ((Test-Path PathToAtomicsFolder\T1559\bin\build\namedpipes_executor.exe) -and (Test-Path PathToAtomicsFolder\T1559\bin\build\namedpipes_client.exe) -and (Test-Path PathToAtomicsFolder\T1559\bin\build\namedpipes_server.exe)) {exit 0} else {exit 1}
|
||||
```
|
||||
##### Get Prereq Commands:
|
||||
```powershell
|
||||
[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12
|
||||
IEX (iwr "https://raw.githubusercontent.com/redcanaryco/invoke-atomicredteam/master/Public/Invoke-FetchFromZip.ps1" -UseBasicParsing)
|
||||
$zipUrl = "https://github.com/center-for-threat-informed-defense/adversary_emulation_library/raw/master/micro_emulation_plans/src/named_pipes/named_pipes.zip"
|
||||
Invoke-FetchFromZip $zipUrl "*.exe" "PathToAtomicsFolder\T1559\bin"
|
||||
```
|
||||
|
||||
|
||||
|
||||
|
||||
<br/>
|
||||
<br/>
|
||||
|
||||
## Atomic Test #2 - Cobalt Strike Lateral Movement (psexec_psh) pipe
|
||||
Uses the [Named Pipes Micro Emulation](https://github.com/center-for-threat-informed-defense/adversary_emulation_library/tree/master/micro_emulation_plans/src/named_pipes) executable from the Center for Threat Informed Defense to create a named pipe for inter-process communication.
|
||||
|
||||
The named pipe executable will pause for 30 seconds to allow the client and server to exchange a message through the pipe.
|
||||
|
||||
**Supported Platforms:** Windows
|
||||
|
||||
|
||||
**auto_generated_guid:** 830c8b6c-7a70-4f40-b975-8bbe74558acd
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
#### Attack Commands: Run with `command_prompt`!
|
||||
|
||||
|
||||
```cmd
|
||||
"PathToAtomicsFolder\T1559\bin\build\namedpipes_executor.exe" --pipe 2
|
||||
```
|
||||
|
||||
|
||||
|
||||
|
||||
#### Dependencies: Run with `powershell`!
|
||||
##### Description: Named pipe executors must exist on disk
|
||||
##### Check Prereq Commands:
|
||||
```powershell
|
||||
if ((Test-Path PathToAtomicsFolder\T1559\bin\build\namedpipes_executor.exe) -and (Test-Path PathToAtomicsFolder\T1559\bin\build\namedpipes_client.exe) -and (Test-Path PathToAtomicsFolder\T1559\bin\build\namedpipes_server.exe)) {exit 0} else {exit 1}
|
||||
```
|
||||
##### Get Prereq Commands:
|
||||
```powershell
|
||||
[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12
|
||||
IEX (iwr "https://raw.githubusercontent.com/redcanaryco/invoke-atomicredteam/master/Public/Invoke-FetchFromZip.ps1" -UseBasicParsing)
|
||||
$zipUrl = "https://github.com/center-for-threat-informed-defense/adversary_emulation_library/raw/master/micro_emulation_plans/src/named_pipes/named_pipes.zip"
|
||||
Invoke-FetchFromZip $zipUrl "*.exe" "PathToAtomicsFolder\T1559\bin"
|
||||
```
|
||||
|
||||
|
||||
|
||||
|
||||
<br/>
|
||||
<br/>
|
||||
|
||||
## Atomic Test #3 - Cobalt Strike SSH (postex_ssh) pipe
|
||||
Uses the [Named Pipes Micro Emulation](https://github.com/center-for-threat-informed-defense/adversary_emulation_library/tree/master/micro_emulation_plans/src/named_pipes) executable from the Center for Threat Informed Defense to create a named pipe for inter-process communication.
|
||||
|
||||
The named pipe executable will pause for 30 seconds to allow the client and server to exchange a message through the pipe.
