mitre-attack / attack-arsenal

A collection of red team and adversary emulation resources developed and released by MITRE.
Apache License 2.0
485 stars 79 forks source link

Days 1 and 2: Minor Typos #11

Closed leegengyu closed 4 years ago

leegengyu commented 4 years ago

Found several minor typos (e.g. spelling, grammatical, or relating to file names) in 3 files - they are surrounded by asterisks:

Day 1 - README.md

The payloads are customized **varients** of reverse shells from Pupy RAT and Metasploit.

Zip modified **SysIntenralsSuite** folder

Day 1 - payload_configs.md

Move cursor to **begining** of filename

Transfer **pyton.py** to Windows attack platform

Day 2 - README.md

Scenario begins with a target spearphishing leading into a low and slow, methodical approach to owning the **intial** target and eventually the entire domain

**Oneline** OneDrive Account

Generate DLL payload, then on a **seperate** Windows host:

Copy payloads to C2 server (wherever is **approapropriate** your C2 framework to have access to these files)

Prepare **intial** access payloads

**Login in** as domain admin user

Copy over the following files onto the Desktop of the **intial** victim:

Copy over `MITRE-ATTACK-EVALS.HTML` into **the the** Documents folder of the **intial** victim

You will now **recieve** a new, low integrity callback

You will now **recieve** a new, high integrity callback

**17.A - Blank Step 4**