Skip to content
New issue

Have a question about this project? # for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “#”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? # to your account

Attack-Navigator-Layers for Windows not complete #2942

Open
SirStephanikus opened this issue Sep 18, 2024 · 0 comments
Open

Attack-Navigator-Layers for Windows not complete #2942

SirStephanikus opened this issue Sep 18, 2024 · 0 comments

Comments

@SirStephanikus
Copy link

Invoke-AtomicTest T1106 -ShowDetailsBrief

T1106-1 Execution through API - CreateProcess                                                                                                                                       T1106-2 WinPwn - Get SYSTEM shell - Pop System Shell using CreateProcess technique                                                                                                  T1106-3 WinPwn - Get SYSTEM shell - Bind System Shell using CreateProcess technique                                                                                                 T1106-4 WinPwn - Get SYSTEM shell - Pop System Shell using NamedPipe Impersonation technique                                                                                        T1106-5 Run Shellcode via Syscall in Go

What did you expect to happen?

T1106 Native API should be marked as "available"/“red field” in the Attack Navigator Layer for Windows Template.

What happened instead?

T1106 Native API is marked as "white field" in the Attack Navigator Layer for Windows Template. The template falsely gives the impression, that no atomics exists for this technique.

Your Environment

Windows Server 2022 AD-DC

# for free to join this conversation on GitHub. Already have an account? # to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant