1.5 KiB
1.5 KiB
Atomic Red Team
https://github.com/redcanaryco/atomic-red-team
Structure
YAML files are used to describe a specific attack, which then can be replayed. Automatically most of the time. These scenarios are used for testing purposes.
Atomic Red Team for Powershell
Cmdlets are Invoke-AtomicRedTeam
and Invoke-AtomicTest
.
Import the module
powershell -ExecutionPolicy bypass
Import-Module Invoke-AtomicRedTeam.psd1 -Force
$PSDefaultParameterValues = @{"Invoke-AtomicTest:PathToAtomicsFolder"="C:\Users\Administrator\Desktop\atomics"}
Invoke-AtomicTest
Use Invoke-AtomicTest
Invoke-AtomicTest <MITRE TacticNo.> -ShowDetailsBrief
Invoke-AtomicTest <MITRE TacticNo.> -ShowDetails
Check if prerequisites are available
Invoke-AtomicTest <MITRE TechniqueNo.> -GetPreReqs
Multiple techniques can be executed through the following line
'T<number>', 'T<number>', 'T<number>' | ForEach-Object {echo "Enumerating Tactic $_"; Invoke-AtomicTest $_ -showDetails}
Use -cleanup
to revert the changes. Use -promptForInputArgs
to set variables interactively.
Argument Customization
Customize arguments of a test execution via
$customArgs=@{"user" = "username"; "password" = "securepassword"}
Invoke-AtomicTest T<number>-<Testnumber> -InputArgs $customArgs
AtomicGUI
There is a web application that can be started via Start-AtomicGUI
to create new atomic rules.