Leo Verlod
df1f3bf6ce
Create T1560.003 Test 1 ( #1967 )
...
* Create T1560.003 test 1
* Add T1048.003 Test 6
* Delete T1560.003 (moved to T1048.003
Co-authored-by: Carrie Roberts <clr2of8@gmail.com >
2022-05-17 10:51:09 -06:00
Atomic Red Team doc generator
989bef284b
Generated docs from job=generate-docs branch=master [ci skip]
2022-05-17 00:07:30 +00:00
Atomic Red Team GUID generator
351ee2e429
Generate GUIDs from job=generate-docs branch=master [skip ci]
2022-05-17 00:07:25 +00:00
Leo Verlod
f949628243
Adding T1555.003 Test 14 - Chrome Login Data Access (MacOS) ( #1965 )
...
Co-authored-by: Carrie Roberts <clr2of8@gmail.com >
2022-05-16 18:07:01 -06:00
Atomic Red Team doc generator
4c969327d5
Generated docs from job=generate-docs branch=master [ci skip]
2022-05-16 14:38:51 +00:00
Jason Avery
d6158d5f8d
Fix T1574.006-1 CleanUp ( #1968 )
...
Fix sed syntax to properly remove the test library from ld.so.preload.
2022-05-16 08:38:18 -06:00
Atomic Red Team doc generator
ef93c45591
Generated docs from job=generate-docs branch=master [ci skip]
2022-05-13 01:57:09 +00:00
Atomic Red Team GUID generator
db49bd847c
Generate GUIDs from job=generate-docs branch=master [skip ci]
2022-05-13 01:57:04 +00:00
tlor89
73f3c752a4
Update T1555.003.yaml ( #1949 )
...
* Update T1555.003.yaml
Loot local Credentials - Invoke-WCMDump technique via function of WinPwn
* Update T1555.003.yaml
added mimi-kittenz for extracting juicy info from memory and Sharpweb gathering Browser Credentials
* Update T1555.003.yaml
update
Co-authored-by: Carrie Roberts <clr2of8@gmail.com >
2022-05-12 19:56:38 -06:00
Atomic Red Team doc generator
812f7dcbaa
Generated docs from job=generate-docs branch=master [ci skip]
2022-05-13 01:56:04 +00:00
Atomic Red Team GUID generator
b3ab708511
Generate GUIDs from job=generate-docs branch=master [skip ci]
2022-05-13 01:56:00 +00:00
tlor89
3b2e6e7404
Update T1003.002.yaml ( #1963 )
...
* Update T1003.002.yaml
add Loot local Credentials - Dump SAM-File for NTLM Hashes technique via function of WinPwn
* Update T1003.002.yaml
updated
* Update T1003.002.yaml
Co-authored-by: Carrie Roberts <clr2of8@gmail.com >
2022-05-12 19:55:35 -06:00
Atomic Red Team doc generator
574a81359d
Generated docs from job=generate-docs branch=master [ci skip]
2022-05-13 01:21:21 +00:00
Atomic Red Team GUID generator
adebeb27d1
Generate GUIDs from job=generate-docs branch=master [skip ci]
2022-05-13 01:21:16 +00:00
tlor89
b384c8b7ab
Update T1555.yaml ( #1948 )
...
* Update T1555.yaml
Loot local Credentials - Invoke-WCMDump technique via function of WinPwn
Loot local Credentials - Wifi Credentials technique via function of WinPwn
Loot local Credentials - Decrypt Teamviewer Passwords technique via function of WinPwn
* Update T1555.yaml
added name: powershell
* Update T1555.yaml
Co-authored-by: Carrie Roberts <clr2of8@gmail.com >
2022-05-12 19:20:49 -06:00
Atomic Red Team doc generator
15fd6519a6
Generated docs from job=generate-docs branch=master [ci skip]
2022-05-13 00:48:10 +00:00
Atomic Red Team GUID generator
2d71495086
Generate GUIDs from job=generate-docs branch=master [skip ci]
2022-05-13 00:48:05 +00:00
tlor89
2174daa254
Update T1555.004.yaml ( #1964 )
...
Loot local Credentials - Invoke-WCMDump technique via function of WinPwn
2022-05-12 18:47:41 -06:00
Atomic Red Team doc generator
cb9c677fa0
Generated docs from job=generate-docs branch=master [ci skip]
2022-05-12 23:56:33 +00:00
Atomic Red Team GUID generator
677a1b13ef
Generate GUIDs from job=generate-docs branch=master [skip ci]
2022-05-12 23:56:27 +00:00
tlor89
576d3b2880
Update T1055.001.yaml ( #1950 )
...
Get SYSTEM shell - Bind System Shell using UsoClient DLL load technique via function of WinPwn
Co-authored-by: Carrie Roberts <clr2of8@gmail.com >
2022-05-12 17:55:59 -06:00
Atomic Red Team doc generator
9906df5fe8
Generated docs from job=generate-docs branch=master [ci skip]
2022-05-12 23:54:23 +00:00
Atomic Red Team GUID generator
e1f3b35ce2
Generate GUIDs from job=generate-docs branch=master [skip ci]
2022-05-12 23:54:17 +00:00
tlor89
7f14e048e0
Update T1082.yaml ( #1951 )
...
