Skip to content

Commit

Permalink
backslash fix for markdown (redcanaryco#881)
Browse files Browse the repository at this point in the history
  • Loading branch information
clr2of8 authored Mar 16, 2020
1 parent 9ed5a8b commit 71223b2
Show file tree
Hide file tree
Showing 162 changed files with 2,110 additions and 1,088 deletions.
6 changes: 5 additions & 1 deletion atomic_red_team/atomic_doc_template.md.erb
Original file line number Diff line number Diff line change
Expand Up @@ -24,12 +24,16 @@
end
end.join(', ') %>

<%def cleanup(input)
input.to_s.strip.gsub(/\\/,"&#92;")
end%>

<% if test['input_arguments'].to_a.count > 0 %>
#### Inputs:
| Name | Description | Type | Default Value |
|------|-------------|------|---------------|
<% test['input_arguments'].each do |arg_name, arg_options| -%>
| <%= arg_name.to_s.strip %> | <%= arg_options['description'].to_s.strip %> | <%= arg_options['type'].to_s.strip %> | <%= arg_options['default'].to_s.strip %>|
| <%= cleanup(arg_name) %> | <%= cleanup(arg_options['description']) %> | <%= cleanup(arg_options['type']) %> | <%= cleanup(arg_options['default']) %>|
<% end -%>
<% end -%>

Expand Down
16 changes: 13 additions & 3 deletions atomics/T1002/T1002.md
Original file line number Diff line number Diff line change
Expand Up @@ -23,11 +23,13 @@ An adversary may compress data (e.g., sensitive documents) that is collected pri
**Supported Platforms:** Windows




#### Inputs:
| Name | Description | Type | Default Value |
|------|-------------|------|---------------|
| input_file | Path that should be compressed into our output file | Path | $env:USERPROFILE|
| output_file | Path where resulting compressed data should be placed | Path | $env:USERPROFILE\data.zip|
| output_file | Path where resulting compressed data should be placed | Path | $env:USERPROFILE&#92;data.zip|


#### Attack Commands: Run with `powershell`!
Expand Down Expand Up @@ -55,13 +57,15 @@ An adversary may compress data (e.g., sensitive documents) that is collected pri
**Supported Platforms:** Windows




#### Inputs:
| Name | Description | Type | Default Value |
|------|-------------|------|---------------|
| input_path | Path that should be compressed into our output file | Path | %USERPROFILE%|
| file_extension | Extension of files to compress | String | .txt|
| output_file | Path where resulting compressed data should be placed | Path | %USERPROFILE%\data.rar|
| rar_installer | Winrar installer | Path | %TEMP%\winrar.exe|
| output_file | Path where resulting compressed data should be placed | Path | %USERPROFILE%&#92;data.rar|
| rar_installer | Winrar installer | Path | %TEMP%&#92;winrar.exe|
| rar_exe | The RAR executable from Winrar | Path | %programfiles%/WinRAR/Rar.exe|


Expand Down Expand Up @@ -105,6 +109,8 @@ An adversary may compress data (e.g., sensitive documents) that is collected pri
**Supported Platforms:** Linux, macOS




#### Inputs:
| Name | Description | Type | Default Value |
|------|-------------|------|---------------|
Expand Down Expand Up @@ -149,6 +155,8 @@ An adversary may compress data (e.g., sensitive documents) that is collected pri
**Supported Platforms:** Linux, macOS




#### Inputs:
| Name | Description | Type | Default Value |
|------|-------------|------|---------------|
Expand Down Expand Up @@ -181,6 +189,8 @@ An adversary may compress data (e.g., sensitive documents) that is collected pri
**Supported Platforms:** Linux, macOS




#### Inputs:
| Name | Description | Type | Default Value |
|------|-------------|------|---------------|
Expand Down
50 changes: 39 additions & 11 deletions atomics/T1003/T1003.md
Original file line number Diff line number Diff line change
Expand Up @@ -172,6 +172,8 @@ Dumps credentials from memory via Powershell by invoking a remote mimikatz scrip
**Supported Platforms:** Windows




#### Inputs:
| Name | Description | Type | Default Value |
|------|-------------|------|---------------|
Expand Down Expand Up @@ -199,10 +201,12 @@ Dump credentials from memory using Gsecdump
**Supported Platforms:** Windows




