diff --git a/atomics/T1082/T1082.yaml b/atomics/T1082/T1082.yaml index 5f8e550c..d1642315 100644 --- a/atomics/T1082/T1082.yaml +++ b/atomics/T1082/T1082.yaml @@ -157,6 +157,7 @@ atomic_tests: csrutil status name: sh - name: WinPwn - winPEAS + auto_generated_guid: eea1d918-825e-47dd-acc2-814d6c58c0e1 description: Discover Local Privilege Escalation possibilities using winPEAS function of WinPwn supported_platforms: - windows @@ -167,6 +168,7 @@ atomic_tests: winPEAS -noninteractive -consoleoutput name: powershell - name: WinPwn - itm4nprivesc + auto_generated_guid: 3d256a2f-5e57-4003-8eb6-64d91b1da7ce description: Discover Local Privilege Escalation possibilities using itm4nprivesc function of WinPwn supported_platforms: - windows @@ -177,6 +179,7 @@ atomic_tests: itm4nprivesc -noninteractive -consoleoutput name: powershell - name: WinPwn - Powersploits privesc checks + auto_generated_guid: 345cb8e4-d2de-4011-a580-619cf5a9e2d7 description: Powersploits privesc checks using oldchecks function of WinPwn supported_platforms: - windows @@ -193,6 +196,7 @@ atomic_tests: rm -force -recurse .\Vulnerabilities -ErrorAction Ignore name: powershell - name: WinPwn - General privesc checks + auto_generated_guid: 5b6f39a2-6ec7-4783-a5fd-2c54a55409ed description: General privesc checks using the otherchecks function of WinPwn supported_platforms: - windows @@ -203,6 +207,7 @@ atomic_tests: otherchecks -noninteractive -consoleoutput name: powershell - name: WinPwn - GeneralRecon + auto_generated_guid: 7804659b-fdbf-4cf6-b06a-c03e758590e8 description: Collect general computer informations via GeneralRecon function of WinPwn supported_platforms: - windows @@ -213,6 +218,7 @@ atomic_tests: Generalrecon -consoleoutput -noninteractive name: powershell - name: WinPwn - Morerecon + auto_generated_guid: 3278b2f6-f733-4875-9ef4-bfed34244f0a description: Gathers local system information using the Morerecon function of WinPwn supported_platforms: - windows @@ -223,6 +229,7 @@ atomic_tests: Morerecon -noninteractive -consoleoutput name: powershell - name: WinPwn - RBCD-Check + auto_generated_guid: dec6a0d8-bcaf-4c22-9d48-2aee59fb692b description: Search for Resource-Based Constrained Delegation attack paths using RBCD-Check function of WinPwn supported_platforms: - windows diff --git a/atomics/used_guids.txt b/atomics/used_guids.txt index 5ccac7ce..026a6c7d 100644 --- a/atomics/used_guids.txt +++ b/atomics/used_guids.txt @@ -992,3 +992,10 @@ fdd0c913-714b-4c13-b40f-1824d6c015f2 75f66e03-37d3-4704-9520-3210efbe33ce 00e3e3c7-6c3c-455e-bd4b-461c7f0e7797 c9dc9de3-f961-4284-bd2d-f959c9f9fda5 +eea1d918-825e-47dd-acc2-814d6c58c0e1 +3d256a2f-5e57-4003-8eb6-64d91b1da7ce +345cb8e4-d2de-4011-a580-619cf5a9e2d7 +5b6f39a2-6ec7-4783-a5fd-2c54a55409ed +7804659b-fdbf-4cf6-b06a-c03e758590e8 +3278b2f6-f733-4875-9ef4-bfed34244f0a +dec6a0d8-bcaf-4c22-9d48-2aee59fb692b