Files
atomic-red-team/atomics/T1595.003/T1595.003.yaml
2025-01-12 22:43:13 +00:00

35 lines
1.2 KiB
YAML

attack_technique: T1595.003
display_name: 'Active Scanning: Wordlist Scanning'
atomic_tests:
- name: Web Server Wordlist Scan
auto_generated_guid: 89a83c3e-0b39-4c80-99f5-c2aa084098bd
description: |
This test will scan a target system with a wordlist of common directories and file paths.
supported_platforms:
- windows
- linux
- macos
input_arguments:
target:
description: The target system to scan
type: string
default: 'http://localhost'
wordlist:
description: The wordlist to use for scanning
type: path
default: "PathToAtomicsFolder/T1595.003/src/wordlist.txt"
request_timeout:
description: The timeout for each request (in seconds)
type: integer
default: 5
output_file:
description: File to output results to
type: string
default: $env:TMPDIR/wordlist_scan.txt
executor:
command: |
Import-Module "PathToAtomicsFolder/T1595.003/src/WebServerScan.ps1"
Invoke-WordlistScan -Target "#{target}" -Wordlist "#{wordlist}" -Timeout "#{request_timeout}" -OutputFile "#{output_file}"
Write-Host "Scan complete. Results saved to: #{output_file}"
name: powershell