Files
atomic-red-team/atomic_red_team/test_data/url_parsing.yaml
T
Hare Sudhan 82fc8d41cc Add tests for python code (#2759)
* add tests for python code

* ruff format
2024-04-27 12:38:14 -05:00

19 lines
503 B
YAML

attack_technique: T1003
display_name: OS Credential Dumping
atomic_tests:
- name: Gsecdump
auto_generated_guid: 0f7c5301-6859-45ba-8b4d-1fac30fc31ed
description: |
Dump credentials from memory using Gsecdump.
supported_platforms:
- windows
input_arguments:
gsecdump_exe:
description: Path to the Gsecdump executable
type: url
default: PathToAtomicsFolder\..\ExternalPayloads\gsecdump.exe
executor:
command: |
"#{gsecdump_exe}" -a
name: command_prompt