Commit Graph

3952 Commits

Author SHA1 Message Date
Leo Verlod df1f3bf6ce Create T1560.003 Test 1 (#1967)
* Create T1560.003 test 1

* Add T1048.003 Test 6

* Delete T1560.003 (moved to T1048.003

Co-authored-by: Carrie Roberts <clr2of8@gmail.com>
2022-05-17 10:51:09 -06:00
Atomic Red Team doc generator 989bef284b Generated docs from job=generate-docs branch=master [ci skip] 2022-05-17 00:07:30 +00:00
Atomic Red Team GUID generator 351ee2e429 Generate GUIDs from job=generate-docs branch=master [skip ci] 2022-05-17 00:07:25 +00:00
Leo Verlod f949628243 Adding T1555.003 Test 14 - Chrome Login Data Access (MacOS) (#1965)
Co-authored-by: Carrie Roberts <clr2of8@gmail.com>
2022-05-16 18:07:01 -06:00
Atomic Red Team doc generator 4c969327d5 Generated docs from job=generate-docs branch=master [ci skip] 2022-05-16 14:38:51 +00:00
Jason Avery d6158d5f8d Fix T1574.006-1 CleanUp (#1968)
Fix sed syntax to properly remove the test library from ld.so.preload.
2022-05-16 08:38:18 -06:00
Atomic Red Team doc generator ef93c45591 Generated docs from job=generate-docs branch=master [ci skip] 2022-05-13 01:57:09 +00:00
Atomic Red Team GUID generator db49bd847c Generate GUIDs from job=generate-docs branch=master [skip ci] 2022-05-13 01:57:04 +00:00
tlor89 73f3c752a4 Update T1555.003.yaml (#1949)
* Update T1555.003.yaml

Loot local Credentials - Invoke-WCMDump technique via function of WinPwn

* Update T1555.003.yaml

added mimi-kittenz for extracting juicy info from memory and Sharpweb gathering Browser Credentials

* Update T1555.003.yaml

update

Co-authored-by: Carrie Roberts <clr2of8@gmail.com>
2022-05-12 19:56:38 -06:00
Atomic Red Team doc generator 812f7dcbaa Generated docs from job=generate-docs branch=master [ci skip] 2022-05-13 01:56:04 +00:00
Atomic Red Team GUID generator b3ab708511 Generate GUIDs from job=generate-docs branch=master [skip ci] 2022-05-13 01:56:00 +00:00
tlor89 3b2e6e7404 Update T1003.002.yaml (#1963)
* Update T1003.002.yaml

add Loot local Credentials - Dump SAM-File for NTLM Hashes technique via function of WinPwn

* Update T1003.002.yaml

updated

* Update T1003.002.yaml

Co-authored-by: Carrie Roberts <clr2of8@gmail.com>
2022-05-12 19:55:35 -06:00
Atomic Red Team doc generator 574a81359d Generated docs from job=generate-docs branch=master [ci skip] 2022-05-13 01:21:21 +00:00
Atomic Red Team GUID generator adebeb27d1 Generate GUIDs from job=generate-docs branch=master [skip ci] 2022-05-13 01:21:16 +00:00
tlor89 b384c8b7ab Update T1555.yaml (#1948)
* Update T1555.yaml

Loot local Credentials - Invoke-WCMDump technique via function of WinPwn
Loot local Credentials - Wifi Credentials technique via function of WinPwn
Loot local Credentials - Decrypt Teamviewer Passwords technique via function of WinPwn

* Update T1555.yaml

added name: powershell

* Update T1555.yaml

Co-authored-by: Carrie Roberts <clr2of8@gmail.com>
2022-05-12 19:20:49 -06:00
Atomic Red Team doc generator 15fd6519a6 Generated docs from job=generate-docs branch=master [ci skip] 2022-05-13 00:48:10 +00:00
Atomic Red Team GUID generator 2d71495086 Generate GUIDs from job=generate-docs branch=master [skip ci] 2022-05-13 00:48:05 +00:00
tlor89 2174daa254 Update T1555.004.yaml (#1964)
Loot local Credentials - Invoke-WCMDump technique via function of WinPwn
2022-05-12 18:47:41 -06:00
Atomic Red Team doc generator cb9c677fa0 Generated docs from job=generate-docs branch=master [ci skip] 2022-05-12 23:56:33 +00:00
Atomic Red Team GUID generator 677a1b13ef Generate GUIDs from job=generate-docs branch=master [skip ci] 2022-05-12 23:56:27 +00:00
tlor89 576d3b2880 Update T1055.001.yaml (#1950)
Get SYSTEM shell - Bind System Shell using UsoClient DLL load technique via function of WinPwn

Co-authored-by: Carrie Roberts <clr2of8@gmail.com>
2022-05-12 17:55:59 -06:00
Atomic Red Team doc generator 9906df5fe8 Generated docs from job=generate-docs branch=master [ci skip] 2022-05-12 23:54:23 +00:00
Atomic Red Team GUID generator e1f3b35ce2 Generate GUIDs from job=generate-docs branch=master [skip ci] 2022-05-12 23:54:17 +00:00
tlor89 7f14e048e0 Update T1082.yaml (#1951)
* Update T1082.yaml

 PowerSharpPack - Seatbelt technique via function of WinPwn performing Local Privileges escalation

