Changed all OSBinaries according to the new template

This commit is contained in:
Oddvar Moe
2018-09-24 21:59:43 +02:00
parent 68884a4c13
commit 37cc1ee83e
66 changed files with 1448 additions and 698 deletions

View File

@@ -1,25 +1,31 @@
---
Name: Rpcping.exe
Description: Credentials
Author: ''
Description: Used to verify rpc connection
Author: 'Oddvar Moe'
Created: '2018-05-25'
Categories: []
Commands:
- Command: rpcping -s 127.0.0.1 -t ncacn_np
Description: Send a RPC test connection to the target server (-s) sending the password hash in the process.
- Command: rpcping -s 192.168.1.10 -ncacn_np
Description: Send a RPC test connection to the target server (-s) sending the password hash in the process.
- Command: rpcping -s 127.0.0.1 -e 1234 -a privacy -u NTLM
Description: Send a RPC test connection to the target server (-s) and force the NTLM hash to be sent in the process.
Usecase: Capture credentials on a non-standard port
Category: Credentials
Privileges: User
MitreID: T1003
MitreLink: https://attack.mitre.org/wiki/Technique/T1003
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
Full Path:
- C:\Windows\System32\rpcping.exe
- C:\Windows\SysWOW64\rpcping.exe
Code Sample: []
Detection: []
- Path: C:\Windows\System32\rpcping.exe
- Path: C:\Windows\SysWOW64\rpcping.exe
Code Sample:
- Code:
Detection:
- IOC:
Resources:
- https://twitter.com/subtee/status/872797890539913216
- https://github.com/vysec/RedTips
- https://twitter.com/vysecurity/status/974806438316072960
- https://twitter.com/vysecurity/status/873181705024266241
Notes: Thanks to Casey Smith - @subtee, Vincent Yiu - @vysecurity
- Link: https://github.com/vysec/RedTips
- Link: https://twitter.com/vysecurity/status/974806438316072960
- Link: https://twitter.com/vysecurity/status/873181705024266241
Acknowledgement:
- Person: Casey Smith
Handle: '@subtee'
- Person: Vincent Yiu
Handle: '@vysecurity'
---