Files
atomic-red-team/atomics/T1176/T1176.yaml
T
Carrie Roberts 0859cb997a removing descriptions of xxx (left over from template) (#546)
* removing descriptions of xxx (left over from template)

* update input param descriptions

* description update

* removing descriptions of xxx (left over from template)
2019-09-03 14:11:18 -06:00

55 lines
1.1 KiB
YAML

---
attack_technique: T1176
display_name: Browser Extensions
atomic_tests:
- name: Chrome (Developer Mode)
description: |
supported_platforms:
- linux
- windows
- macos
executor:
name: manual
steps: |
1. Navigate to [chrome://extensions](chrome://extensions) and
tick 'Developer Mode'.
2. Click 'Load unpacked extension...' and navigate to
[Browser_Extension](../t1176/)
3. Click 'Select'
- name: Chrome (Chrome Web Store)
description: |
supported_platforms:
- linux
- windows
- macos
executor:
name: manual
steps: |
1. Navigate to https://chrome.google.com/webstore/detail/minimum-viable-malicious/odlpfdolehmhciiebahbpnaopneicend
in Chrome
2. Click 'Add to Chrome'
- name: Firefox
description: |
Create a file called test.wma, with the duration of 30 seconds
supported_platforms:
- linux
- windows
- macos
executor:
name: manual
steps: |
1. Navigate to [about:debugging](about:debugging) and
click "Load Temporary Add-on"
2. Navigate to [manifest.json](./manifest.json)
3. Then click 'Open'