prompt
stringclasses 508
values | procedure
stringlengths 20
478
|
---|---|
Unsecured Credentials:Credentials In Files | If an initial connectivity check fails, pngdowner attempts to extract proxy details and credentials from Windows Protected Storage and from the IE Credentials Store. This allows the adversary to use the proxy credentials for subsequent requests if they enable outbound HTTP access. |
Unsecured Credentials:Credentials In Files | PoshC2 contains modules for searching for passwords in local and remote files. |
Unsecured Credentials:Credentials In Files | Pupy can use Lazagne for harvesting credentials. |
Unsecured Credentials:Credentials In Files | Pysa has extracted credentials from the password database before encrypting the files. |
Unsecured Credentials:Credentials In Files | QuasarRAT can obtain passwords from FTP clients. |
Unsecured Credentials:Credentials In Files | Smoke Loader searches for files named logins.json to parse for credentials. |
Unsecured Credentials:Credentials In Files | It has used malware to gather credentials from FTP clients and Outlook. |
Unsecured Credentials:Credentials In Files | It has searched for unsecured AWS credentials and Docker API credentials. |
Unsecured Credentials:Credentials In Files | TrickBot can obtain passwords stored in files from several applications such as Outlook, Filezilla, OpenSSH, OpenVPN and WinSCP. Additionally, it searches for the ".vnc.lnk" affix to steal VNC credentials. |
Unsecured Credentials:Credentials In Files | XTunnel is capable of accessing locally stored passwords on victims. |
Unsecured Credentials:Credentials in Registry | Agent Tesla has the ability to extract credentials from the Registry. |
Unsecured Credentials:Credentials in Registry | It used Outlook Credential Dumper to harvest credentials stored in Windows registry. |
Unsecured Credentials:Credentials in Registry | IceApple can harvest credentials from local and remote host registries. |
Unsecured Credentials:Credentials in Registry | PowerSploit has several modules that search the Windows Registry for stored credentials: Get-UnattendedInstallFile, Get-Webconfig, Get-ApplicationHost, Get-SiteListPassword, Get-CachedGPPPassword, and Get-RegistryAutoLogon. |
Unsecured Credentials:Credentials in Registry | Reg may be used to find credentials in the Windows Registry. |
Unsecured Credentials:Credentials in Registry | TrickBot has retrieved PuTTY credentials by querying the Software\SimonTatham\Putty\Sessions registry key |
Unsecured Credentials:Credentials in Registry | Valak can use the clientgrabber module to steal e-mail credentials from the Registry. |
Unsecured Credentials:Bash History | Kinsing has searched bash_history for credentials. |
Unsecured Credentials:Private Keys | AADInternals can gather encryption keys from Azure AD services such as ADSync and Active Directory Federated Services servers. |
Unsecured Credentials:Private Keys | Ebury has intercepted unencrypted private keys as well as private key pass-phrases. |
Unsecured Credentials:Private Keys | Empire can use modules like Invoke-SessionGopher to extract private key and session information. |
Unsecured Credentials:Private Keys | FoggyWeb can retrieve token signing certificates and token decryption certificates from a compromised AD FS server. |
Unsecured Credentials:Private Keys | Hildegard has searched for private keys in .ssh. |
Unsecured Credentials:Private Keys | jRAT can steal keys for VPNs and cryptocurrency wallets. |
Unsecured Credentials:Private Keys | Kinsing has searched for private keys. |
Unsecured Credentials:Private Keys | It has scanned and looked for cryptographic keys and certificate file extensions. |
Unsecured Credentials:Private Keys | Mafalda can collect a Chrome encryption key used to protect browser cookies. |
Unsecured Credentials:Private Keys | Mimikatz's CRYPTO::Extract module can extract keys by interacting with Windows cryptographic application programming interface (API) functions. |
Unsecured Credentials:Private Keys | During Operation Wocao, threat actors used Mimikatz to dump certificates and private keys from the Windows certificate store. |
Unsecured Credentials:Private Keys | It has used SSH private keys on the infected machine to spread its coinminer throughout a network. |
Unsecured Credentials:Private Keys | During the SolarWinds Compromise, It obtained PKI keys, certificate files, and the private encryption key from an Active Directory Federation Services (AD FS) container to decrypt corresponding SAML signing certificates. |
Unsecured Credentials:Private Keys | It has searched for unsecured SSH keys. |
Unsecured Credentials:Cloud Instance Metadata API | Hildegard has queried the Cloud Instance Metadata API for cloud credentials. |
Unsecured Credentials:Cloud Instance Metadata API | Peirates can query the query AWS and GCP metadata APIs for secrets. |
Unsecured Credentials:Cloud Instance Metadata API | It has queried the AWS instance metadata service for credentials. |
Unsecured Credentials:Group Policy Preferences | It has used a variety of publicly available tools like Gpppassword to gather credentials. |
Unsecured Credentials:Group Policy Preferences | PowerSploit contains a collection of Exfiltration modules that can harvest credentials from Group Policy Preferences. |
Unsecured Credentials:Group Policy Preferences | SILENTTRINITY has a module that can extract cached GPP passwords. |
Unsecured Credentials:Group Policy Preferences | It has used PowerShell cmdlets Get-GPPPassword and Find-GPOPassword to find unsecured credentials in a compromised network group policy. |
Unsecured Credentials:Container API | Peirates can query the Kubernetes API for secrets. |
Unsecured Credentials:Chat Messages | It has targeted various collaboration tools like Slack, Teams, JIRA, Confluence, and others to hunt for exposed credentials to support privilege escalation and lateral movement. |
Account Discovery | It has enumerated all users and their roles from a victim's main treasury system. |
Account Discovery | ShimRatReporter listed all non-privileged and privileged accounts available on the machine. |
Account Discovery | During the SolarWinds Compromise, It obtained a list of users and their roles from an Exchange server using Get-ManagementRoleAssignment. |