|
||||
|
||||
**Supported Platforms:** Windows
|
||||
|
||||
|
||||
**auto_generated_guid:** d1f72fa0-5bc2-4b4b-bd1e-43b6e8cfb2e6
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
#### Attack Commands: Run with `command_prompt`!
|
||||
|
||||
|
||||
```cmd
|
||||
"PathToAtomicsFolder\T1559\bin\build\namedpipes_executor.exe" --pipe 3
|
||||
```
|
||||
|
||||
|
||||
|
||||
|
||||
#### Dependencies: Run with `powershell`!
|
||||
##### Description: Named pipe executors must exist on disk
|
||||
##### Check Prereq Commands:
|
||||
```powershell
|
||||
if ((Test-Path PathToAtomicsFolder\T1559\bin\build\namedpipes_executor.exe) -and (Test-Path PathToAtomicsFolder\T1559\bin\build\namedpipes_client.exe) -and (Test-Path PathToAtomicsFolder\T1559\bin\build\namedpipes_server.exe)) {exit 0} else {exit 1}
|
||||
```
|
||||
##### Get Prereq Commands:
|
||||
```powershell
|
||||
[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12
|
||||
IEX (iwr "https://raw.githubusercontent.com/redcanaryco/invoke-atomicredteam/master/Public/Invoke-FetchFromZip.ps1" -UseBasicParsing)
|
||||
$zipUrl = "https://github.com/center-for-threat-informed-defense/adversary_emulation_library/raw/master/micro_emulation_plans/src/named_pipes/named_pipes.zip"
|
||||
Invoke-FetchFromZip $zipUrl "*.exe" "PathToAtomicsFolder\T1559\bin"
|
||||
```
|
||||
|
||||
|
||||
|
||||
|
||||
<br/>
|
||||
<br/>
|
||||
|
||||
## Atomic Test #4 - Cobalt Strike post-exploitation pipe (4.2 and later)
|
||||
Uses the [Named Pipes Micro Emulation](https://github.com/center-for-threat-informed-defense/adversary_emulation_library/tree/master/micro_emulation_plans/src/named_pipes) executable from the Center for Threat Informed Defense to create a named pipe for inter-process communication.
|
||||
|
||||
The named pipe executable will pause for 30 seconds to allow the client and server to exchange a message through the pipe.
|
||||
|
||||
**Supported Platforms:** Windows
|
||||
|
||||
|
||||
**auto_generated_guid:** 7a48f482-246f-4aeb-9837-21c271ebf244
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
#### Attack Commands: Run with `command_prompt`!
|
||||
|
||||
|
||||
```cmd
|
||||
"PathToAtomicsFolder\T1559\bin\build\namedpipes_executor.exe" --pipe 4
|
||||
```
|
||||
|
||||
|
||||
|
||||
|
||||
#### Dependencies: Run with `powershell`!
|
||||
##### Description: Named pipe executors must exist on disk
|
||||
##### Check Prereq Commands:
|
||||
```powershell
|
||||
if ((Test-Path PathToAtomicsFolder\T1559\bin\build\namedpipes_executor.exe) -and (Test-Path PathToAtomicsFolder\T1559\bin\build\namedpipes_client.exe) -and (Test-Path PathToAtomicsFolder\T1559\bin\build\namedpipes_server.exe)) {exit 0} else {exit 1}
|
||||
```
|
||||
##### Get Prereq Commands:
|
||||
```powershell
|
||||
[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12
|
||||
IEX (iwr "https://raw.githubusercontent.com/redcanaryco/invoke-atomicredteam/master/Public/Invoke-FetchFromZip.ps1" -UseBasicParsing)
|
||||
$zipUrl = "https://github.com/center-for-threat-informed-defense/adversary_emulation_library/raw/master/micro_emulation_plans/src/named_pipes/named_pipes.zip"
|
||||
Invoke-FetchFromZip $zipUrl "*.exe" "PathToAtomicsFolder\T1559\bin"
|
||||
```
|
||||
|
||||
|
||||
|
||||
|
||||
<br/>
|
||||
<br/>
|
||||
|
||||
## Atomic Test #5 - Cobalt Strike post-exploitation pipe (before 4.2)
|
||||
Uses the [Named Pipes Micro Emulation](https://github.com/center-for-threat-informed-defense/adversary_emulation_library/tree/master/micro_emulation_plans/src/named_pipes) executable from the Center for Threat Informed Defense to create a named pipe for inter-process communication.
|
||||
|
||||
The named pipe executable will pause for 30 seconds to allow the client and server to exchange a message through the pipe.
