-
Notifications
You must be signed in to change notification settings - Fork 2.9k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
New Technique: T1651 #3031
New Technique: T1651 #3031
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Your webserver atomic files are showing up in this PR. Can you update the PR so the changes only include T1651? Thx!
Done! |
@patel-bhavin can you review this cloud atomic? thx |
certainly! @ryananicholson : thanks for updating the PR and attaching the screenshot of the execution! this atomic looks good to me! |
Details:
This test uses Terraform to deploy an SSM-enabled AWS EC2 instance. The attack leverages either configured or stolen credentials to launch an attacker-controlled command (
cat /etc/shadow
) using an SSM Run Command. Due to infrastructure build, warmup, and tear down times, I recommend that a larger timeout than default is used (600 seconds seems to be a good number in my testing).Testing:
Tested against my AWS account. Results shown below:
Associated Issues:
No issues fixed with this PR.