mirror of
https://github.com/LOLBAS-Project/LOLBAS
synced 2025-10-14 01:15:35 +02:00
Improve GitHub Actions workflows (#467)
This commit is contained in:
@@ -15,7 +15,7 @@ Commands:
|
||||
OperatingSystem: Windows Server 2012, Windows Server 2016, Windows Server 2019
|
||||
- Command: dsdbutil.exe "activate instance ntds" "snapshot" "mount {GUID}" "quit" "quit"
|
||||
Description: Mounting the snapshot with its GUID
|
||||
Usecase: Mounting the snapshot to access the ntds.dit with copy c:\[Snap Volume]\windows\ntds\ntds.dit c:\users\administrator\desktop\ntds.dit.bak
|
||||
Usecase: Mounting the snapshot to access the ntds.dit with `copy c:\<Snap Volume>\windows\ntds\ntds.dit c:\users\administrator\desktop\ntds.dit.bak`
|
||||
Category: Dump
|
||||
Privileges: Administrator
|
||||
MitreID: T1003.003
|
||||
@@ -29,7 +29,7 @@ Commands:
|
||||
OperatingSystem: Windows Server 2012, Windows Server 2016, Windows Server 2019
|
||||
- Command: dsdbutil.exe "activate instance ntds" "snapshot" "create" "list all" "mount 1" "quit" "quit"
|
||||
Description: Mounting with snapshot identifier
|
||||
Usecase: Mounting the snapshot identifier 1 and accessing it with with copy c:\[Snap Volume]\windows\ntds\ntds.dit c:\users\administrator\desktop\ntds.dit.bak
|
||||
Usecase: Mounting the snapshot identifier 1 and accessing it with `copy c:\<Snap Volume>\windows\ntds\ntds.dit c:\users\administrator\desktop\ntds.dit.bak`
|
||||
Category: Dump
|
||||
Privileges: Administrator
|
||||
MitreID: T1003.003
|
||||
@@ -51,11 +51,6 @@ Detection:
|
||||
- IOC: Regular and Volume Shadow Copy attempts to read or modify ntds.dit
|
||||
- IOC: Event ID 4656
|
||||
- IOC: Regular and Volume Shadow Copy attempts to read or modify ntds.dit
|
||||
- Analysis:
|
||||
- Sigma:
|
||||
- Elastic:
|
||||
- Splunk:
|
||||
- BlockRule:
|
||||
Resources:
|
||||
- Link: https://gist.github.com/bohops/88561ca40998e83deb3d1da90289e358
|
||||
- Link: https://www.netwrix.com/ntds_dit_security_active_directory.html
|
||||
|
@@ -5,7 +5,7 @@ Author: Jimmy (@bohops)
|
||||
Created: 2021-09-26
|
||||
Commands:
|
||||
- Command: VisualUiaVerifyNative.exe
|
||||
Description: Generate Serialized gadget and save to - C:\Users\[current user]\AppData\Roaminguiverify.config before executing.
|
||||
Description: Generate Serialized gadget and save to - `C:\Users\%USERNAME%\AppData\Roaminguiverify.config` before executing.
|
||||
Usecase: Execute proxied payload with Microsoft signed binary to bypass WDAC policies
|
||||
Category: AWL Bypass
|
||||
Privileges: User
|
||||
|
Reference in New Issue
Block a user