|
||||
|
||||
**Supported Platforms:** Windows
|
||||
|
||||
|
||||
**auto_generated_guid:** 8dbfc15c-527b-4ab0-a272-019f469d367f
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
#### Attack Commands: Run with `command_prompt`!
|
||||
|
||||
|
||||
```cmd
|
||||
"PathToAtomicsFolder\T1559\bin\build\namedpipes_executor.exe" --pipe 5
|
||||
```
|
||||
|
||||
|
||||
|
||||
|
||||
#### Dependencies: Run with `powershell`!
|
||||
##### Description: Named pipe executors must exist on disk
|
||||
##### Check Prereq Commands:
|
||||
```powershell
|
||||
if ((Test-Path PathToAtomicsFolder\T1559\bin\build\namedpipes_executor.exe) -and (Test-Path PathToAtomicsFolder\T1559\bin\build\namedpipes_client.exe) -and (Test-Path PathToAtomicsFolder\T1559\bin\build\namedpipes_server.exe)) {exit 0} else {exit 1}
|
||||
```
|
||||
##### Get Prereq Commands:
|
||||
```powershell
|
||||
[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12
|
||||
IEX (iwr "https://raw.githubusercontent.com/redcanaryco/invoke-atomicredteam/master/Public/Invoke-FetchFromZip.ps1" -UseBasicParsing)
|
||||
$zipUrl = "https://github.com/center-for-threat-informed-defense/adversary_emulation_library/raw/master/micro_emulation_plans/src/named_pipes/named_pipes.zip"
|
||||
Invoke-FetchFromZip $zipUrl "*.exe" "PathToAtomicsFolder\T1559\bin"
|
||||
```
|
||||
|
||||
|
||||
|
||||
|
||||
<br/>
|
||||
@@ -0,0 +1,123 @@
|
||||
attack_technique: T1559
|
||||
display_name: Inter-Process Communication
|
||||
atomic_tests:
|
||||
|
||||
- name: Cobalt Strike Artifact Kit pipe
|
||||
auto_generated_guid: bd13b9fc-b758-496a-b81a-397462f82c72
|
||||
description: |
|
||||
Uses the [Named Pipes Micro Emulation](https://github.com/center-for-threat-informed-defense/adversary_emulation_library/tree/master/micro_emulation_plans/src/named_pipes) executable from the Center for Threat Informed Defense to create a named pipe for inter-process communication.
|
||||
|
||||
The named pipe executable will pause for 30 seconds to allow the client and server to exchange a message through the pipe.
|
||||
supported_platforms:
|
||||
- windows
|
||||
dependency_executor_name: powershell
|
||||
dependencies:
|
||||
- description: |
|
||||
Named pipe executors must exist on disk
|
||||
prereq_command: |
|
||||
if ((Test-Path PathToAtomicsFolder\T1559\bin\build\namedpipes_executor.exe) -and (Test-Path PathToAtomicsFolder\T1559\bin\build\namedpipes_client.exe) -and (Test-Path PathToAtomicsFolder\T1559\bin\build\namedpipes_server.exe)) {exit 0} else {exit 1}
|
||||
get_prereq_command: |
|
||||
[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12
|
||||
IEX (iwr "https://raw.githubusercontent.com/redcanaryco/invoke-atomicredteam/master/Public/Invoke-FetchFromZip.ps1" -UseBasicParsing)
|
||||
$zipUrl = "https://github.com/center-for-threat-informed-defense/adversary_emulation_library/raw/master/micro_emulation_plans/src/named_pipes/named_pipes.zip"
|
||||
Invoke-FetchFromZip $zipUrl "*.exe" "PathToAtomicsFolder\T1559\bin"
|
||||
executor:
|
||||
command: |
|
||||
"PathToAtomicsFolder\T1559\bin\build\namedpipes_executor.exe" --pipe 1
|
||||
name: command_prompt
|
||||
|
||||
- name: Cobalt Strike Lateral Movement (psexec_psh) pipe
|
||||
auto_generated_guid: 830c8b6c-7a70-4f40-b975-8bbe74558acd
|
||||
description: |
|
||||
Uses the [Named Pipes Micro Emulation](https://github.com/center-for-threat-informed-defense/adversary_emulation_library/tree/master/micro_emulation_plans/src/named_pipes) executable from the Center for Threat Informed Defense to create a named pipe for inter-process communication.
|
||||
|
||||
The named pipe executable will pause for 30 seconds to allow the client and server to exchange a message through the pipe.
|
||||
supported_platforms:
|
||||
- windows
|
||||
dependency_executor_name: powershell
|
||||
dependencies:
|
||||
- description: |
|
||||
Named pipe executors must exist on disk
|
||||
prereq_command: |
|
||||
if ((Test-Path PathToAtomicsFolder\T1559\bin\build\namedpipes_executor.exe) -and (Test-Path PathToAtomicsFolder\T1559\bin\build\namedpipes_client.exe) -and (Test-Path PathToAtomicsFolder\T1559\bin\build\namedpipes_server.exe)) {exit 0} else {exit 1}
|
||||
get_prereq_command: |
|
||||
[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12
|
||||
IEX (iwr "https://raw.githubusercontent.com/redcanaryco/invoke-atomicredteam/master/Public/Invoke-FetchFromZip.ps1" -UseBasicParsing)
|
||||
$zipUrl = "https://github.com/center-for-threat-informed-defense/adversary_emulation_library/raw/master/micro_emulation_plans/src/named_pipes/named_pipes.zip"
|
||||
Invoke-FetchFromZip $zipUrl "*.exe" "PathToAtomicsFolder\T1559\bin"
|
||||
executor:
|
||||
command: |
|
||||
"PathToAtomicsFolder\T1559\bin\build\namedpipes_executor.exe" --pipe 2
|
||||
name: command_prompt
|
||||
|
||||
- name: Cobalt Strike SSH (postex_ssh) pipe
|
||||
auto_generated_guid: d1f72fa0-5bc2-4b4b-bd1e-43b6e8cfb2e6
|
||||
description: |
|
||||
Uses the [Named Pipes Micro Emulation](https://github.com/center-for-threat-informed-defense/adversary_emulation_library/tree/master/micro_emulation_plans/src/named_pipes) executable from the Center for Threat Informed Defense to create a named pipe for inter-process communication.
|
||||
|
||||
The named pipe executable will pause for 30 seconds to allow the client and server to exchange a message through the pipe.
|
||||
supported_platforms:
|
||||
- windows
|
||||
dependency_executor_name: powershell
|
||||
dependencies:
|
||||
- description: |
|
||||
Named pipe executors must exist on disk
|
||||
prereq_command: |
|
||||
if ((Test-Path PathToAtomicsFolder\T1559\bin\build\namedpipes_executor.exe) -and (Test-Path PathToAtomicsFolder\T1559\bin\build\namedpipes_client.exe) -and (Test-Path PathToAtomicsFolder\T1559\bin\build\namedpipes_server.exe)) {exit 0} else {exit 1}
|
||||
get_prereq_command: |
|
||||
[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12
|
||||
IEX (iwr "https://raw.githubusercontent.com/redcanaryco/invoke-atomicredteam/master/Public/Invoke-FetchFromZip.ps1" -UseBasicParsing)
|
||||
$zipUrl = "https://github.com/center-for-threat-informed-defense/adversary_emulation_library/raw/master/micro_emulation_plans/src/named_pipes/named_pipes.zip"
|
||||
Invoke-FetchFromZip $zipUrl "*.exe" "PathToAtomicsFolder\T1559\bin"
|
||||
executor:
|
||||
command: |
|
||||
"PathToAtomicsFolder\T1559\bin\build\namedpipes_executor.exe" --pipe 3
|
||||
name: command_prompt
|
||||
|
||||
- name: Cobalt Strike post-exploitation pipe (4.2 and later)
|
||||
auto_generated_guid: 7a48f482-246f-4aeb-9837-21c271ebf244
|
||||
description: |
|
||||
Uses the [Named Pipes Micro Emulation](https://github.com/center-for-threat-informed-defense/adversary_emulation_library/tree/master/micro_emulation_plans/src/named_pipes) executable from the Center for Threat Informed Defense to create a named pipe for inter-process communication.
|
||||
|
||||
The named pipe executable will pause for 30 seconds to allow the client and server to exchange a message through the pipe.
