-
Notifications
You must be signed in to change notification settings - Fork 14.5k
Add T1003 "OS credential dumping" MITRE technique reference #20533
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: master
Are you sure you want to change the base?
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Since this was our first time using AI to tag these I wanted to go through and review each of them. I think every module it tagged does indeed fall under the T1003
category; I didn't notice any false positives. While reviewing them I did add subcategories as I thought they were applicable just because I had the info handy. I did not go through modules that were not tagged, to see if there were any false negatives, but I can't think of any off hand that are obviously missing.
@@ -34,7 +34,8 @@ def initialize(info = {}) | |||
'License' => MSF_LICENSE, | |||
'References' => [ | |||
[ 'URL', 'http://sourceforge.net/projects/smbexec' ], | |||
[ 'URL', 'https://www.optiv.com/blog/owning-computers-without-shell-access' ] | |||
[ 'URL', 'https://www.optiv.com/blog/owning-computers-without-shell-access' ], | |||
[ 'ATT&CK', Mitre::Attack::Technique::T1003_OS_CREDENTIAL_DUMPING ] |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
[ 'ATT&CK', Mitre::Attack::Technique::T1003_OS_CREDENTIAL_DUMPING ] | |
[ 'ATT&CK', Mitre::Attack::Technique::T1003_003_NTDS ] |
@@ -34,7 +34,8 @@ def initialize(info = {}) | |||
# Rapid7 ETR advisory for CVE-2024-24919 | |||
[ 'URL', 'https://www.rapid7.com/blog/post/2024/05/30/etr-cve-2024-24919-check-point-security-gateway-information-disclosure/' ], | |||
# Publication of first proof-of-concept exploit | |||
[ 'URL', 'https://labs.watchtowr.com/check-point-wrong-check-point-cve-2024-24919/' ] | |||
[ 'URL', 'https://labs.watchtowr.com/check-point-wrong-check-point-cve-2024-24919/' ], | |||
[ 'ATT&CK', Mitre::Attack::Technique::T1003_OS_CREDENTIAL_DUMPING ] |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
[ 'ATT&CK', Mitre::Attack::Technique::T1003_OS_CREDENTIAL_DUMPING ] | |
[ 'ATT&CK', Mitre::Attack::Technique::T1003_008_ETC_PASSWD_AND_ETC_SHADOW ] |
@@ -31,7 +31,8 @@ def initialize(info = {}) | |||
%w[EDB 47288], | |||
['URL', 'https://www.fortiguard.com/psirt/FG-IR-18-384'], | |||
['URL', 'https://i.blackhat.com/USA-19/Wednesday/us-19-Tsai-Infiltrating-Corporate-Intranet-Like-NSA.pdf'], | |||
['URL', 'https://devco.re/blog/2019/08/09/attacking-ssl-vpn-part-2-breaking-the-Fortigate-ssl-vpn/'] | |||
['URL', 'https://devco.re/blog/2019/08/09/attacking-ssl-vpn-part-2-breaking-the-Fortigate-ssl-vpn/'], | |||
['ATT&CK', Mitre::Attack::Technique::T1003_OS_CREDENTIAL_DUMPING] |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
['ATT&CK', Mitre::Attack::Technique::T1003_OS_CREDENTIAL_DUMPING] | |
['ATT&CK', Mitre::Attack::Technique::T1003_008_ETC_PASSWD_AND_ETC_SHADOW] |
@@ -36,7 +36,8 @@ def initialize(info = {}) | |||
['EDB', '48531'], | |||
['URL', 'https://infosecwriteups.com/qnap-pre-auth-root-rce-affecting-450k-devices-on-the-internet-d55488d28a05'], | |||
['URL', 'https://www.qnap.com/en-us/security-advisory/nas-201911-25'], | |||
['URL', 'https://github.com/Imanfeng/QNAP-NAS-RCE'] | |||
['URL', 'https://github.com/Imanfeng/QNAP-NAS-RCE'], | |||
['ATT&CK', Mitre::Attack::Technique::T1003_OS_CREDENTIAL_DUMPING] |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
['ATT&CK', Mitre::Attack::Technique::T1003_OS_CREDENTIAL_DUMPING] | |
['ATT&CK', Mitre::Attack::Technique::T1003_008_ETC_PASSWD_AND_ETC_SHADOW] |
@@ -68,6 +68,7 @@ module will fallback to the original implementation, which consists | |||
], | |||
'References' => [ | |||
['URL', 'https://github.com/SecureAuthCorp/impacket/blob/master/examples/secretsdump.py'], | |||
['ATT&CK', Mitre::Attack::Technique::T1003_OS_CREDENTIAL_DUMPING], |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This one supports multiple techniques and it's one of the more important examples for each that I think it makes sense to add each one individually.