#### Inputs:
| Name | Description | Type | Default Value |
|------|-------------|------|---------------|
| gsecdump_exe | Path to the Gsecdump executable | Path | PathToAtomicsFolder\T1003\bin\gsecdump.exe|
| gsecdump_exe | Path to the Gsecdump executable | Path | PathToAtomicsFolder&#92;T1003&#92;bin&#92;gsecdump.exe|
| gsecdump_url | Path to download Gsecdump binary file | url | https://web.archive.org/web/20150606043951if_/http://www.truesec.se/Upload/Sakerhet/Tools/gsecdump-v2b5.exe|
| gsecdump_bin_hash | File hash of the Gsecdump binary file | String | 94CAE63DCBABB71C5DD43F55FD09CAEFFDCD7628A02A112FB3CBA36698EF72BC|

Expand Down Expand Up @@ -244,11 +248,13 @@ Dump credentials from memory using Windows Credential Editor from https://www.am
**Supported Platforms:** Windows




#### Inputs:
| Name | Description | Type | Default Value |
|------|-------------|------|---------------|
| output_file | Path where resulting data should be placed | Path | %temp%\output.txt|
| wce_exe | Path of Windows Credential Editor executable | Path | PathToAtomicsFolder\T1003\bin\wce.exe|
| output_file | Path where resulting data should be placed | Path | %temp%&#92;output.txt|
| wce_exe | Path of Windows Credential Editor executable | Path | PathToAtomicsFolder&#92;T1003&#92;bin&#92;wce.exe|
| wce_url | Path to download Windows Credential Editor zip file | url | https://www.ampliasecurity.com/research/wce_v1_41beta_universal.zip|
| wce_zip_hash | File hash of the Windows Credential Editor zip file | String | 8F4EFA0DDE5320694DD1AA15542FE44FDE4899ED7B3A272063902E773B6C4933|

Expand Down Expand Up @@ -294,6 +300,8 @@ via three registry keys. Then processed locally using https://github.com/Neohaps





#### Attack Commands: Run with `command_prompt`! Elevation Required (e.g. root or admin)


Expand Down Expand Up @@ -324,11 +332,13 @@ ProcDump. The tool may be downloaded from https://docs.microsoft.com/en-us/sysin
**Supported Platforms:** Windows




#### Inputs:
| Name | Description | Type | Default Value |
|------|-------------|------|---------------|
| output_file | Path where resulting dump should be placed | Path | C:\Windows\Temp\lsass_dump.dmp|
| procdump_exe | Path of Procdump executable | Path | PathToAtomicsFolder\T1003\bin\procdump.exe|
| output_file | Path where resulting dump should be placed | Path | C:&#92;Windows&#92;Temp&#92;lsass_dump.dmp|
| procdump_exe | Path of Procdump executable | Path | PathToAtomicsFolder&#92;T1003&#92;bin&#92;procdump.exe|


#### Attack Commands: Run with `command_prompt`! Elevation Required (e.g. root or admin)
Expand Down Expand Up @@ -372,6 +382,8 @@ Manager and administrative permissions.
**Supported Platforms:** Windows




#### Run it with these steps!
1. Open Task Manager:
On a Windows system this can be accomplished by pressing CTRL-ALT-DEL and selecting Task Manager or by right-clicking
Expand Down Expand Up @@ -400,11 +412,13 @@ Mimikatz. This tool is available at https://github.com/gentilkiwi/mimikatz.
**Supported Platforms:** Windows




#### Inputs:
| Name | Description | Type | Default Value |
|------|-------------|------|---------------|
| mimikatz_exe | Path of the Mimikatz binary | string | PathToAtomicsFolder\T1003\bin\mimikatz.exe|
| input_file | Path of the Lsass dump | Path | %tmp%\lsass.DMP|
| mimikatz_exe | Path of the Mimikatz binary | string | PathToAtomicsFolder&#92;T1003&#92;bin&#92;mimikatz.exe|
| input_file | Path of the Lsass dump | Path | %tmp%&#92;lsass.DMP|


#### Attack Commands: Run with `command_prompt`! Elevation Required (e.g. root or admin)
Expand Down Expand Up @@ -454,10 +468,12 @@ subsequent domain controllers without the need of network-based replication.
**Supported Platforms:** Windows




