mirror of
https://github.com/valitydev/atomic-threat-coverage.git
synced 2024-11-06 17:45:23 +00:00
1.9 KiB
1.9 KiB
T1069 - Permission Groups Discovery
Description from ATT&CK
Adversaries may attempt to find local system or domain-level groups and permissions settings.Windows
Examples of commands that can list groups are
net group /domain
andnet localgroup
using the Net utility.Mac
On Mac, this same thing can be accomplished with the
dscacheutil -q group
for the domain, ordscl . -list /Groups
for local groups.Linux
On Linux, local groups can be enumerated with the
groups
command and domain groups via theldapsearch
command.
Atomic Tests
Atomic Test #1 - Permission Groups Discovery
Permission Groups Discovery
Supported Platforms: macOS, Linux
Run it with sh
!
dscacheutil -q group
dscl . -list /Groups
groups
Atomic Test #2 - Permission Groups Discovery Windows
Permission Groups Discovery for Windows
Supported Platforms: Windows
Run it with command_prompt
!
net localgroup
net group /domain
Atomic Test #3 - Permission Groups Discovery PowerShell
Permission Groups Discovery utilizing PowerShell
Supported Platforms: Windows
Inputs
Name | Description | Type | Default Value |
---|---|---|---|
user | User to identify what groups a user is a member of | string | administrator |
Run it with powershell
!
get-localgroup
get-ADPrinicipalGroupMembership #{user} | select name