Files
atomic-red-team/atomics/T1176/T1176.yaml
T
2018-05-23 17:09:04 -06:00

54 lines
1.1 KiB
YAML

---
attack_technique: T1176
display_name: Browser Extensions
atomic_tests:
- name: Chrome (Developer Mode)
description: |
xxx
supported_platforms:
- linux
- windows
- macos
executor:
name: manual
steps: |
1. Navigate to [chrome://extensions](chrome://extensions) and
tick 'Developer Mode'.
2. Click 'Load unpacked extension...' and navigate to
[Browser_Extension](../t1176/)
3. Click 'Select'
- name: Chrome (Chrome Web Store)
description: |
xxx
supported_platforms:
- linux
- windows
- macos
executor:
name: manual
steps: |
1. Navigate to https://chrome.google.com/webstore/detail/minimum-viable-malicious/odlpfdolehmhciiebahbpnaopneicend
in Chrome
2. Click 'Add to Chrome'
- name: Firefox
description: |
Create a file called test.wma, with the duration of 30 seconds
supported_platforms:
- linux
- windows
- macos
executor:
name: manual
steps: |
1. Navigate to [about:debugging](about:debugging) and
click "Load Temporary Add-on"
2. Navigate to [manifest.json](./manifest.json)
3. Then click 'Open'