Account Discovery | Woody RAT can identify administrator accounts on an infected machine. |
Account Discovery | XCSSET attempts to discover accounts from various locations such as a user's Evernote, AppleID, Telegram, Skype, and WeChat data. |
Account Discovery:Local Account | It actors used the following commands following exploitation of a machine with LOWBALL malware to enumerate user accounts: net user >> %temp%\download net user /domain >> %temp%\download |
Account Discovery:Local Account | Agent Tesla can collect account information from the victim’s machine. |
Account Discovery:Local Account | It used the commands net localgroup,net user, and net group to find accounts on the system. |
Account Discovery:Local Account | It has used a tool that can obtain info about local and global group users, power users, and administrators. |
Account Discovery:Local Account | It enumerated administrative users using the commands net localgroup administrators. |
Account Discovery:Local Account | Bankshot gathers domain and account names/information through process monitoring. |
Account Discovery:Local Account | Bazar can identify administrator accounts on an infected host. |
Account Discovery:Local Account | BitPaymer can enumerate the sessions for each user logged onto the infected host. |
Account Discovery:Local Account | BloodHound can identify users with local administrator rights. |
Account Discovery:Local Account | It has used net user for account discovery. |
Account Discovery:Local Account | Comnie uses the net user command. |
Account Discovery:Local Account | The discovery modules used with Duqu can collect information on accounts and permissions. |
Account Discovery:Local Account | Elise executes net user after initial communication is made to the remote server. |
Account Discovery:Local Account | Empire can acquire local and domain user account information. |
Account Discovery:Local Account | Epic gathers a list of all user accounts, privilege classes, and time of last logon. |
Account Discovery:Local Account | It has accessed ntuser.dat and UserClass.dat on compromised hosts. |
Account Discovery:Local Account | GeminiDuke collects information on local user accounts from the victim. |
Account Discovery:Local Account | HyperStack can enumerate all account names on a remote share. |
Account Discovery:Local Account | InvisiMole has a command to list account information on the victim’s machine. |
Account Discovery:Local Account | Kazuar gathers information on local groups and members on the victim’s machine. |
Account Discovery:Local Account | It performs account discovery using commands such as net localgroup administrators and net group "REDACTED" /domain on specific permissions groups. |
Account Discovery:Local Account | Kwampirs collects a list of accounts with the command net users. |
Account Discovery:Local Account | Milan has run C:\Windows\system32\cmd.exe /c cmd /c dir c:\users\ /s 2>&1 to discover local accounts. |
Account Discovery:Local Account | Mis-Type may create a file containing the results of the command cmd.exe /c net user {Username}. |
Account Discovery:Local Account | It has collected the administrator username from a compromised host. |
Account Discovery:Local Account | MURKYTOP has the capability to retrieve information about users on remote hosts. |
Account Discovery:Local Account | Commands under net user can be used in Net to gather information about and manipulate user accounts. |
Account Discovery:Local Account | It has run net user, net user /domain, net group "domain admins" /domain, and net group "Exchange Trusted Subsystem" /domain to get account listings on a victim. |
Account Discovery:Local Account | During Operation CuckooBees, the threat actors used the net user command to gather account information. |
Account Discovery:Local Account | OSInfo enumerates local and domain users |
Account Discovery:Local Account | P.A.S. Webshell can display the /etc/passwd file on a compromised host. |
Account Discovery:Local Account | Pony has used the NetUserEnum function to enumerate local accounts. |
Account Discovery:Local Account | It searches for administrator accounts on both the local victim machine and the network. |
Account Discovery:Local Account | PoshC2 can enumerate local and domain user account information. |
Account Discovery:Local Account | PowerSploit's Get-ProcessTokenGroup Privesc-PowerUp module can enumerate all SIDs associated with its current token. |
Account Discovery:Local Account | POWERSTATS can retrieve usernames from compromised hosts. |
Account Discovery:Local Account | PUNCHBUGGY can gather user names. |
Account Discovery:Local Account | Pupy uses PowerView and Pywerview to perform discovery commands such as net user, net group, net local group, etc. |
Account Discovery:Local Account | RATANKBA uses the net user command. |
Account Discovery:Local Account | Remsec can obtain a list of users. |
Account Discovery:Local Account | S-Type has run the command net user on a victim. |
Account Discovery:Local Account | SHOTPUT has a command to retrieve information about connected users. |
Account Discovery:Local Account | SMOKEDHAM has used net.exe user and net.exe users to enumerate local accounts on a compromised host. |
Account Discovery:Local Account | SoreFang can collect usernames from the local system via net.exe user. |
Account Discovery:Local Account | Stuxnet enumerates user accounts of the local host. |
Account Discovery:Local Account | It has used net user to conduct internal discovery of systems. |
Account Discovery:Local Account | TrickBot collects the users of the system. |
Account Discovery:Local Account | It has used net user to enumerate local accounts on the system. |
Account Discovery:Local Account | USBferry can use net user to gather information about local accounts. |
Account Discovery:Local Account | Valak has the ability to enumerate local admin accounts. |
Account Discovery:Domain Account | AdFind can enumerate domain users. |
Account Discovery:Domain Account | Bankshot gathers domain and account names/information through process monitoring. |
Account Discovery:Domain Account | Bazar has the ability to identify domain administrator accounts. |
Account Discovery:Domain Account | BlackCat can utilize net use commands to identify domain users. |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.