* Update T1082.yaml
PowerSharpPack - Seatbelt technique via function of WinPwn performing Local Privileges escalation
* Update T1082.yaml
* Update T1082.yaml
Co-authored-by: Carrie Roberts <clr2of8@gmail.com >
2022-05-12 17:53:54 -06:00
Atomic Red Team doc generator
36a7bbe95f
Generated docs from job=generate-docs branch=master [ci skip]
2022-05-12 23:51:19 +00:00
Atomic Red Team GUID generator
ff1cdc0f47
Generate GUIDs from job=generate-docs branch=master [skip ci]
2022-05-12 23:51:14 +00:00
tlor89
3b9b4be1af
Update T1110.003.yaml ( #1952 )
...
DomainPasswordSpray Attacks technique via function of WinPwn
Co-authored-by: Carrie Roberts <clr2of8@gmail.com >
2022-05-12 17:50:49 -06:00
Atomic Red Team doc generator
6085787ee9
Generated docs from job=generate-docs branch=master [ci skip]
2022-05-12 23:40:31 +00:00
Atomic Red Team GUID generator
1e979945fe
Generate GUIDs from job=generate-docs branch=master [skip ci]
2022-05-12 23:40:25 +00:00
tlor89
ede5da3745
Update T1134.002.yaml ( #1953 )
...
Get SYSTEM shell - Pop System Shell using Token Manipulation technique via function of WinPwn
Co-authored-by: Carrie Roberts <clr2of8@gmail.com >
2022-05-12 17:39:59 -06:00
Atomic Red Team doc generator
175a6c3311
Generated docs from job=generate-docs branch=master [ci skip]
2022-05-12 23:38:30 +00:00
Atomic Red Team GUID generator
efac21e57a
Generate GUIDs from job=generate-docs branch=master [skip ci]
2022-05-12 23:38:24 +00:00
tlor89
f6f45a0030
Update T1552.001.yaml ( #1954 )
...
Loot local Credentials - AWS, Microsoft Azure, and Google Compute credentials technique via function of WinPwn
Co-authored-by: Carrie Roberts <clr2of8@gmail.com >
2022-05-12 17:37:55 -06:00
Atomic Red Team doc generator
139749aa09
Generated docs from job=generate-docs branch=master [ci skip]
2022-05-12 23:36:46 +00:00
Atomic Red Team GUID generator
c07f8d9c21
Generate GUIDs from job=generate-docs branch=master [skip ci]
2022-05-12 23:36:41 +00:00
tlor89
4530cd085e
Update T1558.003.yaml ( #1955 )
...
* Update T1558.003.yaml
Kerberoasting technique via function of WinPwn
PowerSharpPack - Kerberoasting Using Rubeus technique via function of WinPwn
* Update T1558.003.yaml
update fix
* Update T1558.003.yaml
final fix/update
* Update T1558.003.yaml
update and fixed
Co-authored-by: Carrie Roberts <clr2of8@gmail.com >
2022-05-12 17:36:14 -06:00
Atomic Red Team doc generator
88d3944f20
Generated docs from job=generate-docs branch=master [ci skip]
2022-05-12 23:33:52 +00:00
Atomic Red Team GUID generator
ebd9e6443f
Generate GUIDs from job=generate-docs branch=master [skip ci]
2022-05-12 23:33:47 +00:00
tlor89
8a910c5ed2
Update T1558.004.yaml ( #1961 )
...
PowerSharpPack - Kerberoasting Using Rubeus asreproast technique via function of WinPwn
Co-authored-by: Carrie Roberts <clr2of8@gmail.com >
2022-05-12 17:33:22 -06:00
Atomic Red Team doc generator
3ca876233d
Generated docs from job=generate-docs branch=master [ci skip]
2022-05-12 23:32:46 +00:00
Atomic Red Team GUID generator
da6c2b191b
Generate GUIDs from job=generate-docs branch=master [skip ci]
2022-05-12 23:32:41 +00:00
tlor89
9b66e99946
Update T1082.yaml ( #1962 )
...
* Update T1082.yaml
PowerSharpPack - Sharpup checking common Privesc vectors technique via function of WinPwn
* Update T1082.yaml
Co-authored-by: Carrie Roberts <clr2of8@gmail.com >
2022-05-12 17:32:15 -06:00
Atomic Red Team doc generator
bcd4726426
Generated docs from job=generate-docs branch=master [ci skip]
2022-05-12 22:54:51 +00:00
Atomic Red Team GUID generator
e6e2b750d4
Generate GUIDs from job=generate-docs branch=master [skip ci]
2022-05-12 22:54:46 +00:00
tlor89
04edc6cdc1
Update T1562.001.yaml ( #1956 )
...
Kill the event log services for stealth via function of WinPwn
Co-authored-by: Carrie Roberts <clr2of8@gmail.com >
2022-05-12 16:54:22 -06:00
Atomic Red Team doc generator
d2501a2832
Generated docs from job=generate-docs branch=master [ci skip]
2022-05-12 22:48:37 +00:00
Atomic Red Team GUID generator
c288ca084b
Generate GUIDs from job=generate-docs branch=master [skip ci]
2022-05-12 22:48:32 +00:00
tlor89
70c82b2c4a
Update T1082.yaml ( #1958 )
...
PowerSharpPack - Watson searching for missing windows patches technique via function of WinPwn
Co-authored-by: Carrie Roberts <clr2of8@gmail.com >
2022-05-12 16:48:10 -06:00
Atomic Red Team doc generator
90fab673fc
Generated docs from job=generate-docs branch=master [ci skip]
2022-05-12 22:47:25 +00:00
Atomic Red Team GUID generator
6b768e8e12
Generate GUIDs from job=generate-docs branch=master [skip ci]
2022-05-12 22:47:20 +00:00