Files
atomic-red-team/atomics/T1482/T1482.yaml
T
Tony M Lambert 5897b9aef1 T1482 Domain Trust Discovery (#495)
* Update ATT&CK json for technique creation

* T1482 - Domain Trust Discovery
2019-05-10 13:56:56 -06:00

32 lines
853 B
YAML

---
attack_technique: T1482
display_name: Domain Trust Discovery
atomic_tests:
- name: Windows - Discover domain trusts with dsquery
description: |
Uses the dsquery command to discover domain trusts.
Requires the installation of dsquery via Windows RSAT or the Windows Server AD DS role.
supported_platforms:
- windows
executor:
name: command_prompt
command: |
dsquery * -filter "(objectClass=trustedDomain)" -attr *
- name: Windows - Discover domain trusts with nltest
description: |
Uses the nltest command to discover domain trusts.
Requires the installation of nltest via Windows RSAT or the Windows Server AD DS role.
This technique has been used by the Trickbot malware family.
supported_platforms:
- windows
executor:
name: command_prompt
command: |
nltest /domain_trusts