['ATT&CK', Mitre::Attack::Technique::T1003_OS_CREDENTIAL_DUMPING], | |
['ATT&CK', Mitre::Attack::Technique::T1003_002_SECURITY_ACCOUNT_MANAGER], | |
['ATT&CK', Mitre::Attack::Technique::T1003_004_LSA_SECRETS], | |
['ATT&CK', Mitre::Attack::Technique::T1003_005_CACHED_DOMAIN_CREDENTIALS], | |
['ATT&CK', Mitre::Attack::Technique::T1003_006_DCSYNC] |
@@ -37,7 +37,8 @@ def initialize(info = {}) | |||
[ 'URL', 'https://github.com/huntergregal/mimipenguin' ], | |||
[ 'URL', 'https://bugs.launchpad.net/ubuntu/+source/gnome-keyring/+bug/1772919' ], | |||
[ 'URL', 'https://bugs.launchpad.net/ubuntu/+source/lightdm/+bug/1717490' ], | |||
[ 'CVE', '2018-20781' ] | |||
[ 'CVE', '2018-20781' ], | |||
[ 'ATT&CK', Mitre::Attack::Technique::T1003_OS_CREDENTIAL_DUMPING ] |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
[ 'ATT&CK', Mitre::Attack::Technique::T1003_OS_CREDENTIAL_DUMPING ] | |
[ 'ATT&CK', Mitre::Attack::Technique::T1003_007_PROC_FILESYSTEM ], | |
[ 'ATT&CK', Mitre::Attack::Technique::T1003_008_ETC_PASSWD_AND_ETC_SHADOW ] |
@@ -27,7 +27,8 @@ def initialize(info = {}) | |||
'Platform' => ['linux'], | |||
'SessionTypes' => ['shell', 'meterpreter'], | |||
'References' => [ | |||
['URL', 'https://gist.github.com/rvrsh3ll/cc93a0e05e4f7145c9eb#file-openvpnscraper-sh'] | |||
['URL', 'https://gist.github.com/rvrsh3ll/cc93a0e05e4f7145c9eb#file-openvpnscraper-sh'], | |||
[ 'ATT&CK', Mitre::Attack::Technique::T1003_OS_CREDENTIAL_DUMPING ] |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
[ 'ATT&CK', Mitre::Attack::Technique::T1003_OS_CREDENTIAL_DUMPING ] | |
[ 'ATT&CK', Mitre::Attack::Technique::T1003_007_PROC_FILESYSTEM ] |
} | ||
}, | ||
'References' => [ | ||
[ 'ATT&CK', Mitre::Attack::Technique::T1003_OS_CREDENTIAL_DUMPING ] |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
[ 'ATT&CK', Mitre::Attack::Technique::T1003_OS_CREDENTIAL_DUMPING ] | |
[ 'ATT&CK', Mitre::Attack::Technique::T1003_008_ETC_PASSWD_AND_ETC_SHADOW ] |
@@ -26,7 +26,8 @@ def initialize(info = {}) | |||
'Platform' => ['win'], | |||
'SessionTypes' => ['meterpreter'], | |||
'References' => [ | |||
['URL', 'https://web.archive.org/web/20220407023137/https://lab.mediaservice.net/code/cachedump.rb'] | |||
['URL', 'https://web.archive.org/web/20220407023137/https://lab.mediaservice.net/code/cachedump.rb'], | |||
['ATT&CK', Mitre::Attack::Technique::T1003_OS_CREDENTIAL_DUMPING] |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
['ATT&CK', Mitre::Attack::Technique::T1003_OS_CREDENTIAL_DUMPING] | |
['ATT&CK', Mitre::Attack::Technique::T1003_005_CACHED_DOMAIN_CREDENTIALS] |
} | ||
}, | ||
'References' => [ | ||
[ 'ATT&CK', Mitre::Attack::Technique::T1003_OS_CREDENTIAL_DUMPING ] |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
[ 'ATT&CK', Mitre::Attack::Technique::T1003_OS_CREDENTIAL_DUMPING ] | |
[ 'ATT&CK', Mitre::Attack::Technique::T1003_003_NTDS ] |
This adds the reference to MITRE ATT&CK technique T1003 "OS credential dumping". (see https://attack.mitre.org/techniques/T1003/ for details).
This has been mainly done with the help of AI and local scripts. The process was as follows: