center-for-threat-informed-defense / adversary_emulation_library

An open library of adversary emulation plans designed to empower organizations to test their defenses based on real-world TTPs.
https://ctid.io/adversary-emulation
Apache License 2.0
1.62k stars 298 forks source link

Files directory missing in controlServer (OceanLotus) #163

Open aiqkeith opened 4 weeks ago

aiqkeith commented 4 weeks ago

When trying to upload files from the target host to the C2 server the script looks to upload into ./files. The "files" directory does not exist in the controlServer directory. If the directory is added, the command works and exfiltration is possible.

This is step 2 of the Red Team Procedures under Step 2 - MacOS Discovery (https://github.com/center-for-threat-informed-defense/adversary_emulation_library/blob/4a57b3dd5d28ad1bd79e927e04b20fd4d66934a0/ocean_lotus/Emulation_Plan/OceanLotus_Scenario.md#-red-team-procedures-2)