* Update T1082.yaml

* Update T1082.yaml

Co-authored-by: Carrie Roberts <clr2of8@gmail.com>
2022-05-12 17:53:54 -06:00
Atomic Red Team doc generator 36a7bbe95f Generated docs from job=generate-docs branch=master [ci skip] 2022-05-12 23:51:19 +00:00
Atomic Red Team GUID generator ff1cdc0f47 Generate GUIDs from job=generate-docs branch=master [skip ci] 2022-05-12 23:51:14 +00:00
tlor89 3b9b4be1af Update T1110.003.yaml (#1952)
DomainPasswordSpray Attacks technique via function of WinPwn

Co-authored-by: Carrie Roberts <clr2of8@gmail.com>
2022-05-12 17:50:49 -06:00
Atomic Red Team doc generator 6085787ee9 Generated docs from job=generate-docs branch=master [ci skip] 2022-05-12 23:40:31 +00:00
Atomic Red Team GUID generator 1e979945fe Generate GUIDs from job=generate-docs branch=master [skip ci] 2022-05-12 23:40:25 +00:00
tlor89 ede5da3745 Update T1134.002.yaml (#1953)
Get SYSTEM shell - Pop System Shell using Token Manipulation technique via function of WinPwn

Co-authored-by: Carrie Roberts <clr2of8@gmail.com>
2022-05-12 17:39:59 -06:00
Atomic Red Team doc generator 175a6c3311 Generated docs from job=generate-docs branch=master [ci skip] 2022-05-12 23:38:30 +00:00
Atomic Red Team GUID generator efac21e57a Generate GUIDs from job=generate-docs branch=master [skip ci] 2022-05-12 23:38:24 +00:00
tlor89 f6f45a0030 Update T1552.001.yaml (#1954)
Loot local Credentials - AWS, Microsoft Azure, and Google Compute credentials technique via function of WinPwn

Co-authored-by: Carrie Roberts <clr2of8@gmail.com>
2022-05-12 17:37:55 -06:00
Atomic Red Team doc generator 139749aa09 Generated docs from job=generate-docs branch=master [ci skip] 2022-05-12 23:36:46 +00:00
Atomic Red Team GUID generator c07f8d9c21 Generate GUIDs from job=generate-docs branch=master [skip ci] 2022-05-12 23:36:41 +00:00
tlor89 4530cd085e Update T1558.003.yaml (#1955)
* Update T1558.003.yaml

Kerberoasting technique via function of WinPwn
PowerSharpPack - Kerberoasting Using Rubeus technique via function of WinPwn

* Update T1558.003.yaml

update fix

* Update T1558.003.yaml

final fix/update

* Update T1558.003.yaml

update and fixed

Co-authored-by: Carrie Roberts <clr2of8@gmail.com>
2022-05-12 17:36:14 -06:00
Atomic Red Team doc generator 88d3944f20 Generated docs from job=generate-docs branch=master [ci skip] 2022-05-12 23:33:52 +00:00
Atomic Red Team GUID generator ebd9e6443f Generate GUIDs from job=generate-docs branch=master [skip ci] 2022-05-12 23:33:47 +00:00
tlor89 8a910c5ed2 Update T1558.004.yaml (#1961)
PowerSharpPack - Kerberoasting Using Rubeus asreproast technique via function of WinPwn

Co-authored-by: Carrie Roberts <clr2of8@gmail.com>
2022-05-12 17:33:22 -06:00
Atomic Red Team doc generator 3ca876233d Generated docs from job=generate-docs branch=master [ci skip] 2022-05-12 23:32:46 +00:00
Atomic Red Team GUID generator da6c2b191b Generate GUIDs from job=generate-docs branch=master [skip ci] 2022-05-12 23:32:41 +00:00
tlor89 9b66e99946 Update T1082.yaml (#1962)
* Update T1082.yaml

PowerSharpPack - Sharpup checking common Privesc vectors technique via function of WinPwn

* Update T1082.yaml

Co-authored-by: Carrie Roberts <clr2of8@gmail.com>
2022-05-12 17:32:15 -06:00
Atomic Red Team doc generator bcd4726426 Generated docs from job=generate-docs branch=master [ci skip] 2022-05-12 22:54:51 +00:00
Atomic Red Team GUID generator e6e2b750d4 Generate GUIDs from job=generate-docs branch=master [skip ci] 2022-05-12 22:54:46 +00:00
tlor89 04edc6cdc1 Update T1562.001.yaml (#1956)
Kill the event log services for stealth via function of WinPwn

Co-authored-by: Carrie Roberts <clr2of8@gmail.com>
2022-05-12 16:54:22 -06:00
Atomic Red Team doc generator d2501a2832 Generated docs from job=generate-docs branch=master [ci skip] 2022-05-12 22:48:37 +00:00
Atomic Red Team GUID generator c288ca084b Generate GUIDs from job=generate-docs branch=master [skip ci] 2022-05-12 22:48:32 +00:00
tlor89 70c82b2c4a Update T1082.yaml (#1958)
PowerSharpPack - Watson searching for missing windows patches  technique via function of WinPwn

Co-authored-by: Carrie Roberts <clr2of8@gmail.com>
2022-05-12 16:48:10 -06:00
Atomic Red Team doc generator 90fab673fc Generated docs from job=generate-docs branch=master [ci skip] 2022-05-12 22:47:25 +00:00
Atomic Red Team GUID generator 6b768e8e12 Generate GUIDs from job=generate-docs branch=master [skip ci] 2022-05-12 22:47:20 +00:00