#### Inputs:
| Name | Description | Type | Default Value |
|------|-------------|------|---------------|
| output_folder | Path where resulting dump should be placed | Path | C:\Windows\Temp|
| output_folder | Path where resulting dump should be placed | Path | C:&#92;Windows&#92;Temp|


#### Attack Commands: Run with `command_prompt`! Elevation Required (e.g. root or admin)
Expand Down Expand Up @@ -493,6 +509,8 @@ The Active Directory database NTDS.dit may be dumped by copying it from a Volume
**Supported Platforms:** Windows




#### Inputs:
| Name | Description | Type | Default Value |
|------|-------------|------|---------------|
Expand Down Expand Up @@ -536,11 +554,13 @@ This test must be executed on a Windows Domain Controller.
**Supported Platforms:** Windows




#### Inputs:
| Name | Description | Type | Default Value |
|------|-------------|------|---------------|
| vsc_name | Name of Volume Shadow Copy | String | \\?\GLOBALROOT\Device\HarddiskVolumeShadowCopy1|
| extract_path | Path for extracted NTDS.dit | Path | C:\Windows\Temp|
| vsc_name | Name of Volume Shadow Copy | String | &#92;&#92;?&#92;GLOBALROOT&#92;Device&#92;HarddiskVolumeShadowCopy1|
| extract_path | Path for extracted NTDS.dit | Path | C:&#92;Windows&#92;Temp|


#### Attack Commands: Run with `command_prompt`! Elevation Required (e.g. root or admin)
Expand Down Expand Up @@ -603,6 +623,8 @@ Look for the encrypted cpassword value within Group Policy Preference files on t





#### Attack Commands: Run with `command_prompt`!


Expand Down Expand Up @@ -636,10 +658,12 @@ Look for the encrypted cpassword value within Group Policy Preference files on t
**Supported Platforms:** Windows




#### Inputs:
| Name | Description | Type | Default Value |
|------|-------------|------|---------------|
| gpp_script_path | Path to the Get-GPPPassword PowerShell Script | Path | PathToAtomicsFolder\T1003\src\Get-GPPPassword.ps1|
| gpp_script_path | Path to the Get-GPPPassword PowerShell Script | Path | PathToAtomicsFolder&#92;T1003&#92;src&#92;Get-GPPPassword.ps1|
| gpp_script_url | URL of the Get-GPPPassword PowerShell Script | url | https://raw.githubusercontent.com/PowerShellMafia/PowerSploit/87630cac639f29c2adcb163f661f02890adf4bdd/Exfiltration/Get-GPPPassword.ps1|


Expand Down Expand Up @@ -689,6 +713,8 @@ Parses secrets hidden in the LSASS process with python. Similar to mimikatz's se





#### Attack Commands: Run with `command_prompt`! Elevation Required (e.g. root or admin)


Expand Down Expand Up @@ -741,6 +767,8 @@ Parses registry hives to obtain stored credentials





#### Attack Commands: Run with `command_prompt`! Elevation Required (e.g. root or admin)


Expand Down
12 changes: 9 additions & 3 deletions atomics/T1004/T1004.md
Original file line number Diff line number Diff line change
Expand Up @@ -27,10 +27,12 @@ PowerShell code to set Winlogon shell key to execute a binary at logon along wit
**Supported Platforms:** Windows




#### Inputs:
| Name | Description | Type | Default Value |
|------|-------------|------|---------------|
| binary_to_execute | Path of binary to execute | Path | C:\Windows\System32\cmd.exe|
| binary_to_execute | Path of binary to execute | Path | C:&#92;Windows&#92;System32&#92;cmd.exe|


#### Attack Commands: Run with `powershell`!
Expand Down Expand Up @@ -58,10 +60,12 @@ PowerShell code to set Winlogon userinit key to execute a binary at logon along
**Supported Platforms:** Windows




#### Inputs:
| Name | Description | Type | Default Value |
|------|-------------|------|---------------|
| binary_to_execute | Path of binary to execute | Path | C:\Windows\System32\cmd.exe|
| binary_to_execute | Path of binary to execute | Path | C:&#92;Windows&#92;System32&#92;cmd.exe|


#### Attack Commands: Run with `powershell`!
Expand Down Expand Up @@ -89,10 +93,12 @@ PowerShell code to set Winlogon Notify key to execute a notification package DLL
**Supported Platforms:** Windows