|
||||
supported_platforms:
|
||||
- windows
|
||||
dependency_executor_name: powershell
|
||||
dependencies:
|
||||
- description: |
|
||||
Named pipe executors must exist on disk
|
||||
prereq_command: |
|
||||
if ((Test-Path PathToAtomicsFolder\T1559\bin\build\namedpipes_executor.exe) -and (Test-Path PathToAtomicsFolder\T1559\bin\build\namedpipes_client.exe) -and (Test-Path PathToAtomicsFolder\T1559\bin\build\namedpipes_server.exe)) {exit 0} else {exit 1}
|
||||
get_prereq_command: |
|
||||
[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12
|
||||
IEX (iwr "https://raw.githubusercontent.com/redcanaryco/invoke-atomicredteam/master/Public/Invoke-FetchFromZip.ps1" -UseBasicParsing)
|
||||
$zipUrl = "https://github.com/center-for-threat-informed-defense/adversary_emulation_library/raw/master/micro_emulation_plans/src/named_pipes/named_pipes.zip"
|
||||
Invoke-FetchFromZip $zipUrl "*.exe" "PathToAtomicsFolder\T1559\bin"
|
||||
executor:
|
||||
command: |
|
||||
"PathToAtomicsFolder\T1559\bin\build\namedpipes_executor.exe" --pipe 4
|
||||
name: command_prompt
|
||||
|
||||
- name: Cobalt Strike post-exploitation pipe (before 4.2)
|
||||
auto_generated_guid: 8dbfc15c-527b-4ab0-a272-019f469d367f
|
||||
description: |
|
||||
Uses the [Named Pipes Micro Emulation](https://github.com/center-for-threat-informed-defense/adversary_emulation_library/tree/master/micro_emulation_plans/src/named_pipes) executable from the Center for Threat Informed Defense to create a named pipe for inter-process communication.
|
||||
|
||||
The named pipe executable will pause for 30 seconds to allow the client and server to exchange a message through the pipe.
|
||||
supported_platforms:
|
||||
- windows
|
||||
dependency_executor_name: powershell
|
||||
dependencies:
|
||||
- description: |
|
||||
Named pipe executors must exist on disk
|
||||
prereq_command: |
|
||||
if ((Test-Path PathToAtomicsFolder\T1559\bin\build\namedpipes_executor.exe) -and (Test-Path PathToAtomicsFolder\T1559\bin\build\namedpipes_client.exe) -and (Test-Path PathToAtomicsFolder\T1559\bin\build\namedpipes_server.exe)) {exit 0} else {exit 1}
|
||||
get_prereq_command: |
|
||||
[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12
|
||||
IEX (iwr "https://raw.githubusercontent.com/redcanaryco/invoke-atomicredteam/master/Public/Invoke-FetchFromZip.ps1" -UseBasicParsing)
|
||||
$zipUrl = "https://github.com/center-for-threat-informed-defense/adversary_emulation_library/raw/master/micro_emulation_plans/src/named_pipes/named_pipes.zip"
|
||||
Invoke-FetchFromZip $zipUrl "*.exe" "PathToAtomicsFolder\T1559\bin"
|
||||
executor:
|
||||
command: |
|
||||
"PathToAtomicsFolder\T1559\bin\build\namedpipes_executor.exe" --pipe 5
|
||||
name: command_prompt
|
||||
@@ -76,11 +76,6 @@ Attackers who have permissions, can run malicious commands in containers in the
|
||||
|
||||
|
||||
|
||||
#### Inputs:
|
||||
| Name | Description | Type | Default Value |
|
||||
|------|-------------|------|---------------|
|
||||
| command | Command to run | string | cat|
|
||||
|
||||
|
||||
#### Attack Commands: Run with `bash`!
|
||||
|
||||
|
||||
@@ -38,11 +38,6 @@ atomic_tests:
|
||||
|
||||
supported_platforms:
|
||||
- containers
|
||||
input_arguments:
|
||||
command:
|
||||
description: Command to run
|
||||
type: string
|
||||
default: cat
|
||||
dependencies:
|
||||
- description: |
|
||||
docker must be installed
|
||||
|
||||
@@ -1257,3 +1257,12 @@ b8a563d4-a836-4993-a74e-0a19b8481bfe
|
||||
e62d23ef-3153-4837-8625-fa4a3829134d
|
||||
228c7498-be31-48e9-83b7-9cb906504ec8
|
||||
348f4d14-4bd3-4f6b-bd8a-61237f78b3ac
|
||||
bd13b9fc-b758-496a-b81a-397462f82c72
|
||||
830c8b6c-7a70-4f40-b975-8bbe74558acd
|
||||
d1f72fa0-5bc2-4b4b-bd1e-43b6e8cfb2e6
|
||||
7a48f482-246f-4aeb-9837-21c271ebf244
|
||||
8dbfc15c-527b-4ab0-a272-019f469d367f
|
||||
3d257a03-eb80-41c5-b744-bb37ac7f65c7
|
||||
191db57d-091a-47d5-99f3-97fde53de505
|
||||
20b40ea9-0e17-4155-b8e6-244911a678ac
|
||||
433842ba-e796-4fd5-a14f-95d3a1970875
|
||||
|
||||
Reference in New Issue
Block a user