06 2023 档案

摘要:## [T1531](https://atomicredteam.io/impact/T1531/) Account Access Removal ## [T1529](https://atomicredteam.io/impact/T1529/) System Shutdown/Reboot ## 阅读全文
posted @ 2023-06-28 13:58 皇帽讲绿帽带法技巧 阅读(44) 评论(0) 推荐(0) 编辑
摘要:## [T1567.002](https://atomicredteam.io/exfiltration/T1567.002/) Exfiltration Over Web Service: Exfiltration to Cloud Storage ## [T1048](https://atomi 阅读全文
posted @ 2023-06-28 13:57 皇帽讲绿帽带法技巧 阅读(92) 评论(0) 推荐(0) 编辑
摘要:## 1078.001 - [Atomic Test #1 - Enable Guest account with RDP capability and admin privileges](https://github.com/redcanaryco/atomic-red-team/blob/mas 阅读全文
posted @ 2023-06-28 13:56 皇帽讲绿帽带法技巧 阅读(32) 评论(0) 推荐(0) 编辑
摘要:## [T1556.003](https://atomicredteam.io/persistence/T1556.003/) Modify Authentication Process: Pluggable Authentication Modules ## [T1556.002](https:/ 阅读全文
posted @ 2023-06-28 13:54 皇帽讲绿帽带法技巧 阅读(96) 评论(0) 推荐(0) 编辑
摘要:## [T1611](https://atomicredteam.io/privilege-escalation/T1611/) Escape to Host ## [T1547](https://atomicredteam.io/privilege-escalation/T1547/) Boot 阅读全文
posted @ 2023-06-28 13:53 皇帽讲绿帽带法技巧 阅读(144) 评论(0) 推荐(0) 编辑
摘要:```c credential-access T1649 Steal or Forge Authentication Certificates T1606.002 Forge Web Credentials: SAML token T1558.004 Steal or Forge Kerberos 阅读全文
posted @ 2023-06-20 10:54 皇帽讲绿帽带法技巧 阅读(139) 评论(0) 推荐(0) 编辑
摘要:# Atomic-命令与控制战术 - 可以编入使用落实到安全策略且有效的战术编号 - 参考: - https://atomicredteam.io/atomics/#command-and-control #### 具体战术概览 ```c command-and-control T1573 Encr 阅读全文
posted @ 2023-06-08 15:21 皇帽讲绿帽带法技巧 阅读(75) 评论(0) 推荐(0) 编辑
摘要:# Atomic-执行战术 - 可以编入使用落实到安全策略且有效的战术编号 - 参考: - https://atomicredteam.io/atomics/#execution #### 具体战术概览 ```c execution T1610 Deploy a container T1609 Ku 阅读全文
posted @ 2023-06-06 17:12 皇帽讲绿帽带法技巧 阅读(270) 评论(0) 推荐(0) 编辑
摘要:# User-Agent特征库 ### 爬行特征库(CRAWLERS) 008 ABACHOBot Accoona-AI-Agent AddSugarSpiderBot AnyApexBot Arachmo B-l-i-t-z-B-O-T Baiduspider BecomeBot BeslistB 阅读全文
posted @ 2023-06-05 09:55 皇帽讲绿帽带法技巧 阅读(136) 评论(0) 推荐(0) 编辑

点击右上角即可分享
微信分享提示