#### Inputs:
| Name | Description | Type | Default Value |
|------|-------------|------|---------------|
| binary_to_execute | Path of notification package to execute | Path | C:\Windows\Temp\atomicNotificationPackage.dll|
| binary_to_execute | Path of notification package to execute | Path | C:&#92;Windows&#92;Temp&#92;atomicNotificationPackage.dll|


#### Attack Commands: Run with `powershell`!
Expand Down
2 changes: 2 additions & 0 deletions atomics/T1005/T1005.md
Original file line number Diff line number Diff line change
Expand Up @@ -18,6 +18,8 @@ This test uses `grep` to search a macOS Safari binaryCookies file for specified
**Supported Platforms:** macOS




#### Inputs:
| Name | Description | Type | Default Value |
|------|-------------|------|---------------|
Expand Down
6 changes: 5 additions & 1 deletion atomics/T1007/T1007.md
Original file line number Diff line number Diff line change
Expand Up @@ -18,6 +18,8 @@ Identify system services





#### Attack Commands: Run with `command_prompt`! Elevation Required (e.g. root or admin)


Expand All @@ -41,10 +43,12 @@ Enumerates started system services using net.exe and writes them to a file. This
**Supported Platforms:** Windows




#### Inputs:
| Name | Description | Type | Default Value |
|------|-------------|------|---------------|
| output_file | Path of file to hold net.exe output | Path | C:\Windows\Temp\service-list.txt|
| output_file | Path of file to hold net.exe output | Path | C:&#92;Windows&#92;Temp&#92;service-list.txt|


#### Attack Commands: Run with `command_prompt`!
Expand Down
2 changes: 2 additions & 0 deletions atomics/T1009/T1009.md
Original file line number Diff line number Diff line change
Expand Up @@ -18,6 +18,8 @@ Uses dd to add a zero to the binary to change the hash
**Supported Platforms:** macOS, Linux




#### Inputs:
| Name | Description | Type | Default Value |
|------|-------------|------|---------------|
Expand Down
6 changes: 4 additions & 2 deletions atomics/T1010/T1010.md
Original file line number Diff line number Diff line change
Expand Up @@ -17,11 +17,13 @@ Compiles and executes C# code to list main window titles associated with each pr
**Supported Platforms:** Windows




#### Inputs:
| Name | Description | Type | Default Value |
|------|-------------|------|---------------|
| input_source_code | Path to source of C# code | path | PathToAtomicsFolder\T1010\src\T1010.cs|
| output_file_name | Name of output binary | string | $env:TEMP\T1010.exe|
| input_source_code | Path to source of C# code | path | PathToAtomicsFolder&#92;T1010&#92;src&#92;T1010.cs|
| output_file_name | Name of output binary | string | $env:TEMP&#92;T1010.exe|


#### Attack Commands: Run with `command_prompt`!
Expand Down
2 changes: 2 additions & 0 deletions atomics/T1012/T1012.md
Original file line number Diff line number Diff line change
Expand Up @@ -29,6 +29,8 @@ https://www.offensive-security.com/wp-content/uploads/2015/04/wp.Registry_Quick_





#### Attack Commands: Run with `command_prompt`! Elevation Required (e.g. root or admin)


Expand Down
8 changes: 7 additions & 1 deletion atomics/T1014/T1014.md
Original file line number Diff line number Diff line change
Expand Up @@ -21,6 +21,8 @@ Loadable Kernel Module based Rootkit
**Supported Platforms:** Linux




#### Inputs:
| Name | Description | Type | Default Value |
|------|-------------|------|---------------|
Expand Down Expand Up @@ -48,6 +50,8 @@ Loadable Kernel Module based Rootkit
**Supported Platforms:** Linux




#### Inputs:
| Name | Description | Type | Default Value |
|------|-------------|------|---------------|
Expand Down Expand Up @@ -82,10 +86,12 @@ It would be wise if you only run this in a test environment
**Supported Platforms:** Windows




#### Inputs:
| Name | Description | Type | Default Value |
|------|-------------|------|---------------|
| driver_path | Path to the vulnerable driver | Path | C:\Drivers\driver.sys|
| driver_path | Path to the vulnerable driver | Path | C:&#92;Drivers&#92;driver.sys|


#### Attack Commands: Run with `command_prompt`!
Expand Down
Loading

0 comments on commit 71223b2

Please sign in to comment.